android_kernel_xiaomi_sm7250/arch/x86/kvm
Greg Kroah-Hartman 3925fe0d2b This is the 4.19.266 stable release
-----BEGIN PGP SIGNATURE-----
 
 iQIzBAABCAAdFiEEZH8oZUiU471FcZm+ONu9yGCSaT4FAmN9w4cACgkQONu9yGCS
 aT7tehAAjYiifqF6t6hdfYK+hzW91JMl8Fqc7Xmt7OnV/j5S6GfI239viCouQIpQ
 HlrynsxGzx4C6x3+R/O1EmXwbf/T6YT67GG4ApF7S2lXhIGiEqbsdBQg3Q4dxdLO
 xABQEaevdPZcVpsFm/m53kHHas1JBopB/6NXLLZDx/CLOtdltP7rpZ9+AbI6mJR6
 REChPegPjcl6V8MjeAmN5TbwhsNYcG50qAT/H+7tljnEF7qR36Kp+zj/JvetQwyj
 w9JVQYRder/J/EM1FhzF97grI73CY9Xw+y7JheL1nmZDFD0RTHzuN6sExEV/C5WQ
 O2e4Dv/764c991wAluUtO2ohb/Zoi/78nn93fF4R78Xkksa2oVVDcrC7s6o2aExl
 mwtXkO8qNDICbnunU3QnH6dnFOZOJB9FvulpkHZ3QFY8DflB+tFtdFnq20GCH7LL
 pTV9eQWqihSVh0UTOK3tushibdTaYoqOPZ/ZQXw00VZ+M4T8rwbbz/z91NFrcyG9
 jGzI699v4dWvcFnkw23/u7JmzgnRgPCCt5DrcdiXBnHgoAK9HIdneE6aoU9WiTNe
 8ZuTQsLG0nexDgeNGSIX+j2tDejP6ffPxiacR6NbR4+vnwqSeScjvgCwv8FuiJaz
 C9YXaAXDJ5QNQQwTGdAg8dbW/24rRHF+9g0E3WssiBxvRey/GA0=
 =SDTk
 -----END PGP SIGNATURE-----

Merge 4.19.266 into android-4.19-stable

Changes in 4.19.266
	Revert "x86/speculation: Add RSB VM Exit protections"
	Revert "x86/cpu: Add a steppings field to struct x86_cpu_id"
	x86/cpufeature: Add facility to check for min microcode revisions
	x86/cpufeature: Fix various quality problems in the <asm/cpu_device_hd.h> header
	x86/devicetable: Move x86 specific macro out of generic code
	x86/cpu: Add consistent CPU match macros
	x86/cpu: Add a steppings field to struct x86_cpu_id
	x86/cpufeatures: Move RETPOLINE flags to word 11
	x86/bugs: Report AMD retbleed vulnerability
	x86/bugs: Add AMD retbleed= boot parameter
	x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value
	x86/entry: Remove skip_r11rcx
	x86/entry: Add kernel IBRS implementation
	x86/bugs: Optimize SPEC_CTRL MSR writes
	x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS
	x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation()
	x86/bugs: Report Intel retbleed vulnerability
	intel_idle: Disable IBRS during long idle
	x86/speculation: Change FILL_RETURN_BUFFER to work with objtool
	x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n
	x86/speculation: Fix firmware entry SPEC_CTRL handling
	x86/speculation: Fix SPEC_CTRL write on SMT state change
	x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit
	x86/speculation: Remove x86_spec_ctrl_mask
	KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS
	KVM: VMX: Fix IBRS handling after vmexit
	x86/speculation: Fill RSB on vmexit for IBRS
	x86/common: Stamp out the stepping madness
	x86/cpu/amd: Enumerate BTC_NO
	x86/bugs: Add Cannon lake to RETBleed affected CPU list
	x86/speculation: Disable RRSBA behavior
	x86/speculation: Use DECLARE_PER_CPU for x86_spec_ctrl_current
	x86/bugs: Warn when "ibrs" mitigation is selected on Enhanced IBRS parts
	x86/speculation: Add RSB VM Exit protections
	Linux 4.19.266

