Toggle navigation
Patchwork
KVM development
Patches
Bundles
About this project
Login
Register
Mail settings
Show patches with
: Submitter =
Sean Christopherson
| 4356 patches
Series
Submitter
State
any
Action Required
New
Under Review
Accepted
Rejected
RFC
Not Applicable
Changes Requested
Awaiting Upstream
Superseded
Deferred
Mainlined
Queued
Needs ACK
Handled Elsewhere
In Next
Search
Archived
No
Yes
Both
Delegate
------
Nobody
holtmann
holtmann
holtmann
agk
mchehab
mchehab
gregkh
gregkh
mtosatti
lethal
lethal
avi
cvaroqui
jbrassow
mikulas
dtor
bmarzins
tmlind
jmberg
jmberg
mcgrof
mcgrof
mcgrof
lenb
lenb
kyle
felipebalbi
varenet
helge
helge
khilman
khilman
khilman
khilman
jwoithe
mlin
Zhang Rui
Zhang Rui
iksaif
cjackiewicz
hmh
jbarnes
jbarnes
jbarnes
willy
snitzer
iwamatsu
dougsland
mjg59
rafael
rafael
rafael
ericvh@gmail.com
ykzhao
venkip
sandeen
pwsan
lucho@ionkov.net
rminnich
anholt
aystarik
roland
shefty
mason
glikely
krh
djbw
djbw
djbw
cmarinas
doyu
jrn
sage
tomba
mmarek
cjb
trondmy
jikos
bcousson
jic23
olof
olof
olof
nsekhar
weiny2
horms
horms
bwidawsk
bwidawsk
shemminger
eulfhan
josef
josef
josef
dianders
jpan9
hal
kdave
bleung
evalenti
jlbec
wsa
bhelgaas
vkoul
vkoul
szlin
davejiang
markgross
tagr
tiwai
vireshk
mmind
dledford
geert
geert
herbert
herbert
kvalo
kvalo
kvalo
bentiss
arend
rzwisler
stellarhopper
stellarhopper
jejb
matthias_bgg
dvhart
axboe
axboe
pcmoore
pcmoore
pcmoore
mkp
mkp
stefan_schmidt
leon
lucvoo
jsakkine
jsakkine
jsakkine
bamse
bamse
demarchi
krzk
groeck
groeck
sboyd
sboyd
mturquette
mturquette
0andriy
carlocaione
luca
dgc
kbingham
derosier
narmstrong
narmstrong
atull
tytso
tytso
djwong
bvanassche
omos
jpirko
jpirko
GustavoARSilva
pkshih
patersonc
brauner
shuahkh
shuahkh
shuahkh
palmer
palmer
jgg
Kishon
idosch
labbott
jsimmons
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
broonie
broonie
broonie
mricon
mricon
mricon
kees
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
arnd
linusw
perfinion
bbrezillon
bachradsusi
rostedt
rostedt
kholk
nbd
ebiggers
ebiggers
pavelm
sds
m0reeze
ganis
jwcart2
matttbe
andmur01
lorpie01
chanwoochoi
dlezcano
jhedberg
vudentz
robertfoss
bgix
tedd_an
tsbogend
wens
wcrobert
robher
kstewart
kwilczynski
hansg
bpf
netdev
dsa
ethtool
netdrv
martineau
abelloni
trix
pabeni
mani_sadhasivam
mlimonci
liusong6
mjp
tohojo
pmalani
prestwoj
prestwoj
dhowells
tzungbi
conchuod
paulmck
jes
mtkaczyk
colyli
cem
pateldipen1984
iweiny
iweiny
bjorn
mhiramat
JanKiszka
jaegeuk
mraynal
aring
konradybcio
ij
Hailan
jstitt007
denkenz
denkenz
mkorenbl
jjohnson
frank_li
geliang
mdraidci
mdraidci
peluse
joelgranados
Apply
«
1
2
3
4
…
43
44
»
Patch
Series
A/R/T
S/W/F
Date
Submitter
Delegate
State
Revert "KVM: VMX: Move LOAD_IA32_PERF_GLOBAL_CTRL errata handling out of setup_vmcs_config()"
Revert "KVM: VMX: Move LOAD_IA32_PERF_GLOBAL_CTRL errata handling out of setup_vmcs_config()"
- 1 -
-
-
-
