Linux KVM
[Prev Page][Next Page]
- [PATCH v2 0/4] KVM: arm64: Live system register access fixes,
Marc Zyngier
- [PATCH] RISC-V: KVM: Write hgatp register with valid mode bits,
fangyu . yu
- [PATCH v3 0/4] LoongArch: KVM: Small enhancements about IPI and LBT,
Bibo Mao
- [PATCH v3 0/4] x86/cpu/topology: Work around the nuances of virtualization on AMD/Hygon,
K Prateek Nayak
- [RESEND PATCH v2 0/3] crypto: ccp - Add AMD Seamless Firmware Servicing (SFS) driver,
Ashish Kalra
- [PATCH v2 0/3] crypto: ccp - Add AMD Seamless Firmware Servicing (SFS) driver,
Ashish Kalra
- [PATCH] kvm/kvm-all: declare kvm_park_vcpu static and make it local to kvm-all.c,
Ani Sinha
- [PATCH 5/6] selftests: kvm: s390: fixed spelling mistake in output,
Soham Metha
- [PATCH v2 0/3] Support "generic" CPUID timing leaf as KVM guest and host,
David Woodhouse
- [PATCH v2 2/3] KVM: x86: Provide TSC frequency in "generic" timing infomation CPUID leaf,
David Woodhouse
- [PATCH v2 3/3] x86/kvm: Obtain TSC frequency from CPUID if present,
David Woodhouse
- [PATCH v2 1/3] KVM: x86: Restore caching of KVM CPUID base,
David Woodhouse
RE: [PATCH v2 4/4] KVM: Avoid synchronize_srcu() in kvm_io_bus_register_dev(),
Li,Rongqing
[PATCH v2] KVM: x86: allow CPUID 0xC000_0000 to proceed on Zhaoxin CPUs,
Ewan Hai
[PATCH RFC 0/2] KVM: TDX: MWAIT in guest,
Adrian Hunter
[BUG] vhost: perf tools build error after syncing vhost.h,
Namhyung Kim
[PATCH] vfio/pci: drop redundant conversion to bool,
Xichao Zhao
[PATCH 6.1.y 00/21] KVM: x86: Backports for 6.1.y,
Sean Christopherson
- [PATCH 6.1.y 07/21] KVM: x86: Snapshot the host's DEBUGCTL after disabling IRQs,
Sean Christopherson
- [PATCH 6.1.y 11/21] KVM: VMX: Handle forced exit due to preemption timer in fastpath,
Sean Christopherson
- [PATCH 6.1.y 17/21] KVM: VMX: Allow guest to set DEBUGCTL.RTM_DEBUG if RTM is supported,
Sean Christopherson
- [PATCH 6.1.y 13/21] KVM: VMX: Handle KVM-induced preemption timer exits in fastpath for L2,
Sean Christopherson
- [PATCH 6.1.y 05/21] KVM: x86: Take irqfds.lock when adding/deleting IRQ bypass producer,
Sean Christopherson
- [PATCH 6.1.y 12/21] KVM: x86: Move handling of is_guest_mode() into fastpath exit handlers,
Sean Christopherson
- [PATCH 6.1.y 18/21] KVM: VMX: Extract checking of guest's DEBUGCTL into helper,
Sean Christopherson
- [PATCH 6.1.y 06/21] KVM: x86: Snapshot the host's DEBUGCTL in common x86,
Sean Christopherson
- [PATCH 6.1.y 03/21] KVM: x86: Plumb in the vCPU to kvm_x86_ops.hwapic_isr_update(),
Sean Christopherson
- [PATCH 6.1.y 01/21] KVM: SVM: Set RFLAGS.IF=1 in C code, to get VMRUN out of the STI shadow,
Sean Christopherson
- [PATCH 6.1.y 09/21] KVM: x86: Plumb "force_immediate_exit" into kvm_entry() tracepoint,
Sean Christopherson
- [PATCH 6.1.y 15/21] KVM: x86: Convert vcpu_run()'s immediate exit param into a generic bitmap,
Sean Christopherson
- [PATCH 6.1.y 19/21] KVM: nVMX: Check vmcs12->guest_ia32_debugctl on nested VM-Enter,
Sean Christopherson
- [PATCH 6.1.y 16/21] KVM: x86: Drop kvm_x86_ops.set_dr6() in favor of a new KVM_RUN flag,
