Toggle navigation
Patchwork
KVM development
Patches
Bundles
About this project
Login
Register
Mail settings
Show patches with
: Submitter =
Jim Mattson
| State =
Action Required
| 452 patches
Series
Submitter
State
any
Action Required
New
Under Review
Accepted
Rejected
RFC
Not Applicable
Changes Requested
Awaiting Upstream
Superseded
Deferred
Mainlined
Queued
Needs ACK
Handled Elsewhere
In Next
Search
Archived
No
Yes
Both
Delegate
------
Nobody
holtmann
holtmann
holtmann
agk
mchehab
mchehab
gregkh
gregkh
mtosatti
lethal
lethal
avi
cvaroqui
jbrassow
mikulas
dtor
bmarzins
tmlind
jmberg
jmberg
mcgrof
mcgrof
mcgrof
lenb
lenb
kyle
felipebalbi
varenet
helge
helge
khilman
khilman
khilman
khilman
jwoithe
mlin
Zhang Rui
Zhang Rui
iksaif
cjackiewicz
hmh
jbarnes
jbarnes
jbarnes
willy
snitzer
iwamatsu
dougsland
mjg59
rafael
rafael
rafael
ericvh@gmail.com
ykzhao
venkip
sandeen
pwsan
lucho@ionkov.net
rminnich
anholt
aystarik
roland
shefty
mason
glikely
krh
djbw
djbw
djbw
cmarinas
doyu
jrn
sage
tomba
mmarek
cjb
trondmy
jikos
bcousson
jic23
olof
olof
olof
nsekhar
weiny2
horms
horms
bwidawsk
bwidawsk
shemminger
eulfhan
josef
josef
josef
dianders
jpan9
hal
kdave
bleung
evalenti
jlbec
wsa
bhelgaas
vkoul
vkoul
szlin
davejiang
markgross
tagr
tiwai
vireshk
mmind
dledford
geert
geert
herbert
herbert
kvalo
kvalo
kvalo
bentiss
arend
rzwisler
stellarhopper
stellarhopper
jejb
matthias_bgg
dvhart
axboe
axboe
pcmoore
pcmoore
pcmoore
mkp
mkp
stefan_schmidt
leon
lucvoo
jsakkine
jsakkine
jsakkine
bamse
bamse
demarchi
krzk
groeck
groeck
sboyd
sboyd
mturquette
mturquette
0andriy
carlocaione
luca
dgc
kbingham
derosier
narmstrong
narmstrong
atull
tytso
tytso
djwong
bvanassche
omos
jpirko
jpirko
GustavoARSilva
pkshih
patersonc
brauner
shuahkh
shuahkh
shuahkh
palmer
palmer
jgg
Kishon
idosch
labbott
jsimmons
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
broonie
broonie
broonie
mricon
mricon
mricon
kees
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
arnd
linusw
perfinion
bbrezillon
bachradsusi
rostedt
rostedt
kholk
nbd
ebiggers
ebiggers
pavelm
sds
m0reeze
ganis
jwcart2
matttbe
andmur01
lorpie01
chanwoochoi
dlezcano
jhedberg
vudentz
robertfoss
bgix
tedd_an
tsbogend
wens
wcrobert
robher
kstewart
kwilczynski
hansg
bpf
netdev
dsa
ethtool
netdrv
martineau
abelloni
trix
pabeni
mani_sadhasivam
mlimonci
liusong6
mjp
tohojo
pmalani
prestwoj
prestwoj
dhowells
tzungbi
conchuod
paulmck
jes
mtkaczyk
colyli
cem
pateldipen1984
iweiny
iweiny
bjorn
mhiramat
JanKiszka
jaegeuk
mraynal
aring
konradybcio
ij
Hailan
jstitt007
denkenz
denkenz
mkorenbl
jjohnson
frank_li
geliang
mdraidci
mdraidci
peluse
joelgranados
Apply
«
1
2
3
4
…
4
5
»
Patch
