Toggle navigation
Patchwork
KVM development
Patches
Bundles
About this project
Login
Register
Mail settings
Show patches with
: Submitter =
Krish Sadhukhan
| State =
Action Required
| 384 patches
Series
Submitter
State
any
Action Required
New
Under Review
Accepted
Rejected
RFC
Not Applicable
Changes Requested
Awaiting Upstream
Superseded
Deferred
Mainlined
Queued
Needs ACK
Handled Elsewhere
In Next
Search
Archived
No
Yes
Both
Delegate
------
Nobody
holtmann
holtmann
holtmann
agk
mchehab
mchehab
gregkh
gregkh
mtosatti
lethal
lethal
avi
cvaroqui
jbrassow
mikulas
dtor
bmarzins
tmlind
jmberg
jmberg
mcgrof
mcgrof
mcgrof
lenb
lenb
kyle
felipebalbi
varenet
helge
helge
khilman
khilman
khilman
khilman
jwoithe
mlin
Zhang Rui
Zhang Rui
iksaif
cjackiewicz
hmh
jbarnes
jbarnes
jbarnes
willy
snitzer
iwamatsu
dougsland
mjg59
rafael
rafael
rafael
ericvh@gmail.com
ykzhao
venkip
sandeen
pwsan
lucho@ionkov.net
rminnich
anholt
aystarik
roland
shefty
mason
glikely
krh
djbw
djbw
djbw
cmarinas
doyu
jrn
sage
tomba
mmarek
cjb
trondmy
jikos
bcousson
jic23
olof
olof
olof
nsekhar
weiny2
horms
horms
bwidawsk
bwidawsk
shemminger
eulfhan
josef
josef
josef
dianders
jpan9
hal
kdave
bleung
evalenti
jlbec
wsa
bhelgaas
vkoul
vkoul
szlin
davejiang
markgross
tagr
tiwai
vireshk
mmind
dledford
geert
geert
herbert
herbert
kvalo
kvalo
kvalo
bentiss
arend
rzwisler
stellarhopper
stellarhopper
jejb
matthias_bgg
dvhart
axboe
axboe
pcmoore
pcmoore
pcmoore
mkp
mkp
stefan_schmidt
leon
lucvoo
jsakkine
jsakkine
jsakkine
bamse
bamse
demarchi
krzk
groeck
groeck
sboyd
sboyd
mturquette
mturquette
0andriy
carlocaione
luca
dgc
kbingham
derosier
narmstrong
narmstrong
atull
tytso
tytso
djwong
bvanassche
omos
jpirko
jpirko
GustavoARSilva
pkshih
patersonc
brauner
shuahkh
shuahkh
shuahkh
palmer
palmer
jgg
Kishon
idosch
labbott
jsimmons
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
broonie
broonie
broonie
mricon
mricon
mricon
kees
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
arnd
linusw
perfinion
bbrezillon
bachradsusi
rostedt
rostedt
kholk
nbd
ebiggers
ebiggers
pavelm
sds
m0reeze
ganis
jwcart2
matttbe
andmur01
lorpie01
chanwoochoi
dlezcano
jhedberg
vudentz
robertfoss
bgix
tedd_an
tsbogend
wens
wcrobert
robher
kstewart
kwilczynski
hansg
bpf
netdev
dsa
ethtool
netdrv
martineau
abelloni
trix
pabeni
mani_sadhasivam
mlimonci
liusong6
mjp
tohojo
pmalani
prestwoj
prestwoj
dhowells
tzungbi
conchuod
paulmck
jes
mtkaczyk
colyli
cem
pateldipen1984
iweiny
iweiny
bjorn
mhiramat
JanKiszka
jaegeuk
mraynal
aring
konradybcio
ij
Hailan
jstitt007
denkenz
denkenz
mkorenbl
jjohnson
frank_li
geliang
mdraidci
mdraidci
peluse
joelgranados
Apply
«
1
2
3
4
»
Patch
Series
A/R/T
S/W/F
Date
Submitter
Delegate
State
[1/2,v3] KVM: nVMX: Check GUEST_DR7 on vmentry of nested guests
KVM: nVMX: Check GUEST_DR7 on vmentry of nested guests
- 1 -
-
-
-
2020-01-16
Krish Sadhukhan
New
[2/2,v2] kvm-unit-test: nVMX: Test GUEST_DR7 on vmentry of nested guests
KVM: nVMX: Check GUEST_DR7 on vmentry of nested guests
- 1 -
-
-
-
2020-01-15
