summaryrefslogtreecommitdiffstats
path: root/arch/x86
Commit message (Expand)AuthorAgeFilesLines
* kvm: move KVM_CAP_NR_MEMSLOTS to common codePaolo Bonzini2019-04-161-3/+0
* KVM: x86: Inject #GP if guest attempts to set unsupported EFER bitsSean Christopherson2019-04-161-0/+7
* KVM: x86: Skip EFER vs. guest CPUID checks for host-initiated writesSean Christopherson2019-04-161-13/+24
* KVM: nVMX: Return -EINVAL when signaling failure in VM-Entry helpersSean Christopherson2019-04-161-12/+12
* KVM: nVMX: Return -EINVAL when signaling failure in pre-VM-Entry helpersPaolo Bonzini2019-04-161-21/+7
* KVM: nVMX: Rename and split top-level consistency checks to match SDMSean Christopherson2019-04-161-14/+25
* KVM: nVMX: Move guest non-reg state checks to VM-Exit pathSean Christopherson2019-04-161-15/+15
* kvm: nVMX: Check "load IA32_PAT" VM-entry control on vmentryKrish Sadhukhan2019-04-161-0/+4
* kvm: nVMX: Check "load IA32_PAT" VM-exit control on vmentryKrish Sadhukhan2019-04-161-0/+4
* KVM: x86: optimize check for valid PAT valuePaolo Bonzini2019-04-163-10/+12
* KVM: x86: clear VM_EXIT_SAVE_IA32_PATPaolo Bonzini2019-04-161-1/+0
* KVM: vmx: print more APICv fields in dump_vmcsPaolo Bonzini2019-04-161-2/+10
* KVM: x86: avoid misreporting level-triggered irqs as edge-triggered in tracingVitaly Kuznetsov2019-04-161-2/+2
* KVM: fix spectrev1 gadgetsPaolo Bonzini2019-04-161-1/+3
* KVM: x86: fix warning Using plain integer as NULL pointerHariprasad Kelam2019-04-161-1/+1
* KVM: x86: Always use 32-bit SMRAM save state for 32-bit kernelsSean Christopherson2019-04-162-4/+16
* KVM: x86: Don't clear EFER during SMM transitions for 32-bit vCPUSean Christopherson2019-04-161-10/+11
* KVM: x86: clear SMM flags before loading state while leaving SMMSean Christopherson2019-04-163-16/+10
* KVM: x86: Open code kvm_set_hflagsSean Christopherson2019-04-163-18/+19
* KVM: x86: Load SMRAM in a single shot when leaving SMMSean Christopherson2019-04-166-92/+92
* KVM: nVMX: Expose RDPMC-exiting only when guest supports PMULiran Alon2019-04-161-0/+25
* KVM: x86: Raise #GP when guest vCPU do not support PMULiran Alon2019-04-161-0/+4
* x86/kvm: move kvm_load/put_guest_xcr0 into atomic contextWANG Chao2019-04-164-6/+12
* KVM: x86: svm: make sure NMI is injected after nmi_singlestepVitaly Kuznetsov2019-04-161-0/+3
* svm/avic: Fix invalidate logical APIC id entrySuthikulpanit, Suravee2019-04-161-1/+2
* Revert "svm: Fix AVIC incomplete IPI emulation"Suthikulpanit, Suravee2019-04-161-4/+15
* kvm: mmu: Fix overflow on kvm mmu page limit calculationBen Gardon2019-04-164-16/+15
* KVM: nVMX: always use early vmcs check when EPT is disabledPaolo Bonzini2019-04-162-2/+21
* KVM: nVMX: allow tests to use bad virtual-APIC page addressPaolo Bonzini2019-04-163-10/+19
* KVM: x86/mmu: Fix an inverted list_empty() check when zapping sptesSean Christopherson2019-04-151-1/+1
* Merge tag 'for-linus-5.1b-rc4-tag' of git://git.kernel.org/pub/scm/linux/kern...Linus Torvalds2019-04-071-0/+3
|\
| * xen: Prevent buffer overflow in privcmd ioctlDan Carpenter2019-04-051-0/+3
* | Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds2019-04-052-37/+59
|\ \
| * | KVM: x86: nVMX: fix x2APIC VTPR read interceptMarc Orr2019-04-051-1/+1
| * | KVM: x86: nVMX: close leak of L0's x2APIC MSRs (CVE-2019-3887)Marc Orr2019-04-051-28/+44
| * | KVM: SVM: prevent DBG_DECRYPT and DBG_ENCRYPT overflowDavid Rientjes2019-04-051-3/+9
| * | kvm: svm: fix potential get_num_contig_pages overflowDavid Rientjes2019-04-051-5/+5
* | | syscalls: Remove start and number from syscall_set_arguments() argsSteven Rostedt (VMware)2019-04-051-53/+16
* | | syscalls: Remove start and number from syscall_get_arguments() argsSteven Rostedt (Red Hat)2019-04-051-56/+17
|/ /
* | Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds2019-03-319-55/+138
|\ \
| * | KVM: x86: update %rip after emulating IOSean Christopherson2019-03-282-10/+27
| * | x86/kvm/hyper-v: avoid spurious pending stimer on vCPU initVitaly Kuznetsov2019-03-281-2/+7
| * | kvm/x86: Move MSR_IA32_ARCH_CAPABILITIES to array emulated_msrsXiaoyao Li2019-03-281-1/+2
| * | KVM: x86: Emulate MSR_IA32_ARCH_CAPABILITIES on AMD hostsSean Christopherson2019-03-284-14/+13
| * | kvm: mmu: Used range based flushing in slot_handle_level_rangeBen Gardon2019-03-281-2/+5
| * | KVM: x86: remove check on nr_mmu_pages in kvm_arch_commit_memory_region()Wei Yang2019-03-283-8/+4
| * | kvm: nVMX: Add a vmentry check for HOST_SYSENTER_ESP and HOST_SYSENTER_EIP fi...Krish Sadhukhan2019-03-281-0/+5
| * | KVM: SVM: Workaround errata#1096 (insn_len maybe zero on SMAP violation)Singh, Brijesh2019-03-284-3/+45
| * | KVM: x86: fix handling of role.cr4_pae and rename it to 'gpte_size'Sean Christopherson2019-03-283-18/+28
| * | KVM: nVMX: Do not inherit quadrant and invalid for the root shadow EPTSean Christopherson2019-03-281-4/+9