Series
A/R/T
S/W/F
Date
Submitter
Delegate
State
[v3,3/3] kvm: call kvm_arch_destroy_vm if vm creation fails
kvm: call kvm_arch_destroy_vm if vm creation fails
- 1 -
-
-
-
2019-10-24
Jim Mattson
New
[v3,2/3] kvm: Allocate memslots and buses before calling kvm_arch_init_vm
kvm: call kvm_arch_destroy_vm if vm creation fails
- 1 -
-
-
-
2019-10-24
Jim Mattson
New
[v3,1/3] kvm: Don't clear reference count on kvm_create_vm() error path
kvm: call kvm_arch_destroy_vm if vm creation fails
- 1 -
-
-
-
2019-10-24
Jim Mattson
New
[v2] kvm: x86: Add cr3 to struct kvm_debug_exit_arch
[v2] kvm: x86: Add cr3 to struct kvm_debug_exit_arch
- - -
-
-
-
2019-10-24
Jim Mattson
New
[v2] kvm: call kvm_arch_destroy_vm if vm creation fails
[v2] kvm: call kvm_arch_destroy_vm if vm creation fails
- 1 -
-
-
-
2019-10-23
Jim Mattson
New
kvm: call kvm_arch_destroy_vm if vm creation fails
kvm: call kvm_arch_destroy_vm if vm creation fails
- - -
-
-
-
2019-10-23
Jim Mattson
New
kvm: cpuid: Expose leaves 0x80000005 and 0x80000006 to the guest
kvm: cpuid: Expose leaves 0x80000005 and 0x80000006 to the guest
- - -
-
-
-
2019-10-22
Jim Mattson
New
[v5] KVM: nVMX: Don't leak L1 MMIO regions to L2
[v5] KVM: nVMX: Don't leak L1 MMIO regions to L2
- 2 -
-
-
-
2019-10-15
Jim Mattson
New
[v4] KVM: nVMX: Don't leak L1 MMIO regions to L2
[v4] KVM: nVMX: Don't leak L1 MMIO regions to L2
- 2 -
-
-
-
2019-10-15
Jim Mattson
New
[v3] KVM: nVMX: Don't leak L1 MMIO regions to L2
[v3] KVM: nVMX: Don't leak L1 MMIO regions to L2
- 1 -
-
-
-
2019-10-10
Jim Mattson
New
[v2] KVM: nVMX: Don't leak L1 MMIO regions to L2
[v2] KVM: nVMX: Don't leak L1 MMIO regions to L2
- 1 -
-
-
-
2019-10-09
Jim Mattson
New
kvm: x86: Expose RDPID in KVM_GET_SUPPORTED_CPUID
kvm: x86: Expose RDPID in KVM_GET_SUPPORTED_CPUID
- - -
-
-
-
2019-10-04
Jim Mattson
New
KVM: nVMX: Don't leak L1 MMIO regions to L2
KVM: nVMX: Don't leak L1 MMIO regions to L2
- 4 -
-
-
-
2019-10-04
Jim Mattson
New
[v2] kvm: x86: Improve emulation of CPUID leaves 0BH and 1FH
[v2] kvm: x86: Improve emulation of CPUID leaves 0BH and 1FH
- 1 -
-
-
-
2019-09-30
Jim Mattson
New
kvm: vmx: Limit guest PMCs to those supported on the host
kvm: vmx: Limit guest PMCs to those supported on the host
- 1 -
-
-
-
2019-09-30
Jim Mattson
New
[2/2] kvm: x86: Use AMD CPUID semantics for AMD vCPUs
[1/2] kvm: x86: Improve emulation of CPUID leaves 0BH and 1FH
- 3 -
-
-
-
2019-09-26
Jim Mattson
New
[1/2] kvm: x86: Improve emulation of CPUID leaves 0BH and 1FH
[1/2] kvm: x86: Improve emulation of CPUID leaves 0BH and 1FH
- 3 -
-
-
-
2019-09-26
Jim Mattson
New
kvm: x86: Fix a spurious -E2BIG in __do_cpuid_func
