summaryrefslogtreecommitdiffstats
Commit message (Expand)AuthorAgeFilesLines
* KVM: x86: xen_hvm_config: cleanup return valuesMaxim Levitsky2020-10-211-14/+9
* kvm x86/mmu: Make struct kernel_param_ops definitions constJoe Perches2020-10-211-2/+2
* KVM: x86: bump KVM_MAX_CPUID_ENTRIESVitaly Kuznetsov2020-10-211-1/+1
* KVM: x86: allocate vcpu->arch.cpuid_entries dynamicallyVitaly Kuznetsov2020-10-213-39/+53
* KVM: x86: disconnect kvm_check_cpuid() from vcpu->arch.cpuid_entriesVitaly Kuznetsov2020-10-211-15/+23
* Documentation: kvm: fix some typos in cpuid.rstOliver Upton2020-10-211-44/+44
* kvm: x86: only provide PV features if enabled in guest's CPUIDOliver Upton2020-10-216-5/+106
* kvm: x86: set wall_clock in kvm_write_wall_clock()Oliver Upton2020-10-211-1/+2
* kvm: x86: encapsulate wrmsr(MSR_KVM_SYSTEM_TIME) emulation in helper fnOliver Upton2020-10-211-26/+32
* x86/kvm: Update the comment about asynchronous page fault in exc_page_fault()Vitaly Kuznetsov2020-10-211-5/+8
* x86/kvm: hide KVM options from menuconfig when KVM is not compiledMatteo Croce2020-10-211-0/+1
* Documentation: kvm: fix a typoLi Qiang2020-10-211-1/+1
* KVM: VMX: Forbid userspace MSR filters for x2APICPaolo Bonzini2020-10-212-9/+18
* KVM: VMX: Ignore userspace MSR filters for x2APICSean Christopherson2020-10-213-29/+47
* Merge tag 'kvmarm-5.10' of git://git.kernel.org/pub/scm/linux/kernel/git/kvma...Paolo Bonzini2020-10-2064-3468/+3505
|\
| *-. Merge branches 'kvm-arm64/pt-new' and 'kvm-arm64/pmu-5.9' into kvmarm-master/...Marc Zyngier2020-10-023-21/+30
| |\ \
| | | * KVM: arm64: Fix some documentation build warningsMauro Carvalho Chehab2020-10-021-13/+13
| | * | KVM: arm64: Ensure user_mem_abort() return value is initialisedWill Deacon2020-10-021-1/+1
| | * | KVM: arm64: Pass level hint to TLBI during stage-2 permission faultWill Deacon2020-10-021-7/+16
| * | | Merge branch 'kvm-arm64/hyp-pcpu' into kvmarm-master/nextMarc Zyngier2020-09-3043-1197/+1262
| |\ \ \
| | * \ \ Merge remote-tracking branch 'arm64/for-next/ghostbusters' into kvm-arm64/hyp...Marc Zyngier2020-09-3032-1046/+981
| | |\ \ \
| | | * | | arm64: Add support for PR_SPEC_DISABLE_NOEXEC prctl() optionWill Deacon2020-09-292-4/+40
| | | * | | arm64: Pull in task_stack_page() to Spectre-v4 mitigation codeWill Deacon2020-09-291-0/+1
| | | * | | KVM: arm64: Allow patching EL2 vectors even with KASLR is not enabledWill Deacon2020-09-296-58/+36
| | | * | | arm64: Get rid of arm64_ssbd_stateMarc Zyngier2020-09-292-16/+0
| | | * | | KVM: arm64: Convert ARCH_WORKAROUND_2 to arm64_get_spectre_v4_state()Marc Zyngier2020-09-293-14/+30
| | | * | | KVM: arm64: Get rid of kvm_arm_have_ssbd()Marc Zyngier2020-09-291-23/+0
| | | * | | KVM: arm64: Simplify handling of ARCH_WORKAROUND_2Marc Zyngier2020-09-2914-163/+41
| | | * | | arm64: Rewrite Spectre-v4 mitigation codeWill Deacon2020-09-299-352/+401
| | | * | | arm64: Move SSBD prctl() handler alongside other spectre mitigation codeWill Deacon2020-09-293-130/+119
| | | * | | arm64: Rename ARM64_SSBD to ARM64_SPECTRE_V4Will Deacon2020-09-293-3/+3
| | | * | | arm64: Treat SSBS as a non-strict system featureWill Deacon2020-09-291-3/+3
| | | * | | arm64: Group start_thread() functions togetherWill Deacon2020-09-291-12/+12
| | | * | | KVM: arm64: Set CSV2 for guests on hardware unaffected by Spectre-v2Marc Zyngier2020-09-291-0/+3
| | | * | | arm64: Rewrite Spectre-v2 mitigation codeWill Deacon2020-09-298-264/+327
| | | * | | arm64: Introduce separate file for spectre mitigations and reportingWill Deacon2020-09-293-7/+33
| | | * | | arm64: Rename ARM64_HARDEN_BRANCH_PREDICTOR to ARM64_SPECTRE_V2Will Deacon2020-09-294-17/+16
| | | * | | KVM: arm64: Simplify install_bp_hardening_cb()Will Deacon2020-09-291-20/+7
| | | * | | KVM: arm64: Replace CONFIG_KVM_INDIRECT_VECTORS with CONFIG_RANDOMIZE_BASEWill Deacon2020-09-296-9/+6
| | | * | | arm64: Remove Spectre-related CONFIG_* optionsWill Deacon2020-09-2911-80/+4
| | | * | | arm64: Run ARCH_WORKAROUND_2 enabling code on all CPUsMarc Zyngier2020-09-291-0/+7
| | | * | | arm64: Run ARCH_WORKAROUND_1 enabling code on all CPUsMarc Zyngier2020-09-211-0/+8
| | | * | | arm64: Make use of ARCH_WORKAROUND_1 even when KVM is not enabledMarc Zyngier2020-09-211-2/+5
| | * | | | kvm: arm64: Remove unnecessary hyp mappingsDavid Brazdil2020-09-302-36/+0
| | * | | | kvm: arm64: Set up hyp percpu data for nVHEDavid Brazdil2020-09-305-6/+87
| | * | | | kvm: arm64: Create separate instances of kvm_host_data for VHE/nVHEDavid Brazdil2020-09-306-9/+13
| | * | | | kvm: arm64: Duplicate arm64_ssbd_callback_required for nVHE hypDavid Brazdil2020-09-304-2/+19
| | * | | | kvm: arm64: Add helpers for accessing nVHE hyp per-cpu varsDavid Brazdil2020-09-301-2/+23
| | * | | | kvm: arm64: Remove hyp_adr/ldr_this_cpuDavid Brazdil2020-09-303-24/+21
| | * | | | kvm: arm64: Remove __hyp_this_cpu_readDavid Brazdil2020-09-307-32/+36