Hi Sean,
On Tue Oct 15, 2024 at 3:58 PM UTC, Sean Christopherson wrote:
> Before we spend too much time cleaning things up, I want to first settle on
> the
> overall design, because it's not clear to me that punting
> HvTranslateVirtualAddress
> to userspace is a net positive. We agreed that VT
On Sun Jun 9, 2024 at 3:49 PM UTC, Nicolas Saenz Julienne wrote:
> Take into account access restrictions memory attributes when faulting
> guest memory. Prohibited memory accesses will cause an user-space fault
> exit.
>
> Additionally, bypass a warning in the !tdp case. Access
On Mon Jul 29, 2024 at 1:53 PM UTC, Vitaly Kuznetsov wrote:
> CAUTION: This email originated from outside of the organization. Do not click
> links or open attachments unless you can confirm the sender and know the
> content is safe.
> Nicolas Saenz Julienne writes:
>
> >
Hi Vitaly,
Thanks for having a look at this.
On Mon Jul 8, 2024 at 2:59 PM UTC, Vitaly Kuznetsov wrote:
> Nicolas Saenz Julienne writes:
>
> > Prepare infrastructure to be able to return data through the XMM
> > registers when Hyper-V hypercalls are issues in fast mode. The XMM
Hi Vitaly,
On Wed Jul 3, 2024 at 12:48 PM UTC, Vitaly Kuznetsov wrote:
> Nicolas Saenz Julienne writes:
>
> > Hi Sean,
> >
> > On Sun Jun 9, 2024 at 3:49 PM UTC, Nicolas Saenz Julienne wrote:
> >> This series introduces core KVM functionality necessary to emu
Hi Sean,
On Sun Jun 9, 2024 at 3:49 PM UTC, Nicolas Saenz Julienne wrote:
> This series introduces core KVM functionality necessary to emulate Hyper-V's
> Virtual Secure Mode in a Virtual Machine Monitor (VMM).
Just wanted to make sure the series is in your radar.
Thanks,
Nicolas
.
Additionally, select KVM_GENERIC_MEMORY_ATTRIBUTES when
CONFIG_KVM_HYPERV is enabled, as it's necessary in order to implement
VTL memory protections.
Signed-off-by: Nicolas Saenz Julienne
---
Documentation/virt/kvm/api.rst| 23 +++
arch/x86/kvm/Kconfig | 1 +
Introduce traces that track memory attributes modification.
Signed-off-by: Nicolas Saenz Julienne
---
include/trace/events/kvm.h | 20
virt/kvm/kvm_main.c| 2 ++
2 files changed, 22 insertions(+)
diff --git a/include/trace/events/kvm.h b/include/trace/events/kvm.h
emory
attributes are in use.
Signed-off-by: Nicolas Saenz Julienne
---
arch/x86/kvm/mmu/mmu.c | 64 --
arch/x86/kvm/mmu/mmutrace.h| 29 +++
arch/x86/kvm/mmu/paging_tmpl.h | 2 +-
include/linux/kvm_host.h | 4 +++
4 files changed, 87 inser
ses that have short-lived access restricted regions like
Hyper-V's VSM.
- A non-negated version of the flags has no way of expressing
non-access mapping (NR/NW/NX) without having to introduce an extra
flag (since 0 isn't available).
Signed-off-by: Nicolas Saenz Julienne
---
Systems that lack private memory support are about to start using memory
attributes. So query if the memory attributes xarray is empty in order
to decide whether it's necessary to init the hugepage information when
installing a new memslot.
Signed-off-by: Nicolas Saenz Julienne
---
arch/x8
In preparation to introducing RWX memory attributes, make sure
user-space is attempting to install a memory attribute with
KVM_MEMORY_ATTRIBUTE_PRIVATE before throwing a warning on systems with
no private memory support.
Signed-off-by: Nicolas Saenz Julienne
---
arch/x86/kvm/mmu/mmu.c | 8
g new sptes.
No functional change intended.
Signed-off-by: Nicolas Saenz Julienne
---
arch/x86/kvm/mmu/mmu.c | 6 +-
arch/x86/kvm/mmu/mmu_internal.h | 2 ++
arch/x86/kvm/mmu/tdp_mmu.c | 8 ++--
3 files changed, 13 insertions(+), 3 deletions(-)
diff --git a/arch/x86/kvm/mmu/
of this additional information is indicated by a new
capability, KVM_CAP_FAULT_EXIT_INSN_LEN.