kvm: x86: Fix a spurious -E2BIG in __do_cpuid_func
- 2 -
-
-
-
2019-09-25
Jim Mattson
New
kvm: x86: Enumerate support for CLZERO instruction
kvm: x86: Enumerate support for CLZERO instruction
- - -
-
-
-
2019-09-24
Jim Mattson
New
[kvm-unit-tests,v2] kvm-unit-test: x86: Add RDPRU test
[kvm-unit-tests,v2] kvm-unit-test: x86: Add RDPRU test
- 2 -
-
-
-
2019-09-20
Jim Mattson
New
[kvm-unit-tests] kvm-unit-test: x86: Add RDPRU test
[kvm-unit-tests] kvm-unit-test: x86: Add RDPRU test
- 1 -
-
-
-
2019-09-19
Jim Mattson
New
kvm: svm: Intercept RDPRU
kvm: svm: Intercept RDPRU
- 4 -
-
-
-
2019-09-19
Jim Mattson
New
[RFC] kvm: x86: Improve emulation of CPUID leaves 0BH and 1FH
[RFC] kvm: x86: Improve emulation of CPUID leaves 0BH and 1FH
- 3 -
-
-
-
2019-09-12
Jim Mattson
New
kvm: x86: Add "significant index" flag to a few CPUID leaves
kvm: x86: Add "significant index" flag to a few CPUID leaves
- 3 -
-
-
-
2019-09-12
Jim Mattson
New
[kvm-unit-tests] x86: Skip APIC-access address tests beyond mapped RAM
[kvm-unit-tests] x86: Skip APIC-access address tests beyond mapped RAM
- - -
-
-
-
2019-09-10
Jim Mattson
New
[RFC,v2,1/1] KVM: nVMX: Don't leak L1 MMIO regions to L2
KVM: nVMX: Don't leak L1 MMIO regions to L2
- 4 -
-
-
-
2019-09-09
Jim Mattson
New
[RFC] KVM: nVMX: Don't leak L1 MMIO regions to L2
[RFC] KVM: nVMX: Don't leak L1 MMIO regions to L2
- 3 -
-
-
-
2019-09-06
Jim Mattson
New
kvm: x86: Add Intel PMU MSRs to msrs_to_save[]
kvm: x86: Add Intel PMU MSRs to msrs_to_save[]
- 2 -
-
-
-
2019-08-21
Jim Mattson
New
kvm: x86: Pass through AMD_STIBP_ALWAYS_ON in GET_SUPPORTED_CPUID
kvm: x86: Pass through AMD_STIBP_ALWAYS_ON in GET_SUPPORTED_CPUID
- 1 -
-
-
-
2019-06-27
Jim Mattson
New
kvm: nVMX: Remove unnecessary sync_roots from handle_invept
kvm: nVMX: Remove unnecessary sync_roots from handle_invept
- 1 -
-
-
-
2019-06-13
Jim Mattson
New
[2/2] kvm: x86: Include CPUID leaf 0x8000001e in kvm's supported CPUID
[1/2] kvm: x86: Include multiple indices with CPUID leaf 0x8000001d
- 2 -
-
-
-
2019-03-27
Jim Mattson
New
[1/2] kvm: x86: Include multiple indices with CPUID leaf 0x8000001d
[1/2] kvm: x86: Include multiple indices with CPUID leaf 0x8000001d
- 2 -
-
-
-
2019-03-27
Jim Mattson
New
[v2,2/2] kvm: x86: Clear {ebx,ecx,edx} from CPUID leaf 9
[v2,1/2] kvm: x86: Clear {ebx,ecx,edx} from CPUID leaf 0x8000001a
- 1 -
-
-
-
2019-02-08
Jim Mattson
New
[v2,1/2] kvm: x86: Clear {ebx,ecx,edx} from CPUID leaf 0x8000001a
[v2,1/2] kvm: x86: Clear {ebx,ecx,edx} from CPUID leaf 0x8000001a
- 2 -
-
-
-
2019-02-08
Jim Mattson
New
kvm: x86: Clear {ebx,ecx,edx} from CPUID leaf 0x8000001a
kvm: x86: Clear {ebx,ecx,edx} from CPUID leaf 0x8000001a
