summaryrefslogtreecommitdiff
path: root/arch/x86/kvm
AgeCommit message (Expand)Author
2019-12-17KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)Paolo Bonzini
2019-12-17KVM: x86: fix presentation of TSX feature in ARCH_CAPABILITIESPaolo Bonzini
2019-12-17KVM: x86: do not modify masked bits of shared MSRsPaolo Bonzini
2019-12-05kvm: vmx: Set IA32_TSC_AUX for legacy mode guestsJim Mattson
2019-12-05Revert "KVM: nVMX: reset cache/shadows when switching loaded VMCS"Greg Kroah-Hartman
2019-12-01KVM: MMU: Do not treat ZONE_DEVICE pages as being reservedSean Christopherson
2019-12-01KVM/x86: Fix invvpid and invept register operand size in 64-bit modeUros Bizjak
2019-12-01KVM: nVMX: reset cache/shadows when switching loaded VMCSSean Christopherson
2019-11-20KVM: x86: introduce is_pae_pagingPaolo Bonzini
2019-11-20kvm: mmu: Don't read PDPTEs when paging is not enabledJunaid Shahid
2019-11-12kvm: x86: mmu: Recovery of shattered NX large pagesJunaid Shahid
2019-11-12kvm: mmu: ITLB_MULTIHIT mitigationPaolo Bonzini
2019-11-12KVM: vmx, svm: always run with EFER.NXE=1 when shadow paging is activePaolo Bonzini
2019-11-12KVM: x86: add tracepoints around __direct_map and FNAME(fetch)Paolo Bonzini
2019-11-12KVM: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ONPaolo Bonzini
2019-11-12KVM: x86: remove now unneeded hugepage gfn adjustmentPaolo Bonzini
2019-11-12KVM: x86: make FNAME(fetch) and __direct_map more similarPaolo Bonzini
2019-11-12kvm: mmu: Do not release the page inside mmu_set_spte()Junaid Shahid
2019-11-12kvm: Convert kvm_lock to a mutexJunaid Shahid
2019-11-12kvm: x86, powerpc: do not allow clearing largepages debugfs entryPaolo Bonzini
2019-11-12kvm/x86: Export MDS_NO=0 to guests when TSX is enabledPawan Gupta
2019-11-12KVM: x86: use Intel speculation bugs and features as derived in generic x86 codePaolo Bonzini
2019-10-29kvm: vmx: Basic APIC virtualization controls have three settingsJim Mattson
2019-10-29kvm: apic: Flush TLB after APIC mode/address change if VPIDs are in useJunaid Shahid
2019-10-29kvm: vmx: Introduce lapic_mode enumerationJim Mattson
2019-10-29KVM: X86: introduce invalidate_gpa argument to tlb flushWanpeng Li
2019-10-11KVM: nVMX: handle page fault in vmread fixJack Wang
2019-10-05KVM: x86: Manually calculate reserved bits when loading PDPTRSSean Christopherson
2019-10-05KVM: x86: set ctxt->have_exception in x86_decode_insn()Jan Dakinevich
2019-10-05KVM: x86: always stop emulation on page faultJan Dakinevich
2019-09-19KVM: nVMX: handle page fault in vmreadPaolo Bonzini
2019-09-19KVM: x86: work around leak of uninitialized stack contentsFuqian Huang
2019-09-06KVM: x86: Don't update RIP or do single-step on faulting emulationSean Christopherson
2019-09-06kvm: x86: skip populating logical dest map if apic is not sw enabledRadim Krcmar
2019-08-16KVM: Fix leak vCPU's VMCS value into other pCPUWanpeng Li
2019-08-06x86/cpufeatures: Combine word 11 and 12 into a new scattered features wordFenghua Yu
2019-08-06x86: kvm: avoid constant-conversion warningArnd Bergmann
2019-07-31KVM: nVMX: do not use dangling shadow VMCS after guest resetPaolo Bonzini
2019-07-31KVM: x86/vPMU: refine kvm_pmu err msg when event creation failedLike Xu
2019-07-10KVM: LAPIC: Fix pending interrupt in IRR blocked by software disable LAPICWanpeng Li
2019-07-10KVM: x86: degrade WARN to pr_warn_ratelimitedPaolo Bonzini
2019-06-19KVM: x86/pmu: do not mask the value that is written to fixed PMUsPaolo Bonzini
2019-06-09KVM: s390: Do not report unusabled IDs via KVM_CAP_MAX_VCPU_IDThomas Huth
2019-05-31kvm: svm/avic: fix off-by-one in checking host APIC IDSuthikulpanit, Suravee
2019-05-31KVM: x86: fix return value for reserved EFERPaolo Bonzini
2019-05-21KVM: x86: Skip EFER vs. guest CPUID checks for host-initiated writesSean Christopherson
2019-05-16KVM: x86: avoid misreporting level-triggered irqs as edge-triggered in tracingVitaly Kuznetsov
2019-05-16KVM: fix spectrev1 gadgetsPaolo Bonzini
2019-05-14Documentation: Move L1TF to separate directoryThomas Gleixner
2019-05-14x86/kvm/vmx: Add MDS protection when L1D Flush is not activeThomas Gleixner