Signed-off-by: Nicolas Saenz Julienne
---
Documentation/virt/kvm/api.rst | 6 +-
arch/x86/kvm/mmu/mmu_internal.h | 2 +-
arch/x86/kvm/x86.c | 1 +
include/linux/kvm_host.h| 3
Both VMX and SVM provide the length of the instruction
being run at the time of the page fault. Save it within 'struct
kvm_page_fault', as it'll become useful in the future.
Signed-off-by: Nicolas Saenz Julienne
---
arch/x86/kvm/mmu/mmu.c | 11 ---
a
ff-by: Anish Moorthy
Signed-off-by: Nicolas Saenz Julienne
---
Documentation/virt/kvm/api.rst | 5 +
include/linux/kvm_host.h | 9 -
include/uapi/linux/kvm.h | 3 +++
3 files changed, 16 insertions(+), 1 deletion(-)
diff --git a/Documentation/virt/kvm/api.rst b/Document
don't
enable VSM.
Signed-off-by: Nicolas Saenz Julienne
---
Documentation/virt/kvm/api.rst| 11 +++
arch/x86/kvm/hyperv.c | 7 +++
include/asm-generic/hyperv-tlfs.h | 1 +
3 files changed, 19 insertions(+)
diff --git a/Documentation/virt/kvm/api.rst b/Document
main VSM commit.
Signed-off-by: Nicolas Saenz Julienne
---
arch/x86/kvm/hyperv.c | 3 +++
include/asm-generic/hyperv-tlfs.h | 1 +
2 files changed, 4 insertions(+)
diff --git a/arch/x86/kvm/hyperv.c b/arch/x86/kvm/hyperv.c
index d0edc2bec5a4f..cbe2aca52514b 100644
--- a/arch/x8
Let user-space handle HvGetVpRegisters and HvSetVpRegisters as they are
VTL aware hypercalls used solely in the context of VSM. Additionally,
expose the cpuid bit.
Signed-off-by: Nicolas Saenz Julienne
---
Documentation/virt/kvm/api.rst| 10 ++
arch/x86/kvm/hyperv.c | 15
space.
Note that by re-using the readily available halt infrastructure in
KVM_RUN, MP_STATE_HV_INACTIVE_VTL correctly handles (or disables)
virtualisation features like the VMX preemption timer or APICv before
blocking.
Suggested-by: Maxim Levitsky
Signed-off-by: Nicolas Saenz Julienne
-
x27;t introduce a behaviour change otherwise.
User-space is accountable for the correct processing of the PV-IPI
before resuming execution.
Signed-off-by: Nicolas Saenz Julienne
---
arch/x86/kvm/hyperv.c | 19 ++-
1 file changed, 18 insertions(+), 1 deletion(-)
diff --git a/arch/x8
Both 'struct hv_send_ipi' and 'struct hv_send_ipi_ex' have an 'union
hv_input_vtl' parameter which has been ignored until now. Expose it, as
KVM will soon provide a way of dealing with VTL-aware IPIs. While doing
Also fixup __send_ipi_mask_ex().
Signed-off-by: Nic
Introduce a helper function to check if the guest exposes the VSM CPUID
bit.
Signed-off-by: Nicolas Saenz Julienne
---
arch/x86/kvm/hyperv.h | 10 ++
include/asm-generic/hyperv-tlfs.h | 1 +
2 files changed, 11 insertions(+)
diff --git a/arch/x86/kvm/hyperv.h b/arch/x86
Prepare infrastructure to be able to return data through the XMM
registers when Hyper-V hypercalls are issues in fast mode. The XMM
registers are exposed to user-space through KVM_EXIT_HYPERV_HCALL and
restored on successful hypercall completion.
Signed-off-by: Nicolas Saenz Julienne
---
There
hub.com/vianpl/linux/tree/vsm-v1
---
Anish Moorthy (1):
KVM: Define and communicate KVM_EXIT_MEMORY_FAULT RWX flags to
userspace
Nicolas Saenz Julienne (17):
KVM: x86: hyper-v: Introduce XMM output support
KVM: x86: hyper-v: Introduce helpers to check if VSM is exposed to
guest
hyp
On Fri Dec 1, 2023 at 5:47 PM UTC, Sean Christopherson wrote:
> CAUTION: This email originated from outside of the organization. Do not click
> links or open attachments unless you can confirm the sender and know the
> content is safe.