Sean Christopherson
- [PATCH 6.1.y 04/21] KVM: nVMX: Defer SVI update to vmcs01 on EOI when L2 is active w/o VID,
Sean Christopherson
- [PATCH 6.1.y 20/21] KVM: VMX: Wrap all accesses to IA32_DEBUGCTL with getter/setter APIs,
Sean Christopherson
- [PATCH 6.1.y 02/21] KVM: x86: Re-split x2APIC ICR into ICR+ICR2 for AMD (x2AVIC),
Sean Christopherson
- [PATCH 6.1.y 14/21] KVM: x86: Fully defer to vendor code to decide how to force immediate exit,
Sean Christopherson
- [PATCH 6.1.y 10/21] KVM: VMX: Re-enter guest in fastpath for "spurious" preemption timer exits,
Sean Christopherson
- [PATCH 6.1.y 21/21] KVM: VMX: Preserve host's DEBUGCTLMSR_FREEZE_IN_SMM while running the guest,
Sean Christopherson
- [PATCH 6.1.y 08/21] KVM: x86/pmu: Gate all "unimplemented MSR" prints on report_ignored_msrs,
Sean Christopherson
[PATCH 6.6.y 00/20] KVM: x86: Backports for 6.6.y,
Sean Christopherson
- [PATCH 6.6.y 07/20] KVM: x86: Snapshot the host's DEBUGCTL after disabling IRQs,
Sean Christopherson
- [PATCH 6.6.y 10/20] KVM: VMX: Handle forced exit due to preemption timer in fastpath,
Sean Christopherson
- [PATCH 6.6.y 16/20] KVM: VMX: Allow guest to set DEBUGCTL.RTM_DEBUG if RTM is supported,
Sean Christopherson
- [PATCH 6.6.y 12/20] KVM: VMX: Handle KVM-induced preemption timer exits in fastpath for L2,
Sean Christopherson
- [PATCH 6.6.y 11/20] KVM: x86: Move handling of is_guest_mode() into fastpath exit handlers,
Sean Christopherson
- [PATCH 6.6.y 05/20] KVM: x86: Take irqfds.lock when adding/deleting IRQ bypass producer,
Sean Christopherson
- [PATCH 6.6.y 17/20] KVM: VMX: Extract checking of guest's DEBUGCTL into helper,
Sean Christopherson
- [PATCH 6.6.y 01/20] KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush,
Sean Christopherson
- [PATCH 6.6.y 06/20] KVM: x86: Snapshot the host's DEBUGCTL in common x86,
Sean Christopherson
- [PATCH 6.6.y 03/20] KVM: x86: Plumb in the vCPU to kvm_x86_ops.hwapic_isr_update(),
Sean Christopherson
- [PATCH 6.6.y 02/20] KVM: SVM: Set RFLAGS.IF=1 in C code, to get VMRUN out of the STI shadow,
Sean Christopherson
- [PATCH 6.6.y 08/20] KVM: x86: Plumb "force_immediate_exit" into kvm_entry() tracepoint,
Sean Christopherson
- [PATCH 6.6.y 14/20] KVM: x86: Convert vcpu_run()'s immediate exit param into a generic bitmap,
Sean Christopherson
- [PATCH 6.6.y 18/20] KVM: nVMX: Check vmcs12->guest_ia32_debugctl on nested VM-Enter,
Sean Christopherson
- [PATCH 6.6.y 15/20] KVM: x86: Drop kvm_x86_ops.set_dr6() in favor of a new KVM_RUN flag,
Sean Christopherson
- [PATCH 6.6.y 04/20] KVM: nVMX: Defer SVI update to vmcs01 on EOI when L2 is active w/o VID,
Sean Christopherson
- [PATCH 6.6.y 19/20] KVM: VMX: Wrap all accesses to IA32_DEBUGCTL with getter/setter APIs,
Sean Christopherson
- [PATCH 6.6.y 09/20] KVM: VMX: Re-enter guest in fastpath for "spurious" preemption timer exits,
Sean Christopherson
- [PATCH 6.6.y 20/20] KVM: VMX: Preserve host's DEBUGCTLMSR_FREEZE_IN_SMM while running the guest,
Sean Christopherson