- 3 -
-
-
-
2019-02-08
Jim Mattson
New
[2/2] kvm: x86: IA32_ARCH_CAPABILITIES may be emulated on Intel
[1/2] kvm: x86: IA32_ARCH_CAPABILITIES is only emulated for Intel
- 2 1
-
-
-
2019-01-28
Jim Mattson
New
[1/2] kvm: x86: IA32_ARCH_CAPABILITIES is only emulated for Intel
[1/2] kvm: x86: IA32_ARCH_CAPABILITIES is only emulated for Intel
- 2 1
-
-
-
2019-01-28
Jim Mattson
New
KVM: nVMX: Fix size checks in vmx_set_nested_state
KVM: nVMX: Fix size checks in vmx_set_nested_state
- 4 -
-
-
-
2019-01-17
Jim Mattson
New
[kvm-unit-tests] Add VMX INS/OUTS test
[kvm-unit-tests] Add VMX INS/OUTS test
- 1 -
-
-
-
2019-01-11
Jim Mattson
New
kvm: Disallow wraparound in kvm_gfn_to_hva_cache_init
kvm: Disallow wraparound in kvm_gfn_to_hva_cache_init
- 2 -
-
-
-
2018-12-17
Jim Mattson
New
[v2] kvm: Change offset in kvm_write_guest_offset_cached to unsigned
[v2] kvm: Change offset in kvm_write_guest_offset_cached to unsigned
- 4 -
-
-
-
2018-12-14
Jim Mattson
New
kvm: Change offset in kvm_write_guest_offset_cached to unsigned
kvm: Change offset in kvm_write_guest_offset_cached to unsigned
- 4 -
-
-
-
2018-12-13
Jim Mattson
New
kvm: vmx: Pass through IA32_TSC_AUX for read iff guest has RDTSCP
kvm: vmx: Pass through IA32_TSC_AUX for read iff guest has RDTSCP
- 4 -
-
-
-
2018-12-13
Jim Mattson
New
[v4,5/5] kvm: vmx: Stop wasting a page for guest_msrs
Various guest_msrs cleanups
- 2 -
-
-
-
2018-12-05
Jim Mattson
New
[v4,4/5] kvm: vmx: Skip all SYSCALL MSRs in setup_msrs() when !EFER.SCE
Various guest_msrs cleanups
- 2 -
-
-
-
2018-12-05
Jim Mattson
New
[v4,3/5] kvm: vmx: Don't set hardware IA32_CSTAR MSR on VM-entry
Various guest_msrs cleanups
- 1 -
-
-
-
2018-12-05
Jim Mattson
New
[v4,2/5] kvm: vmx: Document the need for MSR_STAR in i386 builds
Various guest_msrs cleanups
- 1 -
-
-
-
2018-12-05
Jim Mattson
New
[v4,1/5] kvm: vmx: Set IA32_TSC_AUX for legacy mode guests
Various guest_msrs cleanups
- 4 -
-
-
-
2018-12-05
Jim Mattson
New
[kvm-unit-tests] kvm: nVMX: Always VMCLEAR before the first VMPTRLD
[kvm-unit-tests] kvm: nVMX: Always VMCLEAR before the first VMPTRLD
- 1 -
-
-
-
2018-11-29
Jim Mattson
New
[kvm-unit-tests] x86: nVMX: Test VMPTRLD with operand outside of backed memory
[kvm-unit-tests] x86: nVMX: Test VMPTRLD with operand outside of backed memory
- 2 -
-
-
-
2018-11-26
Jim Mattson
New
[v2] kvm: vmx: Rename vmx_instruction_info to vm_exit_instruction_info
[v2] kvm: vmx: Rename vmx_instruction_info to vm_exit_instruction_info
- 1 -
-
-
-
2018-11-26
Jim Mattson
New
[v2,2/2] kvm: nVMX: interrupt-window exiting should wake L2 from HLT
[v2,1/2] kvm: nVMX: NMI-window exiting should wake L2 from HLT
- 2 -
-
-
