diff options
| author | 2022-04-02 12:09:02 -0700 | |
|---|---|---|
| committer | 2022-04-02 12:09:02 -0700 | |
| commit | 38904911e86495d4690f8d805720b90e65426c71 (patch) | |
| tree | 6a162530ad117c636fc1e144ee223099b85eefd4 /lib/memory-notifier-error-inject.c | |
| parent | Merge tag 'for-5.18/drivers-2022-04-02' of git://git.kernel.dk/linux-block (diff) | |
| parent | KVM: x86: fix sending PV IPI (diff) | |
| download | linux-dev-38904911e86495d4690f8d805720b90e65426c71.tar.xz linux-dev-38904911e86495d4690f8d805720b90e65426c71.zip | |
Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvm
Pull kvm fixes from Paolo Bonzini:
 - Only do MSR filtering for MSRs accessed by rdmsr/wrmsr
 - Documentation improvements
 - Prevent module exit until all VMs are freed
 - PMU Virtualization fixes
 - Fix for kvm_irq_delivery_to_apic_fast() NULL-pointer dereferences
 - Other miscellaneous bugfixes
* tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvm: (42 commits)
  KVM: x86: fix sending PV IPI
  KVM: x86/mmu: do compare-and-exchange of gPTE via the user address
  KVM: x86: Remove redundant vm_entry_controls_clearbit() call
  KVM: x86: cleanup enter_rmode()
  KVM: x86: SVM: fix tsc scaling when the host doesn't support it
  kvm: x86: SVM: remove unused defines
  KVM: x86: SVM: move tsc ratio definitions to svm.h
  KVM: x86: SVM: fix avic spec based definitions again
  KVM: MIPS: remove reference to trap&emulate virtualization
  KVM: x86: document limitations of MSR filtering
  KVM: x86: Only do MSR filtering when access MSR by rdmsr/wrmsr
  KVM: x86/emulator: Emulate RDPID only if it is enabled in guest
  KVM: x86/pmu: Fix and isolate TSX-specific performance event logic
  KVM: x86: mmu: trace kvm_mmu_set_spte after the new SPTE was set
  KVM: x86/svm: Clear reserved bits written to PerfEvtSeln MSRs
  KVM: x86: Trace all APICv inhibit changes and capture overall status
  KVM: x86: Add wrappers for setting/clearing APICv inhibits
  KVM: x86: Make APICv inhibit reasons an enum and cleanup naming
  KVM: X86: Handle implicit supervisor access with SMAP
  KVM: X86: Rename variable smap to not_smap in permission_fault()
  ...
Diffstat (limited to 'lib/memory-notifier-error-inject.c')
0 files changed, 0 insertions, 0 deletions