- [PATCH 6.6.y 13/20] KVM: x86: Fully defer to vendor code to decide how to force immediate exit,
Sean Christopherson
[PATCH 4/6] selftests: kvm: riscv: fix spelling mistakes in comments,
Soham Metha
[Bug 220453] New: kvm/arm64: nv - guest with hypervisor hangs,
bugzilla-daemon
[PATCH v2] kvm/kvm-all: make kvm_park/unpark_vcpu local to kvm-all.c,
Ani Sinha
[PATCH v2 0/6] ONE_REG interface for SBI FWFT extension,
Anup Patel
[PATCH 6.12.y 0/7] KVM: x86: Backports for 6.12.y,
Sean Christopherson
[PATCH] RISC-V: KVM: Prevent HGATP_MODE_BARE passed,
guoren
[PATCH v3 0/6] KVM: arm64: FEAT_RASv1p1 support and RAS selection,
Marc Zyngier
[PATCH] KVM: arm64: selftests: Sync ID_AA64MMFR3_EL1 in set_id_regs,
Mark Brown
[PATCH v3 0/4] KVM: Speed up MMIO registrations,
Keir Fraser
[PATCH 0/2] KVM: SVM: Fix missing LAPIC TPR sync into VMCB::V_TPR with AVIC on,
Maciej S. Szmigiero
[PATCH 0/2] Add sign extension with kernel MMIO read emulation,
Bibo Mao
[PATCH v1 0/3] kvm:x86: simplify kvmclock update logic,
Lei Chen
[PATCH RESEND V2 0/2] Fixes for recovery for machine check in TDX/SEAM non-root mode,
Adrian Hunter
[PATCH V7 0/3] x86/tdx: Skip clearing reclaimed pages unless X86_BUG_TDX_PW_MCE is present,
Adrian Hunter
Questions about FUSE_NOTIFY_INVAL_ENTRY,
Jim Harris
[PATCH v11 0/8] KVM: SVM: Enable Secure TSC for SEV-SNP,
Sean Christopherson
- Re: [PATCH v11 0/8] KVM: SVM: Enable Secure TSC for SEV-SNP,
Sean Christopherson
- Re: [PATCH v11 0/8] KVM: SVM: Enable Secure TSC for SEV-SNP,
Nikunj A. Dadhania
- [PATCH v11 3/8] x86/cpufeatures: Add SNP Secure TSC,
Sean Christopherson
- [PATCH v11 7/8] KVM: SEV: Fold sev_es_vcpu_reset() into sev_vcpu_create(),
Sean Christopherson
- [PATCH v11 1/8] KVM: SEV: Drop GHCB_VERSION_DEFAULT and open code it,
Sean Christopherson
- [PATCH v11 2/8] KVM: SEV: Enforce minimum GHCB version requirement for SEV-SNP guests,
Sean Christopherson
- [PATCH v11 6/8] KVM: SEV: Set RESET GHCB MSR value during sev_es_init_vmcb(),
Sean Christopherson
- [PATCH v11 4/8] KVM: SVM: Move SEV-ES VMSA allocation to a dedicated sev_vcpu_create() helper,
Sean Christopherson
- [PATCH v11 8/8] KVM: SVM: Enable Secure TSC for SNP guests,
Sean Christopherson
- [PATCH v11 5/8] KVM: SEV: Move init of SNP guest state into sev_init_vmcb(),
Sean Christopherson
[PATCH v8 0/3] update live migration configuration region,
Longfang Liu
[PATCH] KVM: VMX: Fix SPEC_CTRL handling,
Uros Bizjak
[PATCH v3 0/2] Fix hgatp mode settings within kvm_riscv_gstage_vmid_detect,
fangyu . yu
[PATCH v8 0/2] Add SEV-SNP CipherTextHiding feature support,
Ashish Kalra
[Invitation] bi-weekly guest_memfd upstream call on 2025-08-21,
David Hildenbrand
[PATCH v10 00/43] arm64: Support for Arm CCA in KVM,
Steven Price
- Re: [PATCH v10 00/43] arm64: Support for Arm CCA in KVM,
Gavin Shan
- [PATCH v10 42/43] KVM: arm64: Expose KVM_ARM_VCPU_REC to user space,
Steven Price
- [PATCH v10 24/43] KVM: arm64: WARN on injected undef exceptions,
Steven Price
- [PATCH v10 01/43] kvm: arm64: Include kvm_emulate.h in kvm/arm_psci.h,