>
>
>
> On Fri, Dec 01, 2023, Nicolas
On Fri Dec 1, 2023 at 4:32 PM UTC, Sean Christopherson wrote:
> On Fri, Dec 01, 2023, Nicolas Saenz Julienne wrote:
> > > To support this I think that we can add a userspace msr filter on the
> > > HV_X64_MSR_HYPERCALL,
> > > although I am not 100% sure if a user
On Tue Nov 28, 2023 at 7:14 AM UTC, Maxim Levitsky wrote:
> On Wed, 2023-11-08 at 11:17 +0000, Nicolas Saenz Julienne wrote:
> > HVCALL_SEND_IPI and HVCALL_SEND_IPI_EX allow targeting specific a
> > specific VTL. Honour the requests.
> >
> > Signed-off-by: Nicolas Saenz
o EAX/RCX before calling the hypercall instruction in
> > order to be able to use the Hyper-V hypercall entry function.
> >
> > Guests can read an emulated code page offsets register to know the
> > offsets into the hypercall page for the VTL call/return entries.
> >
Hi Maxim,
On Tue Nov 28, 2023 at 6:56 AM UTC, Maxim Levitsky wrote:
> On Wed, 2023-11-08 at 11:17 +0000, Nicolas Saenz Julienne wrote:
> > From: Anel Orazgaliyeva
> >
> > Introduce KVM_CAP_APIC_ID_GROUPS, this capability segments the VM's APIC
> > ids into two. T
On Fri Nov 10, 2023 at 7:32 PM UTC, Sean Christopherson wrote:
> On Fri, Nov 10, 2023, Nicolas Saenz Julienne wrote:
> > On Wed Nov 8, 2023 at 6:33 PM UTC, Sean Christopherson wrote:
> > > - What is the split between userspace and KVM? How did you arrive at
> > &
On Wed Nov 8, 2023 at 4:55 PM UTC, Sean Christopherson wrote:
> > This RFC series introduces the necessary infrastructure to emulate VSM
> > enabled guests. It is a snapshot of the progress we made so far, and its
> > main goal is to gather design feedback.
>
> Heh, then please provide an overview
On Wed Nov 8, 2023 at 5:26 PM UTC, Sean Christopherson wrote:
> On Wed, Nov 08, 2023, Nicolas Saenz Julienne wrote:
> > With the upcoming introduction of per-VTL memory protections, make MMU
> > roles VTL aware. This will avoid sharing PTEs between vCPUs that belong
> > to dif
On Wed Nov 8, 2023 at 5:47 PM UTC, Sean Christopherson wrote:
> On Wed, Nov 08, 2023, Nicolas Saenz Julienne wrote:
> > From: Anel Orazgaliyeva
> >
> > Introduce KVM_CAP_APIC_ID_GROUPS, this capability segments the VM's APIC
> > ids into two. The lower bits, the
08, 2023, Nicolas Saenz Julienne wrote:
> > > This RFC series introduces the necessary infrastructure to emulate VSM
> > > enabled guests. It is a snapshot of the progress we made so far, and its
> > > main goal is to gather design feedback.
> >
> > Heh, th
On Wed Nov 8, 2023 at 11:40 AM UTC, Alexander Graf wrote:
> Hey Nicolas,
[...]
> > The series is accompanied by two repositories:
> > - A PoC QEMU implementation of VSM [3].
> > - VSM kvm-unit-tests [4].
> >
> > Note that this isn't a full VSM implementation. For now it only supports
> > 2 VT
On Wed Nov 8, 2023 at 11:53 AM UTC, Alexander Graf wrote:
[...]