2024-11-19
Sean Christopherson
New
[2/2] KVM: x86: Break CONFIG_KVM_X86's direct dependency on KVM_INTEL || KVM_AMD
KVM: x86: Fix more KVM_X86 Kconfig bugs
- - -
-
-
-
2024-11-18
Sean Christopherson
New
[1/2] KVM: x86: add back X86_LOCAL_APIC dependency
KVM: x86: Fix more KVM_X86 Kconfig bugs
1 - -
-
-
-
2024-11-18
Sean Christopherson
New
[GIT,PULL] KVM: VMX change for 6.13
[GIT,PULL] KVM: VMX change for 6.13
- - -
-
-
-
2024-11-12
Sean Christopherson
New
[GIT,PULL] KVM: Selftests changes for 6.13
[GIT,PULL] KVM: Selftests changes for 6.13
- - -
-
-
-
2024-11-12
Sean Christopherson
New
[GIT,PULL] KVM: x86: MMU changes for 6.13
[GIT,PULL] KVM: x86: MMU changes for 6.13
- - -
-
-
-
2024-11-12
Sean Christopherson
New
[GIT,PULL] KVM: x86: Misc changes for 6.13
[GIT,PULL] KVM: x86: Misc changes for 6.13
- - -
-
-
-
2024-11-12
Sean Christopherson
New
[GIT,PULL] KVM: Generic changes for 6.13
[GIT,PULL] KVM: Generic changes for 6.13
- - -
-
-
-
2024-11-12
Sean Christopherson
New
[GIT,PULL] KVM: x86 and selftests fixes for 6.12-rcN
[GIT,PULL] KVM: x86 and selftests fixes for 6.12-rcN
- - -
-
-
-
2024-11-06
Sean Christopherson
New
[v2] KVM: x86: Unconditionally set irr_pending when updating APICv state
[v2] KVM: x86: Unconditionally set irr_pending when updating APICv state
- - -
-
-
-
2024-11-06
Sean Christopherson
New
KVM: x86: Update irr_pending when setting APIC state with APICv disabled
KVM: x86: Update irr_pending when setting APIC state with APICv disabled
- - -
-
-
-
2024-11-01
Sean Christopherson
New
[2/2] KVM: nVMX: Defer SVI update to vmcs01 on EOI when L2 is active w/o VID
KVM: nVMX: Fix an SVI update bug with passthrough APIC
- - 1
-
-
-
2024-11-01
Sean Christopherson
New
[1/2] KVM: x86: Plumb in the vCPU to kvm_x86_ops.hwapic_isr_update()
KVM: nVMX: Fix an SVI update bug with passthrough APIC
- 1 -
-
-
-
2024-11-01
Sean Christopherson
New
[5/5] KVM: nVMX: Honor event priority when emulating PI delivery during VM-Enter
KVM: nVMX: Honor event priority for PI ack at VM-Enter
- - -
-
-
-
2024-11-01
Sean Christopherson
New
[4/5] KVM: nVMX: Use vmcs01's controls shadow to check for IRQ/NMI windows at VM-Enter
KVM: nVMX: Honor event priority for PI ack at VM-Enter
- - -
-
-
-
2024-11-01
Sean Christopherson
New
[3/5] KVM: nVMX: Drop manual vmcs01.GUEST_INTERRUPT_STATUS.RVI check at VM-Enter
KVM: nVMX: Honor event priority for PI ack at VM-Enter
- - -
-
-
-
2024-11-01
Sean Christopherson
New
[2/5] KVM: nVMX: Check for pending INIT/SIPI after entering non-root mode
KVM: nVMX: Honor event priority for PI ack at VM-Enter
- - -
-
-
-
2024-11-01
Sean Christopherson
New
[1/5] KVM: nVMX: Explicitly update vPPR on successful nested VM-Enter
KVM: nVMX: Honor event priority for PI ack at VM-Enter
- - -
-
-
-
2024-11-01
Sean Christopherson
New
[2/2] KVM: VMX: Allow toggling bits in MSR_IA32_RTIT_CTL when enable bit is cleared
