summaryrefslogtreecommitdiffstats
path: root/v5.16/d02c357e5bfa7dfd618b7b3015624beb71f58f1f
diff options
context:
space:
mode:
Diffstat (limited to 'v5.16/d02c357e5bfa7dfd618b7b3015624beb71f58f1f')
-rw-r--r--v5.16/d02c357e5bfa7dfd618b7b3015624beb71f58f1f20
1 files changed, 20 insertions, 0 deletions
diff --git a/v5.16/d02c357e5bfa7dfd618b7b3015624beb71f58f1f b/v5.16/d02c357e5bfa7dfd618b7b3015624beb71f58f1f
new file mode 100644
index 00000000000..da15459281a
--- /dev/null
+++ b/v5.16/d02c357e5bfa7dfd618b7b3015624beb71f58f1f
@@ -0,0 +1,20 @@
+d02c357e5bfa ("KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing")
+354c908c068e ("KVM: x86/mmu: Handle no-slot faults in kvm_faultin_pfn()")
+56c3a4e4a2d5 ("KVM: x86/mmu: Handle error PFNs in kvm_faultin_pfn()")
+ba6e3fe25543 ("KVM: x86/mmu: Grab mmu_invalidate_seq in kvm_faultin_pfn()")
+766576874b97 ("kvm: x86: Allow to respond to generic signals during slow PF")
+c8b88b332bed ("kvm: Add interruptible flag to __gfn_to_pfn_memslot()")
+20ec3ebd707c ("KVM: Rename mmu_notifier_* to mmu_invalidate_*")
+65e3b446bcce ("KVM: x86/mmu: Document the "rules" for using host_pfn_mapping_level()")
+a8ac499bb6ab ("KVM: x86/mmu: Don't require refcounted "struct page" to create huge SPTEs")
+9202aee816c8 ("KVM: x86/mmu: Rename pte_list_{destroy,remove}() to show they zap SPTEs")
+a42989e7fbb0 ("KVM: x86/mmu: Directly "destroy" PTE list when recycling rmaps")
+2ff9039a75a8 ("KVM: x86/mmu: Decouple rmap_add() and link_shadow_page() from kvm_vcpu")
+6ec6509eea39 ("KVM: x86/mmu: Pass const memslot to rmap_add()")
+5d49f08c2e08 ("KVM: x86/mmu: Shove refcounted page dependency into host_pfn_mapping_level()")
+b14b2690c50e ("KVM: Rename/refactor kvm_is_reserved_pfn() to kvm_pfn_to_refcounted_page()")
+284dc4930773 ("KVM: Take a 'struct page', not a pfn in kvm_is_zone_device_page()")
+b1624f99aa8f ("KVM: Remove kvm_vcpu_gfn_to_page() and kvm_vcpu_gpa_to_page()")
+6573a6910ce4 ("KVM: Don't WARN if kvm_pfn_to_page() encounters a "reserved" pfn")
+8e1c69149f27 ("KVM: Avoid pfn_to_page() and vice versa when releasing pages")
+a1040b0d42ac ("KVM: Don't set Accessed/Dirty bits for ZERO_PAGE")