> > @@ -285,6 +286,81 @@ static int patch_hypercall_page(struct kvm_vcpu *vcpu,
> > u64 data)
> > /* ret */
> > ((unsigned char *)instructions)[i++] = 0xc3;
> >
> > + /* VTL call/return entries */
> > + if (!kvm_xen_h
On Wed Nov 8, 2023 at 12:21 PM UTC, Alexander Graf wrote:
>
> On 08.11.23 12:17, Nicolas Saenz Julienne wrote:
> > Introduce two helper functions. The first one queries a vCPU's VTL
> > level, the second one, given a struct kvm_vcpu and VTL pair, returns the
> > c
On Wed Nov 8, 2023 at 12:49 PM UTC, Alexander Graf wrote:
>
> On 08.11.23 12:18, Nicolas Saenz Julienne wrote:
> > Introduce HVCALL_TRANSLATE_VIRTUAL_ADDRESS, the hypercall receives a
> > GVA, generally from a less privileged VTL, and returns the GPA backing
> > it. The
On Wed Nov 8, 2023 at 12:45 PM UTC, Alexander Graf wrote:
>
> On 08.11.23 12:18, Nicolas Saenz Julienne wrote:
> > Introduce a new request type, KVM_REQ_HV_INJECT_INTERCEPT which allows
> > injecting out-of-band Hyper-V secure intercepts. For now only memory
> > access
Introduce "Emulating Hyper-V VSM with KVM", which describes the KVM APIs
made available to a VMM that wants to emulate Hyper-V's VSM.
Signed-off-by: Nicolas Saenz Julienne
---
.../virt/kvm/x86/emulating-hyperv-vsm.rst | 136 ++
1 file changed, 136 insertions(
mpletion. Additionally we'd like to move the VTL aware parts to
user-space.
Signed-off-by: Nicolas Saenz Julienne
---
arch/x86/kvm/hyperv.c | 98 +++
arch/x86/kvm/trace.h | 23
include/asm-generic/hyperv-tlfs.h | 28 +
3
vCPU that took the fault will exit
to user-space with a memory fault.
Signed-off-by: Nicolas Saenz Julienne
---
arch/x86/kvm/hyperv.c | 27 +++
1 file changed, 27 insertions(+)
diff --git a/arch/x86/kvm/hyperv.c b/arch/x86/kvm/hyperv.c
index 38ee3abdef9c..983bf8af5f64 1
provided through struct kvm_vcpu_hv_intercept_info, and
injected into the guest through SynIC message.
Signed-off-by: Nicolas Saenz Julienne
---
arch/x86/include/asm/kvm_host.h | 10 +++
arch/x86/kvm/hyperv.c | 114
arch/x86/kvm/hyperv.h | 2
Save the length of the instruction that triggered an EPT violation in
struct kvm_vcpu_arch. This will be used to populate Hyper-V VSM memory
intercept messages.
Signed-off-by: Nicolas Saenz Julienne
---
arch/x86/include/asm/kvm_host.h | 2 ++
arch/x86/kvm/vmx/vmx.c | 1 +
2 files
t->map_writable'.
Non VSM users shouldn't see any behaviour change.
Signed-off-by: Nicolas Saenz Julienne
---
arch/x86/kvm/hyperv.c | 66 ++
arch/x86/kvm/hyperv.h | 1 +
arch/x86/kvm/mmu/mmu.c | 9 +-
3 files changed, 75 insertions(+),
Introduce struct hv_memory_intercept_message, which is used when issuing
memory intercepts to a Hyper-V VSM guest.
Signed-off-by: Nicolas Saenz Julienne
---
arch/x86/include/asm/hyperv-tlfs.h | 76 ++
1 file changed, 76 insertions(+)
diff --git a/arch/x86/include
y registered if the VSM cap is enabled.
Signed-off-by: Nicolas Saenz Julienne
---
arch/x86/kvm/hyperv.c| 68
arch/x86/kvm/hyperv.h| 3 ++
arch/x86/kvm/x86.c | 3 ++
include/uapi/linux/kvm.h | 5 +++
4 files changed, 79 insertions(+)
diff -
- KVM_MEMORY_ATTRIBUTE_NO_ACCESS
Although only some combinations are valid, see code comment below.
Signed-off-by: Nicolas Saenz Julienne
---
arch/x86/kvm/hyperv.c | 61 +++
1 file changed, 61 insertions(+)
diff --git a/arch/x86/kvm/hyperv.c b/arch/x86/kvm/hyperv.c
index
memory
protections of the backing memory, versus explicitly prohibiting any
access to that gfn.
These new memory attributes will, for now, only made be available
through the VSM KVM device (which we introduce in subsequent patches).
Signed-off-by: Nicolas Saenz Julienne
---
include/uapi/linux
Expose memory attribute helper functions even when
CONFIG_KVM_GENERIC_MEMORY_ATTRIBUTES is disabled. Other KVM features,
like Hyper-V VSM, make use of memory attributes but don't rely on the
KVM ioctl.