Steven Price
- [PATCH v10 43/43] KVM: arm64: Allow activating realms,
Steven Price
- [PATCH v10 33/43] arm64: RME: Hide KVM_CAP_READONLY_MEM for realm guests,
Steven Price
- [PATCH v10 27/43] arm64: RME: support RSI_HOST_CALL,
Steven Price
- [PATCH v10 30/43] arm64: RME: Prevent Device mappings for Realms,
Steven Price
- [PATCH v10 25/43] arm64: Don't expose stolen time for realm guests,
Steven Price
- [PATCH v10 29/43] arm64: RME: Always use 4k pages for realms,
Steven Price
- [PATCH v10 21/43] KVM: arm64: Handle realm VCPU load,
Steven Price
- [PATCH v10 08/43] kvm: arm64: Don't expose debug capabilities for realm guests,
Steven Price
- [PATCH v10 31/43] arm_pmu: Provide a mechanism for disabling the physical IRQ,
Steven Price
- [PATCH v10 28/43] arm64: RME: Allow checking SVE on VM instance,
Steven Price
- [PATCH v10 12/43] KVM: arm64: vgic: Provide helper for number of list registers,
Steven Price
- [PATCH v10 36/43] arm64: RME: Initialize PMCR.N with number counter supported by RMM,
Steven Price
- [PATCH v10 26/43] arm64: RME: allow userspace to inject aborts,
Steven Price
- [PATCH v10 39/43] arm64: RME: Provide register list for unfinalized RME RECs,
Steven Price
- [PATCH v10 41/43] KVM: arm64: Expose support for private memory,
Steven Price
- [PATCH v10 34/43] arm64: RME: Propagate number of breakpoints and watchpoints to userspace,
Steven Price
- [PATCH v10 02/43] arm64: RME: Handle Granule Protection Faults (GPFs),
Steven Price
- [PATCH v10 38/43] arm64: RME: Configure max SVE vector length for a Realm,
Steven Price
- [PATCH v10 22/43] KVM: arm64: Validate register access for a Realm VM,
Steven Price
- [PATCH v10 17/43] arm64: RME: Handle RMI_EXIT_RIPAS_CHANGE,
Steven Price
- [PATCH v10 37/43] arm64: RME: Propagate max SVE vector length from RMM,
Steven Price
- [PATCH v10 35/43] arm64: RME: Set breakpoint parameters through SET_ONE_REG,
Steven Price
- [PATCH v10 18/43] KVM: arm64: Handle realm MMIO emulation,
Steven Price
- [PATCH v10 14/43] KVM: arm64: Support timers in realm RECs,
Steven Price
- [PATCH v10 23/43] KVM: arm64: Handle Realm PSCI requests,
Steven Price
- [PATCH v10 09/43] KVM: arm64: Allow passing machine type in KVM creation,
Steven Price
- [PATCH v10 40/43] arm64: RME: Provide accurate register list,
Steven Price
- [PATCH v10 32/43] arm64: RME: Enable PMU support with a realm guest,
Steven Price
- [PATCH v10 19/43] arm64: RME: Allow populating initial contents,
Steven Price
- [PATCH v10 13/43] arm64: RME: Support for the VGIC in realms,
Steven Price
- [PATCH v10 10/43] arm64: RME: RTT tear down,
Steven Price
- [PATCH v10 06/43] arm64: RME: Define the user ABI,
Steven Price
- [PATCH v10 05/43] arm64: RME: Check for RME support at KVM init,
Steven Price
- [PATCH v10 03/43] arm64: RME: Add SMC definitions for calling the RMM,
Steven Price
- [PATCH v10 16/43] arm64: RME: Handle realm enter/exit,
Steven Price
- [PATCH v10 11/43] arm64: RME: Allocate/free RECs to match vCPUs,
Steven Price
- [PATCH v10 04/43] arm64: RME: Add wrappers for RMI calls,