-
2018-11-26
Jim Mattson
New
[v2,1/2] kvm: nVMX: NMI-window exiting should wake L2 from HLT
[v2,1/2] kvm: nVMX: NMI-window exiting should wake L2 from HLT
- 1 -
-
-
-
2018-11-26
Jim Mattson
New
[kvm-unit-tests,2/2] x86: nVMX: Basic test of interrupt-window exiting
[kvm-unit-tests,1/2] x86: nVMX: Basic test of NMI-window exiting
- 1 -
-
-
-
2018-11-21
Jim Mattson
New
[kvm-unit-tests,1/2] x86: nVMX: Basic test of NMI-window exiting
[kvm-unit-tests,1/2] x86: nVMX: Basic test of NMI-window exiting
- 1 -
-
-
-
2018-11-21
Jim Mattson
New
[2/2] kvm: nVMX: interrupt-window exiting should wake L2 from HLT
[1/2] kvm: nVMX: NMI-window exiting should wake L2 from HLT
- 1 -
-
-
-
2018-11-21
Jim Mattson
New
[1/2] kvm: nVMX: NMI-window exiting should wake L2 from HLT
[1/2] kvm: nVMX: NMI-window exiting should wake L2 from HLT
- 1 -
-
-
-
2018-11-21
Jim Mattson
New
kvm: vmx: Rename vmx_instruction_info to vm_exit_instruction_info
kvm: vmx: Rename vmx_instruction_info to vm_exit_instruction_info
- 2 -
-
-
-
2018-11-19
Jim Mattson
New
[v3,4/4] kvm: vmx: Skip all SYSCALL MSRs in setup_msrs() when !EFER.SCE
[v3,1/4] kvm: vmx: Set IA32_TSC_AUX for legacy mode guests
- 2 -
-
-
-
2018-11-12
Jim Mattson
New
[v3,3/4] kvm: vmx: Don't set hardware IA32_CSTAR MSR on VM-entry
[v3,1/4] kvm: vmx: Set IA32_TSC_AUX for legacy mode guests
- 1 -
-
-
-
2018-11-12
Jim Mattson
New
[v3,2/4] kvm: vmx: Document the need for MSR_STAR in i386 builds
[v3,1/4] kvm: vmx: Set IA32_TSC_AUX for legacy mode guests
- 1 -
-
-
-
2018-11-12
Jim Mattson
New
[v3,1/4] kvm: vmx: Set IA32_TSC_AUX for legacy mode guests
[v3,1/4] kvm: vmx: Set IA32_TSC_AUX for legacy mode guests
- 3 -
-
-
-
2018-11-12
Jim Mattson
New
[v2,4/4] kvm: vmx: Skip all SYSCALL MSRs in setup_msrs() when !EFER.SCE
[v2,1/4] kvm: vmx: Set IA32_TSC_AUX for legacy mode guests
- 2 -
-
-
-
2018-11-09
Jim Mattson
New
[v2,3/4] kvm: vmx: Don't set hardware IA32_CSTAR MSR on VM-entry
[v2,1/4] kvm: vmx: Set IA32_TSC_AUX for legacy mode guests
- 2 -
-
-
-
2018-11-09
Jim Mattson
New
[v2,2/4] kvm: vmx: Omit MSR_STAR from vmx_msr_index[] for i386 builds
[v2,1/4] kvm: vmx: Set IA32_TSC_AUX for legacy mode guests
- 2 -
-
-
-
2018-11-09
Jim Mattson
New
[v2,1/4] kvm: vmx: Set IA32_TSC_AUX for legacy mode guests
[v2,1/4] kvm: vmx: Set IA32_TSC_AUX for legacy mode guests
- 3 -
-
-
-
2018-11-09
Jim Mattson
New
kvm: vmx: Allow guest read access to IA32_TSC
kvm: vmx: Allow guest read access to IA32_TSC
- 3 -
-
-
-
2018-11-09
Jim Mattson
New
kvm: vmx: Set IA32_TSC_AUX for legacy mode guests
kvm: vmx: Set IA32_TSC_AUX for legacy mode guests
- 3 -
-
-
-
2018-11-09
Jim Mattson
New