Signed-off-by: Nicolas Saenz Julienne
---
arch/x86/kvm/mmu/mmu.c | 2 +-
include/
reuse kvm_ioctl_set_mem_attributes() by decoupling it from struct kvm's
mem_attr_array. The xarray is now input as a function argument as well
as the list of supported memory attributes.
Signed-off-by: Nicolas Saenz Julienne
---
include/linux/kvm_host.h | 3 +++
virt/kvm/kvm_main.c
Pass the memory attribute array through struct kvm_mmu_notifier_arg and
use it in kvm_arch_post_set_memory_attributes() instead of defaulting on
kvm->mem_attr_array.
Signed-off-by: Nicolas Saenz Julienne
---
arch/x86/kvm/mmu/mmu.c | 8
include/linux/kvm_host.h | 5 -
virt/
Decouple kvm_range_has_memory_attributes() from struct kvm's
mem_attr_array to allow other memory attribute sources to use the
function.
Signed-off-by: Nicolas Saenz Julienne
---
arch/x86/kvm/mmu/mmu.c | 3 ++-
include/linux/kvm_host.h | 4 ++--
virt/kvm/kvm_main.c | 9 +
3
Decouple hugepage_has_attrs() from struct kvm's mem_attr_array to
allow other memory attribute sources to use the function.
Signed-off-by: Nicolas Saenz Julienne
---
arch/x86/kvm/mmu/mmu.c | 18 ++
1 file changed, 10 insertions(+), 8 deletions(-)
diff --git a/arch/x86/kv
Decouple kvm_get_memory_attributes() from struct kvm's mem_attr_array to
allow other memory attribute sources to use the function.
Signed-off-by: Nicolas Saenz Julienne
---
arch/x86/kvm/mmu/mmu.c | 5 +++--
include/linux/kvm_host.h | 8 +---
2 files changed, 8 insertions(+), 5 dele
VSM is also a user of memory attributes, so let it use
kvm_set_mem_attributes().
Signed-off-by: Nicolas Saenz Julienne
---
arch/x86/kvm/mmu/mmu.c | 6 --
1 file changed, 4 insertions(+), 2 deletions(-)
diff --git a/arch/x86/kvm/mmu/mmu.c b/arch/x86/kvm/mmu/mmu.c
index feca077c0210
Include the fault's read, write and execute status when exiting to
user-space.
Signed-off-by: Nicolas Saenz Julienne
---
arch/x86/kvm/mmu/mmu.c | 4 ++--
include/linux/kvm_host.h | 9 +++--
include/uapi/linux/kvm.h | 6 ++
3 files changed, 15 insertions(+), 4 deletions(-)
diff
The upcoming per-VTL memory protections support needs to fault in
non-executable memory. Introduce a new attribute in struct
kvm_page_fault, map_executable, to control whether the gfn range should
be mapped as executable.
No functional change intended.
Signed-off-by: Nicolas Saenz Julienne
hread re-entering the guest. This hardly affects
the use-cases stated above, but needs to be fixed.
- This was tested alongside a WIP Hyper-V Virtual Trust Level
implementation which makes ample use of the poll() interface.
Signed-off-by: Nicolas Saenz Julienne
---
arch/x86/kvm/x86.c
states there is a maximum of 16 levels.
Signed-off-by: Nicolas Saenz Julienne
---
arch/x86/include/asm/kvm_host.h | 3 ++-
arch/x86/kvm/hyperv.h | 6 ++
arch/x86/kvm/mmu.h | 1 +
arch/x86/kvm/mmu/mmu.c | 3 +++
4 files changed, 12 insertions(+), 1 deletion(-)
diff
KVM_EXIT_HYPERV_HVCALL exit.
Additionally, expose the cpuid bit.
Signed-off-by: Nicolas Saenz Julienne
---
arch/x86/kvm/hyperv.c | 15 +++
include/asm-generic/hyperv-tlfs.h | 7 ++-
2 files changed, 21 insertions(+), 1 deletion(-)
diff --git a/arch/x86/kvm/hyperv.c b/arch/x86/kvm
Let user-space handle HVCALL_GET_VP_REGISTERS and
HVCALL_SET_VP_REGISTERS through the KVM_EXIT_HYPERV_HVCALL exit reason.