KVM: VMX: Mark Intel PT virtualization as BROKEN
- 1 -
-
-
-
2024-11-01
Sean Christopherson
New
[1/2] KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN
KVM: VMX: Mark Intel PT virtualization as BROKEN
- 1 1
-
-
-
2024-11-01
Sean Christopherson
New
[v2,9/9] KVM: x86: Short-circuit all of kvm_apic_set_base() if MSR value is unchanged
KVM: x86: Clean up MSR_IA32_APICBASE_BASE code
- - -
-
-
-
2024-11-01
Sean Christopherson
New
[v2,8/9] KVM: x86: Unpack msr_data structure prior to calling kvm_apic_set_base()
KVM: x86: Clean up MSR_IA32_APICBASE_BASE code
- 1 -
-
-
-
2024-11-01
Sean Christopherson
New
[v2,7/9] KVM: x86: Make kvm_recalculate_apic_map() local to lapic.c
KVM: x86: Clean up MSR_IA32_APICBASE_BASE code
- 2 -
-
-
-
2024-11-01
Sean Christopherson
New
[v2,6/9] KVM: x86: Rename APIC base setters to better capture their relationship
KVM: x86: Clean up MSR_IA32_APICBASE_BASE code
- 2 -
-
-
-
2024-11-01
Sean Christopherson
New
[v2,5/9] KVM: x86: Move kvm_set_apic_base() implementation to lapic.c (from x86.c)
KVM: x86: Clean up MSR_IA32_APICBASE_BASE code
- 2 -
-
-
-
2024-11-01
Sean Christopherson
New
[v2,4/9] KVM: x86: Inline kvm_get_apic_mode() in lapic.h
KVM: x86: Clean up MSR_IA32_APICBASE_BASE code
- 2 -
-
-
-
2024-11-01
Sean Christopherson
New
[v2,3/9] KVM: x86: Get vcpu->arch.apic_base directly and drop kvm_get_apic_base()
KVM: x86: Clean up MSR_IA32_APICBASE_BASE code
- 2 -
-
-
-
2024-11-01
Sean Christopherson
New
[v2,2/9] KVM: x86: Drop superfluous kvm_lapic_set_base() call when setting APIC state
KVM: x86: Clean up MSR_IA32_APICBASE_BASE code
- 2 -
-
-
-
2024-11-01
Sean Christopherson
New
[v2,1/9] KVM: x86: Short-circuit all kvm_lapic_set_base() if MSR value isn't changing
KVM: x86: Clean up MSR_IA32_APICBASE_BASE code
- 2 -
-
-
-
2024-11-01
Sean Christopherson
New
KVM: SVM: Propagate error from snp_guest_req_init() to userspace
KVM: SVM: Propagate error from snp_guest_req_init() to userspace
- - -
-
-
-
2024-10-31
Sean Christopherson
New
KVM: nVMX: Treat vpid01 as current if L2 is active, but with VPID disabled
KVM: nVMX: Treat vpid01 as current if L2 is active, but with VPID disabled
- 1 1
-
-
-
2024-10-31
Sean Christopherson
New
[2/2] KVM: x86/mmu: Demote the WARN on yielded in xxx_cond_resched() to KVM_MMU_WARN_ON
KVM: x86/mmu: Micro-optimize TDP MMU cond_resched()
- - -
-
-
-
2024-10-31
Sean Christopherson
New
[1/2] KVM: x86/mmu: Check yielded_gfn for forward progress iff resched is needed
KVM: x86/mmu: Micro-optimize TDP MMU cond_resched()
- 1 -
-
-
-
2024-10-31
Sean Christopherson
New
KVM: selftests: Don't force -march=x86-64-v2 if it's unsupported
KVM: selftests: Don't force -march=x86-64-v2 if it's unsupported
- - -
-
-
-
2024-10-31
Sean Christopherson
New
[18/18] KVM: x86: Don't emit TLB flushes when aging SPTEs for mmu_notifiers
KVM: x86/mmu: A/D cleanups (on top of kvm_follow_pfn)
- - -
-
-
-
2024-10-11
