summaryrefslogtreecommitdiffstats
path: root/arch/m68knommu/lib/muldi3.c
diff options
context:
space:
mode:
authorLinus Torvalds <torvalds@linux-foundation.org>2024-12-22 21:16:41 +0100
committerLinus Torvalds <torvalds@linux-foundation.org>2024-12-22 21:16:41 +0100
commitb1fdbe77be6d31d78ecc2a82ea7167773293fed0 (patch)
tree1f1f9bd07ff6315808d44e1821f8e025587cb652 /arch/m68knommu/lib/muldi3.c
parentMerge tag 'devicetree-fixes-for-6.13-1' of git://git.kernel.org/pub/scm/linux... (diff)
parentMerge tag 'kvm-x86-fixes-6.13-rcN' of https://github.com/kvm-x86/linux into HEAD (diff)
downloadlinux-b1fdbe77be6d31d78ecc2a82ea7167773293fed0.tar.xz
linux-b1fdbe77be6d31d78ecc2a82ea7167773293fed0.zip
Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvm
Pull KVM x86 fixes from Paolo Bonzini: - Disable AVIC on SNP-enabled systems that don't allow writes to the virtual APIC page, as such hosts will hit unexpected RMP #PFs in the host when running VMs of any flavor. - Fix a WARN in the hypercall completion path due to KVM trying to determine if a guest with protected register state is in 64-bit mode (KVM's ABI is to assume such guests only make hypercalls in 64-bit mode). - Allow the guest to write to supported bits in MSR_AMD64_DE_CFG to fix a regression with Windows guests, and because KVM's read-only behavior appears to be entirely made up. - Treat TDP MMU faults as spurious if the faulting access is allowed given the existing SPTE. This fixes a benign WARN (other than the WARN itself) due to unexpectedly replacing a writable SPTE with a read-only SPTE. - Emit a warning when KVM is configured with ignore_msrs=1 and also to hide the MSRs that the guest is looking for from the kernel logs. ignore_msrs can trick guests into assuming that certain processor features are present, and this in turn leads to bogus bug reports. * tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvm: KVM: x86: let it be known that ignore_msrs is a bad idea KVM: VMX: don't include '<linux/find.h>' directly KVM: x86/mmu: Treat TDP MMU faults as spurious if access is already allowed KVM: SVM: Allow guest writes to set MSR_AMD64_DE_CFG bits KVM: x86: Play nice with protected guests in complete_hypercall_exit() KVM: SVM: Disable AVIC on SNP-enabled system without HvInUseWrAllowed feature
Diffstat (limited to 'arch/m68knommu/lib/muldi3.c')
0 files changed, 0 insertions, 0 deletions