[kvm-unit-tests,v2] x86: nVMX: Test of IA32_TSC on VM-exit MSR-store list
[kvm-unit-tests,v2] x86: nVMX: Test of IA32_TSC on VM-exit MSR-store list
- 3 -
-
-
-
2018-11-08
Jim Mattson
New
[kvm-unit-tests] x86: nVMX: Test of IA32_TSC on VM-exit MSR-store list
[kvm-unit-tests] x86: nVMX: Test of IA32_TSC on VM-exit MSR-store list
- 3 -
-
-
-
2018-11-07
Jim Mattson
New
kvm: x86: Don't modify MSR_PLATFORM_INFO on vCPU reset
kvm: x86: Don't modify MSR_PLATFORM_INFO on vCPU reset
- 1 -
-
-
-
2018-10-30
Jim Mattson
New
[v4] kvm: x86: Disallow invalid exceptions from userspace
[v4] kvm: x86: Disallow invalid exceptions from userspace
- 1 -
-
-
-
2018-10-23
Jim Mattson
New
[v4] kvm: x86: Bounds-check argument to x86_exception_has_error_code
[v4] kvm: x86: Bounds-check argument to x86_exception_has_error_code
- - -
-
-
-
2018-10-23
Jim Mattson
New
[v2,7/7] kvm: x86: Introduce KVM_CAP_EXCEPTION_PAYLOAD
[v2,1/7] KVM: Documentation: Fix omission in struct kvm_vcpu_events
- - -
-
-
-
2018-10-16
Jim Mattson
New
[v2,6/7] kvm: vmx: Defer setting of DR6 until #DB delivery
[v2,1/7] KVM: Documentation: Fix omission in struct kvm_vcpu_events
- - -
-
-
-
2018-10-16
Jim Mattson
New
[v2,5/7] kvm: x86: Defer setting of CR2 until #PF delivery
[v2,1/7] KVM: Documentation: Fix omission in struct kvm_vcpu_events
- - -
-
-
-
2018-10-16
Jim Mattson
New
[v2,4/7] kvm: x86: Add payload operands to kvm_multiple_exception
[v2,1/7] KVM: Documentation: Fix omission in struct kvm_vcpu_events
- - -
-
-
-
2018-10-16
Jim Mattson
New
[v2,3/7] kvm: x86: Add exception payload fields to kvm_vcpu_events
[v2,1/7] KVM: Documentation: Fix omission in struct kvm_vcpu_events
- - -
-
-
-
2018-10-16
Jim Mattson
New
[v2,2/7] kvm: x86: Add has_payload and payload to kvm_queued_exception
[v2,1/7] KVM: Documentation: Fix omission in struct kvm_vcpu_events
- - -
-
-
-
2018-10-16
Jim Mattson
New
[v2,1/7] KVM: Documentation: Fix omission in struct kvm_vcpu_events
[v2,1/7] KVM: Documentation: Fix omission in struct kvm_vcpu_events
- - -
-
-
-
2018-10-16
Jim Mattson
New
[v3,2/2] kvm: x86: Disallow invalid exceptions from userspace
[v3,1/2] kvm: x86: Bounds-check argument to x86_exception_has_error_code
- 1 -
-
-
-
2018-10-15
Jim Mattson
New
[v3,1/2] kvm: x86: Bounds-check argument to x86_exception_has_error_code
[v3,1/2] kvm: x86: Bounds-check argument to x86_exception_has_error_code
- 3 -
-
-
-
2018-10-15
Jim Mattson
New
[v2,2/2] kvm: x86: Disallow invalid exceptions from userspace
[v2,1/2] kvm: x86: Bounds-check argument to x86_exception_has_error_code
- 1 -
-
-
-
2018-10-15
Jim Mattson
New
[v2,1/2] kvm: x86: Bounds-check argument to x86_exception_has_error_code