Sean Christopherson
New
[17/18] KVM: Allow arch code to elide TLB flushes when aging a young page
KVM: x86/mmu: A/D cleanups (on top of kvm_follow_pfn)
- - -
-
-
-
2024-10-11
Sean Christopherson
New
[16/18] KVM: x86/mmu: Set Dirty bit for new SPTEs, even if _hardware_ A/D bits are disabled
KVM: x86/mmu: A/D cleanups (on top of kvm_follow_pfn)
- - -
-
-
-
2024-10-11
Sean Christopherson
New
[15/18] KVM: x86/mmu: Dedup logic for detecting TLB flushes on leaf SPTE changes
KVM: x86/mmu: A/D cleanups (on top of kvm_follow_pfn)
- - -
-
-
-
2024-10-11
Sean Christopherson
New
[14/18] KVM: x86/mmu: Stop processing TDP MMU roots for test_age if young SPTE found
KVM: x86/mmu: A/D cleanups (on top of kvm_follow_pfn)
- - -
-
-
-
2024-10-11
Sean Christopherson
New
[13/18] KVM: x86/mmu: Process only valid TDP MMU roots when aging a gfn range
KVM: x86/mmu: A/D cleanups (on top of kvm_follow_pfn)
- - -
-
-
-
2024-10-11
Sean Christopherson
New
[12/18] KVM: x86/mmu: Use Accessed bit even when _hardware_ A/D bits are disabled
KVM: x86/mmu: A/D cleanups (on top of kvm_follow_pfn)
- - -
-
-
-
2024-10-11
Sean Christopherson
New
[11/18] KVM: x86/mmu: Set shadow_dirty_mask for EPT even if A/D bits disabled
KVM: x86/mmu: A/D cleanups (on top of kvm_follow_pfn)
- - -
-
-
-
2024-10-11
Sean Christopherson
New
[10/18] KVM: x86/mmu: Set shadow_accessed_mask for EPT even if A/D bits disabled
KVM: x86/mmu: A/D cleanups (on top of kvm_follow_pfn)
- - -
-
-
-
2024-10-11
Sean Christopherson
New
[09/18] KVM: x86/mmu: Add a dedicated flag to track if A/D bits are globally enabled
KVM: x86/mmu: A/D cleanups (on top of kvm_follow_pfn)
- - -
-
-
-
2024-10-11
Sean Christopherson
New
[08/18] KVM: x86/mmu: WARN and flush if resolving a TDP MMU fault clears MMU-writable
KVM: x86/mmu: A/D cleanups (on top of kvm_follow_pfn)
- - -
-
-
-
2024-10-11
Sean Christopherson
New
[07/18] KVM: x86/mmu: Fold mmu_spte_update_no_track() into mmu_spte_update()
KVM: x86/mmu: A/D cleanups (on top of kvm_follow_pfn)
- - -
-
-
-
2024-10-11
Sean Christopherson
New
[06/18] KVM: x86/mmu: Drop ignored return value from kvm_tdp_mmu_clear_dirty_slot()
KVM: x86/mmu: A/D cleanups (on top of kvm_follow_pfn)
- - -
-
-
-
2024-10-11
Sean Christopherson
New
[05/18] KVM: x86/mmu: Don't flush TLBs when clearing Dirty bit in shadow MMU
KVM: x86/mmu: A/D cleanups (on top of kvm_follow_pfn)
- - -
-
-
-
2024-10-11
Sean Christopherson
New
[04/18] KVM: x86/mmu: Don't force flush if SPTE update clears Accessed bit
KVM: x86/mmu: A/D cleanups (on top of kvm_follow_pfn)
- - 1
-
-
-
2024-10-11
Sean Christopherson
New
[03/18] KVM: x86/mmu: Fold all of make_spte()'s writable handling into one if-else
KVM: x86/mmu: A/D cleanups (on top of kvm_follow_pfn)
- - -
-
-
-
2024-10-11
Sean Christopherson
New
[02/18] KVM: x86/mmu: Always set SPTE's dirty bit if it's created as writable
KVM: x86/mmu: A/D cleanups (on top of kvm_follow_pfn)
