index
:
linux
master
linux
Fast-forward packages
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
Commit message (
Expand
)
Author
Age
Files
Lines
*
KVM: x86: xen_hvm_config: cleanup return values
Maxim Levitsky
2020-10-21
1
-14
/
+9
*
kvm x86/mmu: Make struct kernel_param_ops definitions const
Joe Perches
2020-10-21
1
-2
/
+2
*
KVM: x86: bump KVM_MAX_CPUID_ENTRIES
Vitaly Kuznetsov
2020-10-21
1
-1
/
+1
*
KVM: x86: allocate vcpu->arch.cpuid_entries dynamically
Vitaly Kuznetsov
2020-10-21
3
-39
/
+53
*
KVM: x86: disconnect kvm_check_cpuid() from vcpu->arch.cpuid_entries
Vitaly Kuznetsov
2020-10-21
1
-15
/
+23
*
Documentation: kvm: fix some typos in cpuid.rst
Oliver Upton
2020-10-21
1
-44
/
+44
*
kvm: x86: only provide PV features if enabled in guest's CPUID
Oliver Upton
2020-10-21
6
-5
/
+106
*
kvm: x86: set wall_clock in kvm_write_wall_clock()
Oliver Upton
2020-10-21
1
-1
/
+2
*
kvm: x86: encapsulate wrmsr(MSR_KVM_SYSTEM_TIME) emulation in helper fn
Oliver Upton
2020-10-21
1
-26
/
+32
*
x86/kvm: Update the comment about asynchronous page fault in exc_page_fault()
Vitaly Kuznetsov
2020-10-21
1
-5
/
+8
*
x86/kvm: hide KVM options from menuconfig when KVM is not compiled
Matteo Croce
2020-10-21
1
-0
/
+1
*
Documentation: kvm: fix a typo
Li Qiang
2020-10-21
1
-1
/
+1
*
KVM: VMX: Forbid userspace MSR filters for x2APIC
Paolo Bonzini
2020-10-21
2
-9
/
+18
*
KVM: VMX: Ignore userspace MSR filters for x2APIC
Sean Christopherson
2020-10-21
3
-29
/
+47
*
Merge tag 'kvmarm-5.10' of git://git.kernel.org/pub/scm/linux/kernel/git/kvma...
Paolo Bonzini
2020-10-20
64
-3468
/
+3505
|
\
|
*
-
.
Merge branches 'kvm-arm64/pt-new' and 'kvm-arm64/pmu-5.9' into kvmarm-master/...
Marc Zyngier
2020-10-02
3
-21
/
+30
|
|
\
\
|
|
|
*
KVM: arm64: Fix some documentation build warnings
Mauro Carvalho Chehab
2020-10-02
1
-13
/
+13
|
|
*
|
KVM: arm64: Ensure user_mem_abort() return value is initialised
Will Deacon
2020-10-02
1
-1
/
+1
|
|
*
|
KVM: arm64: Pass level hint to TLBI during stage-2 permission fault
Will Deacon
2020-10-02
1
-7
/
+16
|
*
|
|
Merge branch 'kvm-arm64/hyp-pcpu' into kvmarm-master/next
Marc Zyngier
2020-09-30
43
-1197
/
+1262
|
|
\
\
\
|
|
*
\
\
Merge remote-tracking branch 'arm64/for-next/ghostbusters' into kvm-arm64/hyp...
