summaryrefslogtreecommitdiffstats
path: root/arch/x86
Commit message (Expand)AuthorAgeFilesLines
...
* x86/dma: Fix max PFN arithmetic overflow on 32 bit systemsAlexander Dahl2020-06-031-1/+1
* KVM: x86: Fix off-by-one error in kvm_vcpu_ioctl_x86_setup_mceJim Mattson2020-05-201-1/+1
* x86: Fix early boot crash on gcc-10, third tryBorislav Petkov2020-05-203-1/+15
* bpf, x86: Fix encoding for lower 8-bit registers in BPF_STX BPF_BLuke Nelson2020-05-021-3/+15
* KVM: VMX: Enable machine check support for 32bit targetsUros Bizjak2020-05-021-1/+1
* x86/vdso: Fix lsl operand orderSamuel Neves2020-04-241-1/+1
* x86/microcode/intel: replace sync_core() with native_cpuid_reg(eax)Evalds Iodzevics2020-04-241-1/+1
* x86/CPU: Add native CPUID variants returning a single datumBorislav Petkov2020-04-241-0/+18
* kvm: x86: Host feature SSBD doesn't imply guest feature SPEC_CTRL_SSBDJim Mattson2020-04-241-1/+2
* KVM: VMX: fix crash cleanup when KVM wasn't usedVitaly Kuznetsov2020-04-241-5/+7
* KVM: VMX: Always VMCLEAR in-use VMCSes during crash with kexec supportSean Christopherson2020-04-241-51/+16
* KVM: x86: Allocate new rmap and large page tracking when moving memslotSean Christopherson2020-04-241-0/+11
* x86/entry/32: Add missing ASM_CLAC to general_protection entryThomas Gleixner2020-04-241-0/+1
* acpi/x86: ignore unspecified bit positions in the ACPI global lock fieldJan Engelhardt2020-04-241-1/+1
* x86/boot: Use unsigned comparison for addressesArvind Sankar2020-04-242-3/+3
* KVM: VMX: Do not allow reexecute_instruction() when skipping MMIO instrSean Christopherson2020-04-021-2/+2
* x86/mm: split vmalloc_sync_all()Joerg Roedel2020-04-021-2/+24
* perf/amd/uncore: Replace manual sampling check with CAP_NO_INTERRUPT flagKim Phillips2020-03-201-7/+7
* KVM: x86: clear stale x86_emulate_ctxt->intercept valueVitaly Kuznetsov2020-03-201-0/+1
* x86/pkeys: Manually set X86_FEATURE_OSPKE to preserve existing changesSean Christopherson2020-03-111-1/+1
* KVM: apic: avoid calculating pending eoi from an uninitialized valMiaohe Lin2020-02-281-1/+3
* KVM: nVMX: Check IO instruction VM-exit conditionsOliver Upton2020-02-281-7/+52
* KVM: nVMX: Refactor IO bitmap checks into helper functionOliver Upton2020-02-281-13/+27
* KVM: nVMX: Don't emulate instructions in guest modePaolo Bonzini2020-02-281-1/+1
* KVM: x86: don't notify userspace IOAPIC on edge-triggered interrupt EOIMiaohe Lin2020-02-281-1/+1
* x86/mce/amd: Fix kobject lifetimeThomas Gleixner2020-02-281-6/+11
* x86/mce/amd: Publish the bank pointer only after setup has succeededBorislav Petkov2020-02-281-17/+16
* x86/decoder: Add TEST opcode to Group3-2Masami Hiramatsu2020-02-281-1/+1
* x86/vdso: Provide missing include fileValdis Klētnieks2020-02-281-0/+1
* x86/sysfb: Fix check for bad VRAM sizeArvind Sankar2020-02-281-1/+1
* efi/x86: Map the entire EFI vendor string before copying itArd Biesheuvel2020-02-281-6/+7
* Revert "KVM: VMX: Add non-canonical check on writes to RTIT address MSRs"Sasha Levin2020-02-281-8033/+0
* perf/x86/intel: Fix inaccurate period in context switch for auto-reloadKan Liang2020-02-281-0/+2
* perf/x86/amd: Add missing L2 misses event spec to AMD Family 17h's event mapKim Phillips2020-02-281-0/+1
* KVM: x86: emulate RDPIDPaolo Bonzini2020-02-283-2/+42
* x86/vdso: Use RDPID in preference to LSL when availableAndy Lutomirski2020-02-282-1/+7
* KVM: nVMX: vmread should not set rflags to specify success in case of #PFMiaohe Lin2020-02-141-1/+3
* KVM: VMX: Add non-canonical check on writes to RTIT address MSRsSean Christopherson2020-02-141-0/+8033
* KVM: x86/mmu: Apply max PA check for MMIO sptes to 32-bit KVMSean Christopherson2020-02-141-2/+0
* KVM: x86: Protect pmu_intel.c from Spectre-v1/L1TF attacksMarios Pomonis2020-02-141-8/+16
* KVM: x86: Free wbinvd_dirty_mask if vCPU creation failsSean Christopherson2020-02-141-1/+1
* KVM: x86: Protect MSR-based index computations in fixed_msr_to_seg_unit() fro...Marios Pomonis2020-02-141-2/+7
* KVM: x86: Protect x86_decode_insn from Spectre-v1/L1TF attacksMarios Pomonis2020-02-141-3/+9
* KVM: x86: Protect MSR-based index computations from Spectre-v1/L1TF attacks i...Marios Pomonis2020-02-141-2/+8
* KVM: x86: Protect ioapic_read_indirect() from Spectre-v1/L1TF attacksMarios Pomonis2020-02-141-6/+7
* KVM: x86: Protect MSR-based index computations in pmu.h from Spectre-v1/L1TF ...Marios Pomonis2020-02-141-4/+14
* KVM: x86: Protect ioapic_write_indirect() from Spectre-v1/L1TF attacksMarios Pomonis2020-02-141-0/+2
* KVM: x86: Protect kvm_hv_msr_[get|set]_crash_data() from Spectre-v1/L1TF attacksMarios Pomonis2020-02-141-4/+7
* KVM: x86: Protect kvm_lapic_reg_write() from Spectre-v1/L1TF attacksMarios Pomonis2020-02-141-4/+10
* KVM: x86: Protect DR-based index computations from Spectre-v1/L1TF attacksMarios Pomonis2020-02-141-2/+7