Krish Sadhukhan
New
[1/2,v2] KVM: nVMX: Check GUEST_DR7 on vmentry of nested guests
KVM: nVMX: Check GUEST_DR7 on vmentry of nested guests
- 1 -
-
-
-
2020-01-15
Krish Sadhukhan
New
[4/4] kvm-unit-test: nVMX: Test GUEST_SYSENTER_ESP and GUEST_SYSENTER_EIP on vmentry of nested gues…
KVM: nVMX: Check GUEST_SYSENTER_ESP and GUEST_SYSENTER_EIP on vmentry of nested guests
- 1 -
-
-
-
2019-12-06
Krish Sadhukhan
New
[3/4] kvm-unit-test: nVMX: Remove test_sysenter_field() and use test_canonical() instead
KVM: nVMX: Check GUEST_SYSENTER_ESP and GUEST_SYSENTER_EIP on vmentry of nested guests
- 1 -
-
-
-
2019-12-06
Krish Sadhukhan
New
[2/4] kvm-unit-test: nVMX: Modify test_canonical() to process guest fields also
KVM: nVMX: Check GUEST_SYSENTER_ESP and GUEST_SYSENTER_EIP on vmentry of nested guests
- 1 -
-
-
-
2019-12-06
Krish Sadhukhan
New
[1/4] KVM: nVMX: Check GUEST_SYSENTER_ESP and GUEST_SYSENTER_EIP on vmentry of nested guests
KVM: nVMX: Check GUEST_SYSENTER_ESP and GUEST_SYSENTER_EIP on vmentry of nested guests
- 1 -
-
-
-
2019-12-06
Krish Sadhukhan
New
kvm-unit-test: nVMX: Test VM-entry MSR-load area
kvm-unit-test: nVMX: Test VM-entry MSR-load area
- 1 -
-
-
-
2019-10-21
Krish Sadhukhan
New
[4/4] kvm-unit-test: nVMX: Use #defines for exit reason in advance_guest_state_test()
: kvm-unit-test: nVMX: Test deferring of error from VM-entry MSR-load area
- 2 -
-
-
-
2019-10-15
Krish Sadhukhan
New
[3/4] kvm-unit-test: nVMX: Test deferring of error from VM-entry MSR-load area
: kvm-unit-test: nVMX: Test deferring of error from VM-entry MSR-load area
- 1 -
-
-
-
2019-10-15
Krish Sadhukhan
New
[2/4] kvm-unit-test: nVMX: __enter_guest() needs to also check for VMX_FAIL_STATE
: kvm-unit-test: nVMX: Test deferring of error from VM-entry MSR-load area
- 1 -
-
-
-
2019-10-15
Krish Sadhukhan
New
[1/4] kvm-unit-test: VMX: Replace hard-coded exit instruction length
: kvm-unit-test: nVMX: Test deferring of error from VM-entry MSR-load area
- 3 -
-
-
-
2019-10-15
Krish Sadhukhan
New
[2/2,v2] KVM: nVMX: Rollback MSR-load if VM-entry fails due to VM-entry MSR-loading
KVM: nVMX: Defer error from VM-entry MSR-load area to until after hardware verifies VMCS guest stat…
- 1 -
-
-
-
2019-10-15
Krish Sadhukhan
New
[1/2,v2] KVM: nVMX: Defer error from VM-entry MSR-load area to until after hardware verifies VMCS g…
KVM: nVMX: Defer error from VM-entry MSR-load area to until after hardware verifies VMCS guest stat…
- 2 -
-
-
-
2019-10-15
Krish Sadhukhan
New
nVMX: Defer error from VM-entry MSR-load area to until after hardware verifies VMCS guest state-area
nVMX: Defer error from VM-entry MSR-load area to until after hardware verifies VMCS guest state-area
- 2 -
-
-
-
2019-09-30
Krish Sadhukhan
New
[4/4] kvm-unit-test: nVMX: Check GUEST_DEBUGCTL and GUEST_DR7 on vmentry of nested guests
KVM: nVMX: Check GUEST_DEBUGCTL and GUEST_DR7 on vmentry of nested guests
- 1 -
-
-
-
2019-08-29
Krish Sadhukhan
New
[3/4] kvm-unit-test: nVMX: __enter_guest() should not set "launched" state when VM-entry fails