Steven Price
- [PATCH v10 20/43] arm64: RME: Runtime faulting of memory,
Steven Price
- [PATCH v10 07/43] arm64: RME: ioctls to create and configure realms,
Steven Price
- [PATCH v10 15/43] arm64: RME: Allow VMM to set RIPAS,
Steven Price
[kvm-unit-tests PATCH] x86: nSVM: Add test for EPT A/D bits,
Kevin Cheng
[kvm-unit-tests PATCH] x86: nSVM: Add tests for instruction interrupts,
Kevin Cheng
[PATCH v2 0/2] KVM: arm64: Reschedule as needed when destroying the stage-2 page-tables,
Raghavendra Rao Ananta
[PATCH v9 0/2] Add SEV-SNP CipherTextHiding feature support,
Ashish Kalra
[PATCH v3 0/3] crypto: ccp - Add AMD Seamless Firmware Servicing (SFS) driver,
Ashish Kalra
[PATCH v9 00/19] TDX KVM selftests,
Sagi Shahar
- [PATCH v9 02/19] KVM: selftests: Allocate pgd in virt_map() as necessary,
Sagi Shahar
- [PATCH v9 07/19] KVM: selftests: Add kbuild definitons,
Sagi Shahar
- [PATCH v9 01/19] KVM: selftests: Include overflow.h instead of redefining is_signed_type(),
Sagi Shahar
- [PATCH v9 13/19] KVM: selftests: TDX: Use KVM_TDX_CAPABILITIES to validate TDs' attribute configuration,
Sagi Shahar
- [PATCH v9 06/19] KVM: selftests: Expose segment definitons to assembly files,
Sagi Shahar
- [PATCH v9 17/19] KVM: selftests: Add wrapper for TDX MMIO from guest,
Sagi Shahar
- [PATCH v9 05/19] KVM: selftests: Update kvm_init_vm_address_properties() for TDX,
Sagi Shahar
- [PATCH v9 04/19] KVM: selftests: Expose function to allocate guest vCPU stack,
Sagi Shahar
- [PATCH v9 03/19] KVM: selftests: Expose functions to get default sregs values,
Sagi Shahar
- [PATCH v9 18/19] KVM: selftests: Add ucall support for TDX,
Sagi Shahar
- [PATCH v9 19/19] KVM: selftests: Add TDX lifecycle test,
Sagi Shahar
- [PATCH v9 10/19] KVM: selftests: Set up TDX boot code region,
Sagi Shahar
- [PATCH v9 11/19] KVM: selftests: Set up TDX boot parameters region,
Sagi Shahar
- [PATCH v9 14/19] KVM: selftests: Add helpers to init TDX memory and finalize VM,
Sagi Shahar
- [PATCH v9 09/19] KVM: selftests: Add TDX boot code,
Sagi Shahar
- [PATCH v9 15/19] KVM: selftests: Hook TDX support to vm and vcpu creation,
Sagi Shahar
- [PATCH v9 16/19] KVM: selftests: Add support for TDX TDCALL from guest,
Sagi Shahar
- [PATCH v9 12/19] KVM: selftests: Add helper to initialize TDX VM,
Sagi Shahar
- [PATCH v9 08/19] KVM: selftests: Define structs to pass parameters to TDX boot code,
Sagi Shahar
Re: [PATCH] riscv: skip csr restore if vcpu preempted reload,
Nutty.Liu
[PATCH v13 00/21] Enable CET Virtualization,
Chao Gao
- [PATCH v13 16/21] KVM: nVMX: Virtualize NO_HW_ERROR_CODE_CC for L1 event injection to L2,
Chao Gao
- [PATCH v13 13/21] KVM: VMX: Set host constant supervisor states to VMCS fields,
Chao Gao
- [PATCH v13 03/21] KVM: x86: Refresh CPUID on write to guest MSR_IA32_XSS,
Chao Gao
- [PATCH v13 08/21] KVM: VMX: Introduce CET VMCS fields and control bits,
Chao Gao
- [PATCH v13 05/21] KVM: x86: Load guest FPU state when access XSAVE-managed MSRs,
Chao Gao
- [PATCH v13 01/21] KVM: x86: Introduce KVM_{G,S}ET_ONE_REG uAPIs support,