Marc Zyngier
2020-09-30
32
-1046
/
+981
|
|
|
\
\
\
|
|
|
*
|
|
arm64: Add support for PR_SPEC_DISABLE_NOEXEC prctl() option
Will Deacon
2020-09-29
2
-4
/
+40
|
|
|
*
|
|
arm64: Pull in task_stack_page() to Spectre-v4 mitigation code
Will Deacon
2020-09-29
1
-0
/
+1
|
|
|
*
|
|
KVM: arm64: Allow patching EL2 vectors even with KASLR is not enabled
Will Deacon
2020-09-29
6
-58
/
+36
|
|
|
*
|
|
arm64: Get rid of arm64_ssbd_state
Marc Zyngier
2020-09-29
2
-16
/
+0
|
|
|
*
|
|
KVM: arm64: Convert ARCH_WORKAROUND_2 to arm64_get_spectre_v4_state()
Marc Zyngier
2020-09-29
3
-14
/
+30
|
|
|
*
|
|
KVM: arm64: Get rid of kvm_arm_have_ssbd()
Marc Zyngier
2020-09-29
1
-23
/
+0
|
|
|
*
|
|
KVM: arm64: Simplify handling of ARCH_WORKAROUND_2
Marc Zyngier
2020-09-29
14
-163
/
+41
|
|
|
*
|
|
arm64: Rewrite Spectre-v4 mitigation code
Will Deacon
2020-09-29
9
-352
/
+401
|
|
|
*
|
|
arm64: Move SSBD prctl() handler alongside other spectre mitigation code
Will Deacon
2020-09-29
3
-130
/
+119
|
|
|
*
|
|
arm64: Rename ARM64_SSBD to ARM64_SPECTRE_V4
Will Deacon
2020-09-29
3
-3
/
+3
|
|
|
*
|
|
arm64: Treat SSBS as a non-strict system feature
Will Deacon
2020-09-29
1
-3
/
+3
|
|
|
*
|
|
arm64: Group start_thread() functions together
Will Deacon
2020-09-29
1
-12
/
+12
|
|
|
*
|
|
KVM: arm64: Set CSV2 for guests on hardware unaffected by Spectre-v2
Marc Zyngier
2020-09-29
1
-0
/
+3
|
|
|
*
|
|
arm64: Rewrite Spectre-v2 mitigation code
Will Deacon
2020-09-29
8
-264
/
+327
|
|
|
*
|
|
arm64: Introduce separate file for spectre mitigations and reporting
Will Deacon
2020-09-29
3
-7
/
+33
|
|
|
*
|
|
arm64: Rename ARM64_HARDEN_BRANCH_PREDICTOR to ARM64_SPECTRE_V2
Will Deacon
2020-09-29
4
-17
/
+16
|
|
|
*
|
|
KVM: arm64: Simplify install_bp_hardening_cb()
Will Deacon
2020-09-29
1
-20
/
+7
|
|
|
*
|
|
KVM: arm64: Replace CONFIG_KVM_INDIRECT_VECTORS with CONFIG_RANDOMIZE_BASE
Will Deacon
2020-09-29
6
-9
/
+6
|
|
|
*
|
|
arm64: Remove Spectre-related CONFIG_* options
Will Deacon
2020-09-29
11
-80
/
+4
|
|
|
*
|
|
arm64: Run ARCH_WORKAROUND_2 enabling code on all CPUs
Marc Zyngier
2020-09-29
1
-0
/
+7
|
|
|
*
|
|
arm64: Run ARCH_WORKAROUND_1 enabling code on all CPUs
Marc Zyngier
2020-09-21
1
-0
/
+8
|
|
|
*
|
|
arm64: Make use of ARCH_WORKAROUND_1 even when KVM is not enabled
Marc Zyngier
2020-09-21
1
-2
/
+5
|
|
*
|
|
|
kvm: arm64: Remove unnecessary hyp mappings
David Brazdil
2020-09-30
2
-36
/
+0
|
|
*
|
|
|
kvm: arm64: Set up hyp percpu data for nVHE
David Brazdil
2020-09-30
5
-6
/
+87
|
|
*
|
|
|
kvm: arm64: Create separate instances of kvm_host_data for VHE/nVHE
David Brazdil
2020-09-30
6
-9
/
+13
|
|
*
|
|
|
kvm: arm64: Duplicate arm64_ssbd_callback_required for nVHE hyp
David Brazdil
2020-09-30
4
-2
/
+19
|
|
*
|
|
|
kvm: arm64: Add helpers for accessing nVHE hyp per-cpu vars
David Brazdil
2020-09-30
1
-2
/
+23
|
|
*
|
|
|
kvm: arm64: Remove hyp_adr/ldr_this_cpu
David Brazdil
2020-09-30
3
-24
/
+21
|
|
*
|
|
|
kvm: arm64: Remove __hyp_this_cpu_read
David Brazdil
2020-09-30
7
-32
/
+36
[next]