KVM: nVMX: Check GUEST_DEBUGCTL and GUEST_DR7 on vmentry of nested guests
- 1 -
-
-
-
2019-08-29
Krish Sadhukhan
New
[2/4] KVM: nVMX: Check GUEST_DR7 on vmentry of nested guests
KVM: nVMX: Check GUEST_DEBUGCTL and GUEST_DR7 on vmentry of nested guests
- 1 -
-
-
-
2019-08-29
Krish Sadhukhan
New
[1/4] KVM: nVMX: Check GUEST_DEBUGCTL on vmentry of nested guests
KVM: nVMX: Check GUEST_DEBUGCTL and GUEST_DR7 on vmentry of nested guests
- 1 -
-
-
-
2019-08-29
Krish Sadhukhan
New
kvm-unit-test: nVMX: Fix 95d6d2c32288 ("nVMX: Test Host Segment Registers and Descriptor Tables on …
kvm-unit-test: nVMX: Fix 95d6d2c32288 ("nVMX: Test Host Segment Registers and Descriptor Tables on …
- 1 -
-
-
-
2019-08-12
Krish Sadhukhan
New
[2/2] kvm-unit-test: nVMX: Check Host Address Space Size on vmentry of nested guests
KVM: nVMX: Check Host Address Space Size on vmentry of nested guests
- 1 -
-
-
-
2019-08-09
Krish Sadhukhan
New
[1/2] KVM: nVMX: Check Host Address Space Size on vmentry of nested guests
KVM: nVMX: Check Host Address Space Size on vmentry of nested guests
- 1 -
-
-
-
2019-08-09
Krish Sadhukhan
New
[2/2] kvm-unit-test: x86: Replace cpuid/cpuid_indexed calls with this_cpu_has()
kvm-unit-test: x86: Implement a generic wrapper for cpuid/cpuid_indexed calls
- 1 -
-
-
-
2019-07-30
Krish Sadhukhan
New
[1/2] kvm-unit-test: x86: Implement a generic wrapper for cpuid/cpuid_indexed functions
kvm-unit-test: x86: Implement a generic wrapper for cpuid/cpuid_indexed calls
- 1 -
-
-
-
2019-07-30
Krish Sadhukhan
New
[5/5] KVM: nVMX: Skip Guest State Area vmentry checks that are necessary only if VMCS12 is dirty
KVM: nVMX: Skip vmentry checks that are necessary only if VMCS12 is dirty
- - -
-
-
-
2019-07-07
Krish Sadhukhan
New
[4/5] KVM: nVMX: Skip Host State Area vmentry checks that are necessary only if VMCS12 is dirty
KVM: nVMX: Skip vmentry checks that are necessary only if VMCS12 is dirty
- - -
-
-
-
2019-07-07
Krish Sadhukhan
New
[3/5] KVM: nVMX: Skip VM-Entry Control checks that are necessary only if VMCS12 is dirty
KVM: nVMX: Skip vmentry checks that are necessary only if VMCS12 is dirty
- - -
-
-
-
2019-07-07
Krish Sadhukhan
New
[2/5] KVM: nVMX: Skip VM-Exit Control vmentry checks that are necessary only if VMCS12 is dirty
KVM: nVMX: Skip vmentry checks that are necessary only if VMCS12 is dirty
- - -
-
-
-
2019-07-07
Krish Sadhukhan
New
[1/5] KVM: nVMX: Skip VM-Execution Control vmentry checks that are necessary only if VMCS12 is dirty
KVM: nVMX: Skip vmentry checks that are necessary only if VMCS12 is dirty
- - -
-
-
-
2019-07-07
Krish Sadhukhan
New
[2/2,v2] kvm-unit-test: nVMX: Test Host Segment Registers and Descriptor Tables on vmentry of neste…
nVMX: Check Host Segment Registers and Descriptor Tables on vmentry of nested guests
- 1 -
-
-
-
2019-07-03
Krish Sadhukhan
New
[1/2,v2] KVM nVMX: Check Host Segment Registers and Descriptor Tables on vmentry of nested guests
nVMX: Check Host Segment Registers and Descriptor Tables on vmentry of nested guests
- 1 -