Chao Gao
- [PATCH v13 14/21] KVM: x86: Don't emulate instructions guarded by CET,
Chao Gao
- [PATCH v13 10/21] KVM: VMX: Emulate read and write to CET MSRs,
Chao Gao
- [PATCH v13 17/21] KVM: nVMX: Prepare for enabling CET support for nested guest,
Chao Gao
- [PATCH v13 15/21] KVM: x86: Enable CET virtualization for VMX and advertise to userspace,
Chao Gao
- Re: [PATCH v13 00/21] Enable CET Virtualization,
Chao Gao
- [PATCH v13 20/21] KVM: nVMX: Advertise new VM-Entry/Exit control bits for CET state,
Chao Gao
- [PATCH v13 06/21] KVM: x86: Add fault checks for guest CR4.CET setting,
Chao Gao
- [PATCH v13 02/21] KVM: x86: Report XSS as to-be-saved if there are supported features,
Chao Gao
- [PATCH v13 07/21] KVM: x86: Report KVM supported CET MSRs as to-be-saved,
Chao Gao
- [PATCH v13 18/21] KVM: nVMX: Add consistency checks for CR0.WP and CR4.CET,
Chao Gao
- [PATCH v13 04/21] KVM: x86: Initialize kvm_caps.supported_xss,
Chao Gao
- [PATCH v13 11/21] KVM: x86: Save and reload SSP to/from SMRAM,
Chao Gao
- [PATCH v13 12/21] KVM: VMX: Set up interception for CET MSRs,
Chao Gao
- [PATCH v13 09/21] KVM: x86: Enable guest SSP read/write interface with new uAPIs,
Chao Gao
- [PATCH v13 21/21] KVM: selftest: Add tests for KVM_{GET,SET}_ONE_REG,
Chao Gao
- [PATCH v13 19/21] KVM: nVMX: Add consistency checks for CET states,
Chao Gao
[PATCH v1 RESEND 0/5] RISC-V: Add Zilsd/Zclsd support in hwprobe and KVM,
Pincheng Wang
[PATCH 0/5] RISC-V: Add Zilsd/Zclsd support in hwprobe and KVM,
Pincheng Wang
[PATCH V4 RESEND 0/3] Fixup & optimize hgatp mode & vmid detect functions,
guoren
[PATCH] KVM: s390: Fix access to unavailable adapter indicator pages during postcopy,
Thomas Huth
[PATCH v4 0/7] KVM: SVM: Add support for 4k vCPUs with x2AVIC,
Naveen N Rao (AMD)
Re: [PATCH v3 13/15] x86/cpu/intel: Bound the non-architectural constant_tsc model checks,
Sohil Mehta
[PATCH RFC 00/35] mm: remove nth_page(),
David Hildenbrand
- Re: [PATCH RFC 00/35] mm: remove nth_page(),
Jason Gunthorpe
- [syzbot ci] Re: mm: remove nth_page(),
syzbot ci
- [PATCH RFC 02/35] arm64: Kconfig: drop superfluous "select SPARSEMEM_VMEMMAP",
David Hildenbrand
- [PATCH RFC 14/35] mm/mm/percpu-km: drop nth_page() usage within single allocation,
David Hildenbrand
- [PATCH RFC 16/35] mm/pagewalk: drop nth_page() usage within folio in folio_walk_start(),
David Hildenbrand
- [PATCH RFC 11/35] mm: sanity-check maximum folio size in folio_set_order(),
David Hildenbrand
- [PATCH RFC 05/35] wireguard: selftests: remove CONFIG_SPARSEMEM_VMEMMAP=y from qemu kernel config,
David Hildenbrand
- [PATCH RFC 22/35] dma-remap: drop nth_page() in dma_common_contiguous_remap(),
David Hildenbrand
- [PATCH RFC 04/35] x86/Kconfig: drop superfluous "select SPARSEMEM_VMEMMAP",
David Hildenbrand
- [PATCH RFC 03/35] s390/Kconfig: drop superfluous "select SPARSEMEM_VMEMMAP",
David Hildenbrand
- [PATCH RFC 19/35] io_uring/zcrx: remove nth_page() usage within folio,
David Hildenbrand
- [PATCH RFC 34/35] block: update comment of "struct bio_vec" regarding nth_page(),