- - -
-
-
-
2024-10-11
Sean Christopherson
New
[01/18] KVM: x86/mmu: Flush remote TLBs iff MMU-writable flag is cleared from RO SPTE
KVM: x86/mmu: A/D cleanups (on top of kvm_follow_pfn)
- - -
-
-
-
2024-10-11
Sean Christopherson
New
[v13,85/85] KVM: Don't grab reference on VM_MIXEDMAP pfns that have a "struct page"
KVM: Stop grabbing references to PFNMAP'd pages
- - 1
-
-
-
2024-10-10
Sean Christopherson
New
[v13,84/85] KVM: Drop APIs that manipulate "struct page" via pfns
KVM: Stop grabbing references to PFNMAP'd pages
- 1 1
-
-
-
2024-10-10
Sean Christopherson
New
[v13,83/85] KVM: arm64: Don't mark "struct page" accessed when making SPTE young
KVM: Stop grabbing references to PFNMAP'd pages
- - 1
-
-
-
2024-10-10
Sean Christopherson
New
[v13,82/85] KVM: x86/mmu: Don't mark "struct page" accessed when zapping SPTEs
KVM: Stop grabbing references to PFNMAP'd pages
- - 1
-
-
-
2024-10-10
Sean Christopherson
New
[v13,81/85] KVM: Make kvm_follow_pfn.refcounted_page a required field
KVM: Stop grabbing references to PFNMAP'd pages
- - 1
-
-
-
2024-10-10
Sean Christopherson
New
[v13,80/85] KVM: s390: Use kvm_release_page_dirty() to unpin "struct page" memory
KVM: Stop grabbing references to PFNMAP'd pages
- - -
-
-
-
2024-10-10
Sean Christopherson
New
[v13,79/85] KVM: Drop gfn_to_pfn() APIs now that all users are gone
KVM: Stop grabbing references to PFNMAP'd pages
- - 1
-
-
-
2024-10-10
Sean Christopherson
New
[v13,78/85] KVM: PPC: Explicitly require struct page memory for Ultravisor sharing
KVM: Stop grabbing references to PFNMAP'd pages
- - -
-
-
-
2024-10-10
Sean Christopherson
New
[v13,77/85] KVM: arm64: Use __gfn_to_page() when copying MTE tags to/from userspace
KVM: Stop grabbing references to PFNMAP'd pages
- - 1
-
-
-
2024-10-10
Sean Christopherson
New
[v13,76/85] KVM: Add support for read-only usage of gfn_to_page()
KVM: Stop grabbing references to PFNMAP'd pages
- - 1
-
-
-
2024-10-10
Sean Christopherson
New
[v13,75/85] KVM: Convert gfn_to_page() to use kvm_follow_pfn()
KVM: Stop grabbing references to PFNMAP'd pages
- - 1
-
-
-
2024-10-10
Sean Christopherson
New
[v13,74/85] KVM: PPC: Use kvm_vcpu_map() to map guest memory to patch dcbz instructions
KVM: Stop grabbing references to PFNMAP'd pages
- - -
-
-
-
2024-10-10
Sean Christopherson
New
[v13,73/85] KVM: PPC: Remove extra get_page() to fix page refcount leak
KVM: Stop grabbing references to PFNMAP'd pages
- - -
-
-
-
2024-10-10
Sean Christopherson
New
[v13,72/85] KVM: MIPS: Use kvm_faultin_pfn() to map pfns into the guest
KVM: Stop grabbing references to PFNMAP'd pages
- - -
-
-
-
2024-10-10
Sean Christopherson
New
[v13,71/85] KVM: MIPS: Mark "struct page" pfns accessed prior to dropping mmu_lock
KVM: Stop grabbing references to PFNMAP'd pages
- - -
-
-
-
2024-10-10
Sean Christopherson
New
[v13,70/85] KVM: MIPS: Mark "struct page" pfns accessed only in "slow" page fault path