-
-
-
2019-07-03
Krish Sadhukhan
New
[2/2] kvm-unit-test nVMX: Test Host Segment Registers and Descriptor Tables on vmentry of nested gu…
nVMX: Check Host Segment Registers and Descriptor Tables on vmentry of nested guests
- 1 -
-
-
-
2019-06-28
Krish Sadhukhan
New
[1/2] KVM nVMX: Check Host Segment Registers and Descriptor Tables on vmentry of nested guests
nVMX: Check Host Segment Registers and Descriptor Tables on vmentry of nested guests
- 1 -
-
-
-
2019-06-28
Krish Sadhukhan
New
kvm-unit-test: x86: Remove duplicate definitions of write_cr4_checking() and put it in library
kvm-unit-test: x86: Remove duplicate definitions of write_cr4_checking() and put it in library
- 1 -
-
-
-
2019-06-28
Krish Sadhukhan
New
nVMX: Get rid of prepare_vmcs02_early_full and inline its content in the caller
nVMX: Get rid of prepare_vmcs02_early_full and inline its content in the caller
- 1 -
-
-
-
2019-06-07
Krish Sadhukhan
New
[2/2] kvm-unit-test: nVMX: Test "Load IA32_EFER" VM-exit control on vmentry of nested guests
kvm-unit-test: nVMX: Test "Load IA32_EFER" VM-exit control on vmentry of nested guests
- 1 -
-
-
-
2019-05-22
Krish Sadhukhan
New
[1/2] kvm-unit-test: x86: Add a wrapper to check if the CPU supports NX bit in MSR_EFER
kvm-unit-test: nVMX: Test "Load IA32_EFER" VM-exit control on vmentry of nested guests
- 1 -
-
-
-
2019-05-22
Krish Sadhukhan
New
[4/4,kvm-unit-test,nVMX] : Test "load IA32_PERF_GLOBAL_CONTROL" VM-entry control on vmentry of nest…
: Test "load IA32_PERF_GLOBAL_CONTROL" VM-entry control on vmentry of nested guests
- 1 -
-
-
-
2019-05-09
Krish Sadhukhan
New
[3/4,kvm-unit-test,nVMX] : Add #define for "load IA32_PERF_GLOBAL_CONTROL" bit
: Test "load IA32_PERF_GLOBAL_CONTROL" VM-entry control on vmentry of nested guests
- 1 -
-
-
-
2019-05-09
Krish Sadhukhan
New
[2/4,kvm-unit-test,nVMX] : Rename report_guest_pat_test to report_guest_state_test
: Test "load IA32_PERF_GLOBAL_CONTROL" VM-entry control on vmentry of nested guests
- 1 -
-
-
-
2019-05-09
Krish Sadhukhan
New
[1/4,kvm-unit-test,nVMX] : Rename guest_pat_main to guest_state_test_main
: Test "load IA32_PERF_GLOBAL_CONTROL" VM-entry control on vmentry of nested guests
- 1 -
-
-
-
2019-05-09
Krish Sadhukhan
New
[8/8,nVMX] : Test "load IA32_PERF_GLOBAL_CTRL" controls on vmentry of nested guests
[1/8,KVMnVMX] : Enable "load IA32_PERF_GLOBAL_CTRL" VM-exit control for nested guests
- 1 -
-
-
-
2019-04-24
Krish Sadhukhan
New
[7/8,nVMX] : Enable "load IA32_PERF_GLOBAL_CTRL VM-{entry,exit} controls
[1/8,KVMnVMX] : Enable "load IA32_PERF_GLOBAL_CTRL" VM-exit control for nested guests
- 1 -
-
-
-
2019-04-24
Krish Sadhukhan
New
[6/8,nVMX] : Load IA32_PERF_GLOBAL_CTRL MSR on vmentry of nested guests
[1/8,KVMnVMX] : Enable "load IA32_PERF_GLOBAL_CTRL" VM-exit control for nested guests
- 1 -
-
-
-
2019-04-24
Krish Sadhukhan
New
[5/8,nVMX] : Check "load IA32_PERF_GLOBAL_CTRL" VM-entry control on vmentry of nested guests
[1/8,KVMnVMX] : Enable "load IA32_PERF_GLOBAL_CTRL" VM-exit control for nested guests