[v2,1/2] kvm: x86: Bounds-check argument to x86_exception_has_error_code
- 2 -
-
-
-
2018-10-15
Jim Mattson
New
[2/2] kvm: x86: Disallow invalid exceptions from userspace
[1/2] kvm: x86: Bounds-check argument to x86_exception_has_error_code
- 1 -
-
-
-
2018-10-12
Jim Mattson
New
[1/2] kvm: x86: Bounds-check argument to x86_exception_has_error_code
[1/2] kvm: x86: Bounds-check argument to x86_exception_has_error_code
- 2 -
-
-
-
2018-10-12
Jim Mattson
New
kvm: x86: #DF only has an error code in protected mode
kvm: x86: #DF only has an error code in protected mode
- 1 -
-
-
-
2018-10-12
Jim Mattson
New
[5/5] kvm: x86: Introduce KVM_CAP_EXCEPTION_PAYLOAD
[1/5] kvm: x86: Add payload to kvm_queued_exception and kvm_vcpu_events
- 2 -
-
-
-
2018-10-08
Jim Mattson
New
[4/5] kvm: vmx: Defer setting of DR6 until #DB delivery
[1/5] kvm: x86: Add payload to kvm_queued_exception and kvm_vcpu_events
- 2 -
-
-
-
2018-10-08
Jim Mattson
New
[3/5] kvm: x86: Defer setting of CR2 until #PF delivery
[1/5] kvm: x86: Add payload to kvm_queued_exception and kvm_vcpu_events
- 2 -
-
-
-
2018-10-08
Jim Mattson
New
[2/5] kvm: x86: Add payload operands to kvm_multiple_exception
[1/5] kvm: x86: Add payload to kvm_queued_exception and kvm_vcpu_events
- 2 -
-
-
-
2018-10-08
Jim Mattson
New
[1/5] kvm: x86: Add payload to kvm_queued_exception and kvm_vcpu_events
[1/5] kvm: x86: Add payload to kvm_queued_exception and kvm_vcpu_events
- 2 -
-
-
-
2018-10-08
Jim Mattson
New
kvm: vmx: Remove a mysterious FIXME
kvm: vmx: Remove a mysterious FIXME
- 1 -
-
-
-
2018-09-25
Jim Mattson
New
[v2] KVM: nVMX: Unrestricted guest mode requires EPT
[v2] KVM: nVMX: Unrestricted guest mode requires EPT
- 4 -
-
-
-
2018-09-24
Jim Mattson
New
KVM: x86: Remove documentation for KVM_CAP_INTR_SHADOW
KVM: x86: Remove documentation for KVM_CAP_INTR_SHADOW
- - -
-
-
-
2018-09-21
Jim Mattson
New
[kvm-unit-tests,v2] x86: nVMX: Basic test of #DB intercept in L1
[kvm-unit-tests,v2] x86: nVMX: Basic test of #DB intercept in L1
- 1 -
-
-
-
2018-09-21
Jim Mattson
New
[kvm-unit-tests] x86: nVMX: Basic test of #DB intercept in L1
[kvm-unit-tests] x86: nVMX: Basic test of #DB intercept in L1
- 1 -
-
-
-
2018-09-21
Jim Mattson
New
[v2] KVM: nVMX: Clear reserved bits of #DB exit qualification
[v2] KVM: nVMX: Clear reserved bits of #DB exit qualification
- 1 -
-
-
-
2018-09-21
Jim Mattson
New
KVM: nVMX: Clear reserved bits of #DB exit qualification
KVM: nVMX: Clear reserved bits of #DB exit qualification
- - -
-
-
-
2018-09-20
Jim Mattson
New
KVM: nVMX: L0 should emulate instructions for L2
KVM: nVMX: L0 should emulate instructions for L2
- - -
-
-
-
2018-09-17
Jim Mattson
New
«
1
2
3
4
…
4
5
»