KVM: Stop grabbing references to PFNMAP'd pages
- - -
-
-
-
2024-10-10
Sean Christopherson
New
[v13,69/85] KVM: MIPS: Mark "struct page" pfns dirty only in "slow" page fault path
KVM: Stop grabbing references to PFNMAP'd pages
- - -
-
-
-
2024-10-10
Sean Christopherson
New
[v13,68/85] KVM: LoongArch: Use kvm_faultin_pfn() to map pfns into the guest
KVM: Stop grabbing references to PFNMAP'd pages
- - -
-
-
-
2024-10-10
Sean Christopherson
New
[v13,67/85] KVM: LoongArch: Mark "struct page" pfn accessed before dropping mmu_lock
KVM: Stop grabbing references to PFNMAP'd pages
- 1 -
-
-
-
2024-10-10
Sean Christopherson
New
[v13,66/85] KVM: LoongArch: Mark "struct page" pfns accessed only in "slow" page fault path
KVM: Stop grabbing references to PFNMAP'd pages
- 1 -
-
-
-
2024-10-10
Sean Christopherson
New
[v13,65/85] KVM: LoongArch: Mark "struct page" pfns dirty only in "slow" page fault path
KVM: Stop grabbing references to PFNMAP'd pages
- 1 -
-
-
-
2024-10-10
Sean Christopherson
New
[v13,64/85] KVM: PPC: Use kvm_faultin_pfn() to handle page faults on Book3s PR
KVM: Stop grabbing references to PFNMAP'd pages
- - -
-
-
-
2024-10-10
Sean Christopherson
New
[v13,63/85] KVM: PPC: Book3S: Mark "struct page" pfns dirty/accessed after installing PTE
KVM: Stop grabbing references to PFNMAP'd pages
- - -
-
-
-
2024-10-10
Sean Christopherson
New
[v13,62/85] KVM: PPC: Drop unused @kvm_ro param from kvmppc_book3s_instantiate_page()
KVM: Stop grabbing references to PFNMAP'd pages
- - -
-
-
-
2024-10-10
Sean Christopherson
New
[v13,61/85] KVM: PPC: Use __kvm_faultin_pfn() to handle page faults on Book3s Radix
KVM: Stop grabbing references to PFNMAP'd pages
- - -
-
-
-
2024-10-10
Sean Christopherson
New
[v13,60/85] KVM: PPC: Use __kvm_faultin_pfn() to handle page faults on Book3s HV
KVM: Stop grabbing references to PFNMAP'd pages
- - -
-
-
-
2024-10-10
Sean Christopherson
New
[v13,59/85] KVM: RISC-V: Use kvm_faultin_pfn() when mapping pfns into the guest
KVM: Stop grabbing references to PFNMAP'd pages
1 1 -
-
-
-
2024-10-10
Sean Christopherson
New
[v13,58/85] KVM: RISC-V: Mark "struct page" pfns accessed before dropping mmu_lock
KVM: Stop grabbing references to PFNMAP'd pages
1 1 -
-
-
-
2024-10-10
Sean Christopherson
New
[v13,57/85] KVM: RISC-V: Mark "struct page" pfns dirty iff a stage-2 PTE is installed
KVM: Stop grabbing references to PFNMAP'd pages
1 1 -
-
-
-
2024-10-10
Sean Christopherson
New
[v13,56/85] KVM: arm64: Use __kvm_faultin_pfn() to handle memory aborts
KVM: Stop grabbing references to PFNMAP'd pages
- - 1
-
-
-
2024-10-10
Sean Christopherson
New
[v13,55/85] KVM: arm64: Mark "struct page" pfns accessed/dirty before dropping mmu_lock
KVM: Stop grabbing references to PFNMAP'd pages
- - -
-
-
-
2024-10-10
Sean Christopherson
New
[v13,54/85] KVM: PPC: e500: Use __kvm_faultin_pfn() to handle page faults