David Hildenbrand
- [PATCH RFC 17/35] mm/gup: drop nth_page() usage within folio when recording subpages,
David Hildenbrand
- [PATCH RFC 07/35] mm/memremap: reject unreasonable folio/compound page sizes in memremap_pages(),
David Hildenbrand
- [PATCH RFC 26/35] mspro_block: drop nth_page() usage within SG entry,
David Hildenbrand
- [PATCH RFC 35/35] mm: remove nth_page(),
David Hildenbrand
- [PATCH RFC 25/35] drm/i915/gem: drop nth_page() usage within SG entry,
David Hildenbrand
- [PATCH RFC 15/35] fs: hugetlbfs: remove nth_page() usage within folio in adjust_range_hwpoison(),
David Hildenbrand
- [PATCH RFC 08/35] mm/hugetlb: check for unreasonable folio sizes when registering hstate,
David Hildenbrand
- [PATCH RFC 24/35] ata: libata-eh: drop nth_page() usage within SG entry,
David Hildenbrand
- [PATCH RFC 27/35] memstick: drop nth_page() usage within SG entry,
David Hildenbrand
- [PATCH RFC 32/35] mm/gup: drop nth_page() usage in unpin_user_page_range_dirty_lock(),
David Hildenbrand
- [PATCH RFC 23/35] scatterlist: disallow non-contigous page ranges in a single SG entry,
David Hildenbrand
- [PATCH RFC 29/35] scsi: core: drop nth_page() usage within SG entry,
David Hildenbrand
- [PATCH RFC 30/35] vfio/pci: drop nth_page() usage within SG entry,
David Hildenbrand
- [PATCH RFC 12/35] mm: limit folio/compound page sizes in problematic kernel configs,
David Hildenbrand
- [PATCH RFC 09/35] mm/mm_init: make memmap_init_compound() look more like prep_compound_page(),
David Hildenbrand
- [PATCH RFC 28/35] mmc: drop nth_page() usage within SG entry,
David Hildenbrand
- [PATCH RFC 06/35] mm/page_alloc: reject unreasonable folio/compound page sizes in alloc_contig_range_noprof(),
David Hildenbrand
- [PATCH RFC 13/35] mm: simplify folio_page() and folio_page_idx(),
David Hildenbrand
- [PATCH RFC 33/35] kfence: drop nth_page() usage,
David Hildenbrand
- [PATCH RFC 01/35] mm: stop making SPARSEMEM_VMEMMAP user-selectable,
David Hildenbrand
- [PATCH RFC 10/35] mm/hugetlb: cleanup hugetlb_folio_init_tail_vmemmap(),
David Hildenbrand
- [PATCH RFC 18/35] io_uring/zcrx: remove "struct io_copy_cache" and one nth_page() usage,
David Hildenbrand
- [PATCH RFC 20/35] mips: mm: convert __flush_dcache_pages() to __flush_dcache_folio_pages(),
David Hildenbrand
- [PATCH RFC 31/35] crypto: remove nth_page() usage within SG entry,
David Hildenbrand
- [PATCH RFC 21/35] mm/cma: refuse handing out non-contiguous page ranges,
David Hildenbrand
[GIT PULL] KVM: x86: Two KVM fixes and a selftest fix,
Sean Christopherson
[PATCH] KVM: SEV: Save the SEV policy if and only if LAUNCH_START succeeds,
Sean Christopherson
[PATCH 0/3] KVM: x86: Clean up lowest priority IRQ code,
Sean Christopherson
[PATCH v6 00/20] Enable FRED with KVM VMX,
Xin Li (Intel)
- [PATCH v6 15/20] KVM: x86: Advertise support for FRED,
Xin Li (Intel)
- [PATCH v6 09/20] KVM: x86: Add a helper to detect if FRED is enabled for a vCPU,
Xin Li (Intel)
- [PATCH v6 20/20] KVM: nVMX: Allow VMX FRED controls,
Xin Li (Intel)
