diff options
| author | 2021-07-15 11:56:07 -0700 | |
|---|---|---|
| committer | 2021-07-15 11:56:07 -0700 | |
| commit | 405386b02157ea1ee49ecb6917c2397985bb2a39 (patch) | |
| tree | 88f25e1eb62298fb8a4afd556f66adeaa013d218 /mm/page_alloc.c | |
| parent | Merge tag 'iommu-fixes-v5.14-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/joro/iommu (diff) | |
| parent | KVM: selftests: smm_test: Test SMM enter from L2 (diff) | |
| download | linux-dev-405386b02157ea1ee49ecb6917c2397985bb2a39.tar.xz linux-dev-405386b02157ea1ee49ecb6917c2397985bb2a39.zip | |
Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvm
Pull kvm fixes from Paolo Bonzini:
 - Allow again loading KVM on 32-bit non-PAE builds
 - Fixes for host SMIs on AMD
 - Fixes for guest SMIs on AMD
 - Fixes for selftests on s390 and ARM
 - Fix memory leak
 - Enforce no-instrumentation area on vmentry when hardware breakpoints
   are in use.
* tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvm: (25 commits)
  KVM: selftests: smm_test: Test SMM enter from L2
  KVM: nSVM: Restore nested control upon leaving SMM
  KVM: nSVM: Fix L1 state corruption upon return from SMM
  KVM: nSVM: Introduce svm_copy_vmrun_state()
  KVM: nSVM: Check that VM_HSAVE_PA MSR was set before VMRUN
  KVM: nSVM: Check the value written to MSR_VM_HSAVE_PA
  KVM: SVM: Fix sev_pin_memory() error checks in SEV migration utilities
  KVM: SVM: Return -EFAULT if copy_to_user() for SEV mig packet header fails
  KVM: SVM: add module param to control the #SMI interception
  KVM: SVM: remove INIT intercept handler
  KVM: SVM: #SMI interception must not skip the instruction
  KVM: VMX: Remove vmx_msr_index from vmx.h
  KVM: X86: Disable hardware breakpoints unconditionally before kvm_x86->run()
  KVM: selftests: Address extra memslot parameters in vm_vaddr_alloc
  kvm: debugfs: fix memory leak in kvm_create_vm_debugfs
  KVM: x86/pmu: Clear anythread deprecated bit when 0xa leaf is unsupported on the SVM
  KVM: mmio: Fix use-after-free Read in kvm_vm_ioctl_unregister_coalesced_mmio
  KVM: SVM: Revert clearing of C-bit on GPA in #NPF handler
  KVM: x86/mmu: Do not apply HPA (memory encryption) mask to GPAs
  KVM: x86: Use kernel's x86_phys_bits to handle reduced MAXPHYADDR
  ...
Diffstat (limited to 'mm/page_alloc.c')
0 files changed, 0 insertions, 0 deletions