- 2 -
-
-
-
2019-04-24
Krish Sadhukhan
New
[4/8,nVMX] : Check "load IA32_PERF_GLOBAL_CTRL" VM-exit control on vmentry of nested guests
[1/8,KVMnVMX] : Enable "load IA32_PERF_GLOBAL_CTRL" VM-exit control for nested guests
- 1 -
-
-
-
2019-04-24
Krish Sadhukhan
New
[3/8,VMX] : Add a function to check reserved bits in MSR_CORE_PERF_GLOBAL_CTRL
[1/8,KVMnVMX] : Enable "load IA32_PERF_GLOBAL_CTRL" VM-exit control for nested guests
- 1 -
-
-
-
2019-04-24
Krish Sadhukhan
New
[2/8,nVMX] : Enable "load IA32_PERF_GLOBAL_CTRL" VM-entry control for nested guests
[1/8,KVMnVMX] : Enable "load IA32_PERF_GLOBAL_CTRL" VM-exit control for nested guests
- 1 -
-
-
-
2019-04-24
Krish Sadhukhan
New
[1/8,KVMnVMX] : Enable "load IA32_PERF_GLOBAL_CTRL" VM-exit control for nested guests
[1/8,KVMnVMX] : Enable "load IA32_PERF_GLOBAL_CTRL" VM-exit control for nested guests
- 1 -
-
-
-
2019-04-24
Krish Sadhukhan
New
[2/2,kvm-unit-test,nVMX] : Check "load IA32_PAT" VM-entry control on vmentry of nested guests
[1/2,kvm-unit-test,nVMX] : Move the functionality of enter_guest() to __enter_guest() and make the …
- 1 -
-
-
-
2019-04-18
Krish Sadhukhan
New
[1/2,kvm-unit-test,nVMX] : Move the functionality of enter_guest() to __enter_guest() and make the …
[1/2,kvm-unit-test,nVMX] : Move the functionality of enter_guest() to __enter_guest() and make the …
- 1 -
-
-
-
2019-04-18
Krish Sadhukhan
New
[6/6,v5,kvm-unit-test,nVMX] : Check "load IA32_PAT" on vmentry of L2 guests
[1/6,v5,nVMX] : Check "load IA32_PAT" VM-exit control on vmentry
- 2 -
-
-
-
2019-04-08
Krish Sadhukhan
New
[5/6,v5,nVMX] : nested_vmx_check_vmentry_postreqs() should return VMX_EXIT_REASONS_FAILED_VMENTRY |…
[1/6,v5,nVMX] : Check "load IA32_PAT" VM-exit control on vmentry
- 1 -
-
-
-
2019-04-08
Krish Sadhukhan
New
[4/6,v5,nVMX] : nested_check_guest_cregs_dregs_msrs() should return -EINVAL for error conditions
[1/6,v5,nVMX] : Check "load IA32_PAT" VM-exit control on vmentry
- 1 -
-
-
-
2019-04-08
Krish Sadhukhan
New
[3/6,v5,nVMX] : Move the checks for Guest Control Registers and Guest MSRs to a separate function
[1/6,v5,nVMX] : Check "load IA32_PAT" VM-exit control on vmentry
- 1 -
-
-
-
2019-04-08
Krish Sadhukhan
New
[2/6,v5,nVMX] : Check "load IA32_PAT" VM-entry control on vmentry
[1/6,v5,nVMX] : Check "load IA32_PAT" VM-exit control on vmentry
- 3 -
-
-
-
2019-04-08
Krish Sadhukhan
New
[1/6,v5,nVMX] : Check "load IA32_PAT" VM-exit control on vmentry
[1/6,v5,nVMX] : Check "load IA32_PAT" VM-exit control on vmentry
- 3 -
-
-
-
2019-04-08
Krish Sadhukhan
New
[6/6,v4,kvm-unit-test,nVMX] : Check "load IA32_PAT" on vmentry of L2 guests
[1/6,v4,nVMX] : Check "load IA32_PAT" VM-exit control on vmentry
- 2 -
-
-
-
2019-04-05
Krish Sadhukhan
New
[5/6,v4,nVMX] : nested_vmx_check_vmentry_postreqs() should return VMX_EXIT_REASONS_FAILED_VMENTRY |…
[1/6,v4,nVMX] : Check "load IA32_PAT" VM-exit control on vmentry
- - -
-
-
-
2019-04-05
Krish Sadhukhan
New
[4/6,v4,nVMX] : nested_check_guest_cregs_dregs_msrs() should return -EINVAL for error conditions