- [PATCH v6 13/20] KVM: x86: Mark CR4.FRED as not reserved,
Xin Li (Intel)
- [PATCH v6 03/20] KVM: VMX: Disable FRED if FRED consistency checks fail,
Xin Li (Intel)
- [PATCH v6 07/20] KVM: VMX: Save/restore guest FRED RSP0,
Xin Li (Intel)
- [PATCH v6 02/20] KVM: VMX: Initialize VM entry/exit FRED controls in vmcs_config,
Xin Li (Intel)
- [PATCH v6 06/20] KVM: VMX: Set FRED MSR intercepts,
Xin Li (Intel)
- [PATCH v6 14/20] KVM: VMX: Dump FRED context in dump_vmcs(),
Xin Li (Intel)
- [PATCH v6 16/20] KVM: nVMX: Add support for the secondary VM exit controls,
Xin Li (Intel)
- [PATCH v6 05/20] KVM: VMX: Initialize VMCS FRED fields,
Xin Li (Intel)
- [PATCH v6 01/20] KVM: VMX: Add support for the secondary VM exit controls,
Xin Li (Intel)
- [PATCH v6 18/20] KVM: nVMX: Add FRED-related VMCS field checks,
Xin Li (Intel)
- [PATCH v6 08/20] KVM: VMX: Add support for FRED context save/restore,
Xin Li (Intel)
- [PATCH v6 10/20] KVM: VMX: Virtualize FRED event_data,
Xin Li (Intel)
- [PATCH v6 12/20] KVM: x86: Save/restore the nested flag of an exception,
Xin Li (Intel)
- [PATCH v6 11/20] KVM: VMX: Virtualize FRED nested exception tracking,
Xin Li (Intel)
- [PATCH v6 04/20] x86/cea: Export an API to get per CPU exception stacks for KVM to use,
Xin Li (Intel)
- [PATCH v6 19/20] KVM: nVMX: Add prerequisites to SHADOW_FIELD_R[OW] macros,
Xin Li (Intel)
- [PATCH v6 17/20] KVM: nVMX: Add FRED VMCS fields to nested VMX context handling,
Xin Li (Intel)
[PATCH v7 00/29] KVM: arm64: Implement support for SME,
Mark Brown
- Re: [PATCH v7 00/29] KVM: arm64: Implement support for SME,
Marc Zyngier
- [PATCH v7 01/29] arm64/sysreg: Update SMIDR_EL1 to DDI0601 2025-06,
Mark Brown
- [PATCH v7 07/29] KVM: arm64: Pay attention to FFR parameter in SVE save and load,
Mark Brown
- [PATCH v7 26/29] KVM: arm64: Expose SME to nested guests,
Mark Brown
- [PATCH v7 04/29] arm64/fpsimd: Check enable bit for FA64 when saving EFI state,
Mark Brown
- [PATCH v7 20/29] KVM: arm64: Provide assembly for SME register access,
Mark Brown
- [PATCH v7 05/29] arm64/fpsimd: Determine maximum virtualisable SME vector length,
Mark Brown
- [PATCH v7 13/29] KVM: arm64: Rename sve_state_reg_region,
Mark Brown
- [PATCH v7 09/29] KVM: arm64: Move SVE state access macros after feature test macros,
Mark Brown
- [PATCH v7 06/29] KVM: arm64: Introduce non-UNDEF FGT control,
Mark Brown
- [PATCH v7 28/29] KVM: arm64: selftests: Add SME system registers to get-reg-list,
Mark Brown
- [PATCH v7 03/29] arm64/fpsimd: Decide to save ZT0 and streaming mode FFR at bind time,
Mark Brown
- [PATCH v7 12/29] KVM: arm64: Define internal features for SME,
Mark Brown
- [PATCH v7 29/29] KVM: arm64: selftests: Add SME to set_id_regs test,
Mark Brown
- [PATCH v7 17/29] KVM: arm64: Support TPIDR2_EL0,
Mark Brown
- [PATCH v7 22/29] KVM: arm64: Flush register state on writes to SVCR.SM and SVCR.ZA,
Mark Brown
[Index of Archives]
[CentOS Virtualization]
[Linux USB Devel]
[Video for Linux]
[Big List of Linux Books]
[Linux SCSI]
[Linux Modules]
[Yosemite Forum]