summaryrefslogtreecommitdiff
path: root/arch/x86/kvm (follow)
Commit message (Expand)AuthorAge
* UPSTREAM: Make anon_inodes unconditionalDavid Howells2022-10-28
* KVM: x86: Fix misplaced backport of "work around leak of uninitialized stack ...Guillaume Bertholon2022-02-03
* KVM: x86: Update vCPU's hv_clock before back to guest when tsc_offset is adju...Zelin Deng2021-09-22
* KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)Maxim Levitsky2021-08-26
* KVM: X86: Disable hardware breakpoints unconditionally before kvm_x86->run()Lai Jiangshan2021-07-20
* KVM: x86: Use guest MAXPHYADDR from CPUID.0x8000_0008 iff TDP is enabledSean Christopherson2021-07-20
* KVM: SVM: Truncate GPR value for DR and CR accesses in !64-bit modeSean Christopherson2021-06-10
* KVM: x86: Cancel pvclock_gtod_work on module removalThomas Gleixner2021-05-22
* KVM: x86/pmu: Fix HW_REF_CPU_CYCLES event pseudo-encoding in intel_arch_events[]Like Xu2021-02-03
* KVM: x86: clflushopt should be treated as a no-op by emulationDavid Edmondson2020-11-22
* KVM: x86: emulating RDPID failure shall return #UD rather than #GPRobert Hoo2020-10-29
* KVM: Remove CREATE_IRQCHIP/SET_PIT2 raceSteve Rutherford2020-10-01
* KVM: VMX: Don't freeze guest when event delivery causes an APIC-access exitWanpeng Li2020-09-23
* KVM: x86: bit 8 of non-leaf PDPEs is not reservedPaolo Bonzini2020-07-22
* KVM: X86: Fix MSR range of APIC registers in X2APIC modeXiaoyao Li2020-06-29
* KVM: nVMX: Consult only the "basic" exit reason when routing nested exitSean Christopherson2020-06-20
* KVM: nSVM: leave ASID aside in copy_vmcb_control_areaPaolo Bonzini2020-06-20
* KVM: x86: Fix off-by-one error in kvm_vcpu_ioctl_x86_setup_mceJim Mattson2020-05-20
* KVM: VMX: Enable machine check support for 32bit targetsUros Bizjak2020-05-02
* kvm: x86: Host feature SSBD doesn't imply guest feature SPEC_CTRL_SSBDJim Mattson2020-04-24
* KVM: x86: Allocate new rmap and large page tracking when moving memslotSean Christopherson2020-04-24
* KVM: VMX: Do not allow reexecute_instruction() when skipping MMIO instrSean Christopherson2020-04-02
* KVM: x86: clear stale x86_emulate_ctxt->intercept valueVitaly Kuznetsov2020-03-20
* KVM: apic: avoid calculating pending eoi from an uninitialized valMiaohe Lin2020-02-28
* KVM: nVMX: Check IO instruction VM-exit conditionsOliver Upton2020-02-28
* KVM: nVMX: Refactor IO bitmap checks into helper functionOliver Upton2020-02-28
* KVM: nVMX: Don't emulate instructions in guest modePaolo Bonzini2020-02-28
* Revert "KVM: VMX: Add non-canonical check on writes to RTIT address MSRs"Sasha Levin2020-02-28
* KVM: x86: emulate RDPIDPaolo Bonzini2020-02-28
* KVM: nVMX: vmread should not set rflags to specify success in case of #PFMiaohe Lin2020-02-14
* KVM: VMX: Add non-canonical check on writes to RTIT address MSRsSean Christopherson2020-02-14
* KVM: x86/mmu: Apply max PA check for MMIO sptes to 32-bit KVMSean Christopherson2020-02-14
* KVM: x86: Protect kvm_lapic_reg_write() from Spectre-v1/L1TF attacksMarios Pomonis2020-02-14
* KVM: x86: Protect pmu_intel.c from Spectre-v1/L1TF attacksMarios Pomonis2020-02-14
* KVM: x86: Refactor picdev_write() to prevent Spectre-v1/L1TF attacksMarios Pomonis2020-02-14
* KVM: x86: drop picdev_in_range()David Hildenbrand2020-02-14
* KVM: x86: Free wbinvd_dirty_mask if vCPU creation failsSean Christopherson2020-02-14
* KVM: x86: Protect MSR-based index computations in fixed_msr_to_seg_unit() fro...Marios Pomonis2020-02-14
* KVM: x86: Protect x86_decode_insn from Spectre-v1/L1TF attacksMarios Pomonis2020-02-14
* KVM: x86: Protect MSR-based index computations from Spectre-v1/L1TF attacks i...Marios Pomonis2020-02-14
* KVM: x86: Protect ioapic_read_indirect() from Spectre-v1/L1TF attacksMarios Pomonis2020-02-14
* KVM: x86: Protect MSR-based index computations in pmu.h from Spectre-v1/L1TF ...Marios Pomonis2020-02-14
* KVM: x86: Protect ioapic_write_indirect() from Spectre-v1/L1TF attacksMarios Pomonis2020-02-14
* KVM: x86: Protect kvm_hv_msr_[get|set]_crash_data() from Spectre-v1/L1TF attacksMarios Pomonis2020-02-14
* KVM: x86: Protect DR-based index computations from Spectre-v1/L1TF attacksMarios Pomonis2020-02-14
* KVM: x86: Refactor prefix decoding to prevent Spectre-v1/L1TF attacksMarios Pomonis2020-02-14
* KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)Paolo Bonzini2019-12-21
* KVM: x86: fix presentation of TSX feature in ARCH_CAPABILITIESPaolo Bonzini2019-12-21
* KVM: x86: do not modify masked bits of shared MSRsPaolo Bonzini2019-12-21
* KVM/x86: Fix invvpid and invept register operand size in 64-bit modeUros Bizjak2019-11-28