Change-Id: Ia1f5cd5ad1ff8635df2df23afc1c87db8de97d86
Signed-off-by: Greg Kroah-Hartman <gregkh@google.com>
2022-11-23 07:23:44 +00:00
..
cpuid.c KVM: x86: Mask off reserved bits in CPUID.80000008H 2022-11-10 17:46:56 +01:00
cpuid.h KVM: x86: reinstate vendor-agnostic check on SPEC_CTRL cpuid bits 2021-01-06 14:44:59 +01:00
debugfs.c
emulate.c KVM: x86: emulator: update the emulation mode after CR0 write 2022-11-10 17:46:56 +01:00
hyperv.c KVM: x86: Check lapic_in_kernel() before attempting to set a SynIC irq 2022-08-25 11:15:31 +02:00
hyperv.h KVM: hyperv: define VP assist page helpers 2019-09-16 08:21:50 +02:00
i8254.c
i8254.h
i8259.c KVM: x86: Refactor picdev_write() to prevent Spectre-v1/L1TF attacks 2020-02-11 04:34:09 -08:00
ioapic.c Revert "x86/kvm: fix vcpu-id indexed array sizes" 2021-11-12 14:40:49 +01:00
ioapic.h Revert "x86/kvm: fix vcpu-id indexed array sizes" 2021-11-12 14:40:49 +01:00
irq_comm.c KVM: x86: don't notify userspace IOAPIC on edge-triggered interrupt EOI 2020-02-28 16:38:51 +01:00
irq.c KVM: x86: Fix split-irqchip vs interrupt injection window request 2020-12-02 08:48:07 +01:00
irq.h kvm: Check irqchip mode before assign irqfd 2019-09-16 08:22:15 +02:00
Kconfig UPSTREAM: Make anon_inodes unconditional 2019-08-12 13:36:37 -04:00
kvm_cache_regs.h KVM: x86: Mark CR4.TSD as being possibly owned by the guest 2020-07-16 08:17:26 +02:00
lapic.c KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast() 2022-08-25 11:15:31 +02:00
lapic.h KVM: hyperv: define VP assist page helpers 2019-09-16 08:21:50 +02:00
Makefile
mmu_audit.c
mmu.c KVM: x86/mmu: Treat NX as used (not reserved) for all !TDP shadow MMUs 2021-09-03 09:58:02 +02:00
mmu.h KVM: x86: fix shift out of bounds reported by UBSAN 2021-01-12 20:10:24 +01:00
mmutrace.h KVM: x86: fix incorrect comparison in trace event 2020-10-01 13:14:34 +02:00
mtrr.c KVM: x86: Protect MSR-based index computations in fixed_msr_to_seg_unit() from Spectre-v1/L1TF attacks 2020-02-11 04:34:10 -08:00
page_track.c
paging_tmpl.h KVM: X86: MMU: Use the correct inherited permissions to get shadow page 2021-08-15 13:05:04 +02:00
pmu_amd.c KVM: x86/svm: Clear reserved bits written to PerfEvtSeln MSRs 2022-04-15 14:15:00 +02:00
pmu_intel.c KVM: x86/pmu: Fix HW_REF_CPU_CYCLES event pseudo-encoding in intel_arch_events[] 2021-02-03 23:23:24 +01:00
pmu.c KVM: x86/pmu: Use AMD64_RAW_EVENT_MASK for PERF_TYPE_RAW 2022-02-23 11:58:41 +01:00
pmu.h KVM: x86: Protect MSR-based index computations in pmu.h from Spectre-v1/L1TF attacks 2020-02-11 04:34:10 -08:00
svm.c x86/devicetable: Move x86 specific macro out of generic code 2022-11-23 07:53:43 +01:00
trace.h
tss.h
vmx_evmcs.h
vmx_shadow_fields.h
vmx.c x86/speculation: Add RSB VM Exit protections 2022-11-23 07:53:47 +01:00
x86.c x86/cpu: Add a steppings field to struct x86_cpu_id 2022-11-23 07:53:44 +01:00
x86.h KVM: x86: Use gpa_t for cr2/gpa to fix TDP support on 32-bit KVM 2020-02-11 04:34:17 -08:00