Additionally, expose the cpuid bit.
Signed-off-by: Nicolas Saenz Julienne
---
arch/x86/kvm/hyperv.c | 9 +
include/asm-generic/hyperv-tlfs.h | 1 +
2
information
through a VTL KVM device attribute (the device is introduced in
subsequent patches).
Signed-off-by: Nicolas Saenz Julienne
---
arch/x86/include/uapi/asm/kvm.h | 5 +
arch/x86/kvm/hyperv.c | 8
arch/x86/kvm/hyperv.h | 2 ++
arch/x86/kvm/x86.c
ach level. VTL-vCPUs that belong to the same guest CPU share the
same physical APIC id, but belong to different APIC groups where the
apic group represents the vCPU's VTL.
Signed-off-by: Nicolas Saenz Julienne
---
arch/x86/kvm/hyperv.h | 18 ++
1 file changed, 18 insertions(+)
Introduce a new capability to enable Hyper-V Virtual Secure Mode (VSM)
emulation support.
Signed-off-by: Nicolas Saenz Julienne
---
arch/x86/include/asm/kvm_host.h | 2 ++
arch/x86/kvm/hyperv.h | 5 +
arch/x86/kvm/x86.c | 5 +
include/uapi/linux/kvm.h| 1
ject interrupts regardless of their runstate.
Signed-off-by: Nicolas Saenz Julienne
---
arch/x86/kvm/lapic.c | 7 ---
1 file changed, 4 insertions(+), 3 deletions(-)
diff --git a/arch/x86/kvm/lapic.c b/arch/x86/kvm/lapic.c
index f55d216cb2a0..8cc75b24381b 100644
--- a/arch/x86/kvm/lapic.c
+++
HVCALL_SEND_IPI and HVCALL_SEND_IPI_EX allow targeting specific a
specific VTL. Honour the requests.
Signed-off-by: Nicolas Saenz Julienne
---
arch/x86/kvm/hyperv.c | 24 +---
arch/x86/kvm/trace.h | 20
include/asm-generic/hyperv
le to use the Hyper-V hypercall entry function.
Guests can read an emulated code page offsets register to know the
offsets into the hypercall page for the VTL call/return entries.
Signed-off-by: Nicolas Saenz Julienne
---
My tree has the additional patch, we're still trying to understand
The hypercall page patching is about to grow considerably, move it into
its own function.
No functional change intended.
Signed-off-by: Nicolas Saenz Julienne
---
arch/x86/kvm/hyperv.c | 69 ---
1 file changed, 39 insertions(+), 30 deletions(-)
diff
Prepare infrastructure to be able to return data through the XMM
registers when Hyper-V hypercalls are issues in fast mode. The XMM
registers are exposed to user-space through KVM_EXIT_HYPERV_HCALL and
restored on successful hypercall completion.
Signed-off-by: Nicolas Saenz Julienne
---
arch
lapic.h has no dependencies with hyperv.h, so don't include it there.
Additionally, cpuid.c implicitly relied on hyperv.h's inclusion through
lapic.h, so include it explicitly there.
Signed-off-by: Nicolas Saenz Julienne
---
arch/x86/kvm/cpuid.c | 1 +
arch/x86/kvm/lapic.h | 1
igned-off-by: Anel Orazgaliyeva
Co-developed-by: Nicolas Saenz Julienne
Signed-off-by: Nicolas Saenz Julienne
---
arch/x86/include/asm/kvm_host.h | 3 ++
arch/x86/include/uapi/asm/kvm.h | 5 +++
arch/x86/kvm/lapic.c| 59 -
arch/x86/kvm/lapic.h
Hyper-V's Virtual Secure Mode (VSM) is a virtualisation security feature
that leverages the hypervisor to create secure execution environments
within a guest. VSM is documented as part of Microsoft's Hypervisor Top
Level Functional Specification [1]. Security features that build upon
VSM, like Wind
Signed-off-by: Nicolas Saenz Julienne
---
Documentation/kernel-parameters.txt | 6 ++
drivers/tty/serial/meson_uart.c | 22 ++
2 files changed, 28 insertions(+)
diff --git a/Documentation/kernel-parameters.txt
b/Documentation/kernel-parameters.txt
index 551ecf0
75 matches
Mail list logo