KVM: Stop grabbing references to PFNMAP'd pages
- - -
-
-
-
2024-10-10
Sean Christopherson
New
[v13,53/85] KVM: PPC: e500: Mark "struct page" pfn accessed before dropping mmu_lock
KVM: Stop grabbing references to PFNMAP'd pages
- - -
-
-
-
2024-10-10
Sean Christopherson
New
[v13,52/85] KVM: PPC: e500: Mark "struct page" dirty in kvmppc_e500_shadow_map()
KVM: Stop grabbing references to PFNMAP'd pages
- - -
-
-
-
2024-10-10
Sean Christopherson
New
[v13,51/85] KVM: VMX: Use __kvm_faultin_page() to get APIC access page/pfn
KVM: Stop grabbing references to PFNMAP'd pages
- - 1
-
-
-
2024-10-10
Sean Christopherson
New
[v13,50/85] KVM: VMX: Hold mmu_lock until page is released when updating APIC access page
KVM: Stop grabbing references to PFNMAP'd pages
- - 1
-
-
-
2024-10-10
Sean Christopherson
New
[v13,49/85] KVM: Move x86's API to release a faultin page to common KVM
KVM: Stop grabbing references to PFNMAP'd pages
- - 1
-
-
-
2024-10-10
Sean Christopherson
New
[v13,48/85] KVM: x86/mmu: Don't mark unused faultin pages as accessed
KVM: Stop grabbing references to PFNMAP'd pages
- - 1
-
-
-
2024-10-10
Sean Christopherson
New
[v13,47/85] KVM: x86/mmu: Put refcounted pages instead of blindly releasing pfns
KVM: Stop grabbing references to PFNMAP'd pages
- - 1
-
-
-
2024-10-10
Sean Christopherson
New
[v13,46/85] KVM: guest_memfd: Provide "struct page" as output from kvm_gmem_get_pfn()
KVM: Stop grabbing references to PFNMAP'd pages
- - 1
-
-
-
2024-10-10
Sean Christopherson
New
[v13,45/85] KVM: guest_memfd: Pass index, not gfn, to __kvm_gmem_get_pfn()
KVM: Stop grabbing references to PFNMAP'd pages
- - -
-
-
-
2024-10-10
Sean Christopherson
New
[v13,44/85] KVM: x86/mmu: Convert page fault paths to kvm_faultin_pfn()
KVM: Stop grabbing references to PFNMAP'd pages
- - 1
-
-
-
2024-10-10
Sean Christopherson
New
[v13,43/85] KVM: Add kvm_faultin_pfn() to specifically service guest page faults
KVM: Stop grabbing references to PFNMAP'd pages
- - 1
-
-
-
2024-10-10
Sean Christopherson
New
[v13,42/85] KVM: Move declarations of memslot accessors up in kvm_host.h
KVM: Stop grabbing references to PFNMAP'd pages
- - 1
-
-
-
2024-10-10
Sean Christopherson
New
[v13,41/85] KVM: x86/mmu: Mark pages/folios dirty at the origin of make_spte()
KVM: Stop grabbing references to PFNMAP'd pages
- - 1
-
-
-
2024-10-10
Sean Christopherson
New
[v13,40/85] KVM: x86/mmu: Add helper to "finish" handling a guest page fault
KVM: Stop grabbing references to PFNMAP'd pages
- - 1
-
-
-
2024-10-10
Sean Christopherson
New
[v13,39/85] KVM: x86/mmu: Add common helper to handle prefetching SPTEs
KVM: Stop grabbing references to PFNMAP'd pages
- - 1
-
-
-
2024-10-10
Sean Christopherson
New
[v13,38/85] KVM: x86/mmu: Put direct prefetched pages via kvm_release_page_clean()
KVM: Stop grabbing references to PFNMAP'd pages
- - 1
-
-
-
2024-10-10
Sean Christopherson
New
«
1
2
3
4
…
43
44
»