[1/6,v4,nVMX] : Check "load IA32_PAT" VM-exit control on vmentry
- 1 -
-
-
-
2019-04-05
Krish Sadhukhan
New
[3/6,v4,nVMX] : Move the checks for Guest Control Registers and Guest MSRs to a separate function
[1/6,v4,nVMX] : Check "load IA32_PAT" VM-exit control on vmentry
- 1 -
-
-
-
2019-04-05
Krish Sadhukhan
New
[2/6,v4,nVMX] : Check "load IA32_PAT" VM-entry control on vmentry
[1/6,v4,nVMX] : Check "load IA32_PAT" VM-exit control on vmentry
- 3 -
-
-
-
2019-04-05
Krish Sadhukhan
New
[1/6,v4,nVMX] : Check "load IA32_PAT" VM-exit control on vmentry
[1/6,v4,nVMX] : Check "load IA32_PAT" VM-exit control on vmentry
- 3 -
-
-
-
2019-04-05
Krish Sadhukhan
New
[4/4,v3,kvm-unit-test,nVMX] : Check "load IA32_PAT" on vmentry of L2 guests
[1/4,v3,nVMX] : Check "load IA32_PAT" VM-exit control on vmentry
- 1 -
-
-
-
2019-04-03
Krish Sadhukhan
New
[3/4,v3,nVMX] : Move the checks for Guest Control Registers and Guest MSRs to a separate function
[1/4,v3,nVMX] : Check "load IA32_PAT" VM-exit control on vmentry
- 1 -
-
-
-
2019-04-03
Krish Sadhukhan
New
[2/4,v3,nVMX] : Check "load IA32_PAT" VM-entry control on vmentry
[1/4,v3,nVMX] : Check "load IA32_PAT" VM-exit control on vmentry
- 3 -
-
-
-
2019-04-03
Krish Sadhukhan
New
[1/4,v3,nVMX] : Check "load IA32_PAT" VM-exit control on vmentry
[1/4,v3,nVMX] : Check "load IA32_PAT" VM-exit control on vmentry
- 3 -
-
-
-
2019-04-03
Krish Sadhukhan
New
[kvm-unit-test,VMX] : Use #define for bit# 1 in GUEST_RFLAGS
[kvm-unit-test,VMX] : Use #define for bit# 1 in GUEST_RFLAGS
- 2 -
-
-
-
2019-03-28
Krish Sadhukhan
New
[4/4,v2,kvm-unit-test,nVMX] : Check "load IA32_PAT" on vmentry of nested guests
[1/4,v2,nVMX] : Check "load IA32_PAT" VM-exit control on vmentry of nested guests
- 1 -
-
-
-
2019-03-27
Krish Sadhukhan
New
[3/4,v2,nVMX] : Move the checks for Guest Control Registers and Guest MSRs to a separate function
[1/4,v2,nVMX] : Check "load IA32_PAT" VM-exit control on vmentry of nested guests
- - -
-
-
-
2019-03-27
Krish Sadhukhan
New
[2/4,v2,nVMX] : Check "load IA32_PAT" VM-entry control on vmentry of nested guests
[1/4,v2,nVMX] : Check "load IA32_PAT" VM-exit control on vmentry of nested guests
- 2 -
-
-
-
2019-03-27
Krish Sadhukhan
New
[1/4,v2,nVMX] : Check "load IA32_PAT" VM-exit control on vmentry of nested guests
[1/4,v2,nVMX] : Check "load IA32_PAT" VM-exit control on vmentry of nested guests
- 2 -
-
-
-
2019-03-27
Krish Sadhukhan
New
[4/4,v2,kvm-unit-test,nVMX] : Check "load IA32_PAT" on vmentry of nested guests
[1/4,v2,nVMX] : Check "load IA32_PAT" VM-entry control on vmentry nested guests
- 1 -
-
-
-
2019-03-27
Krish Sadhukhan
New
[3/4,v2,nVMX] : Move the checks for Guest Control Registers and Guest MSRs to a separate function
[1/4,v2,nVMX] : Check "load IA32_PAT" VM-entry control on vmentry nested guests
- - -
-
-
-
2019-03-27
Krish Sadhukhan
New
[2/4,v2,nVMX] : Move the checks for Guest Control Registers and Guest MSRs to a separate function
[1/4,v2,nVMX] : Check "load IA32_PAT" VM-entry control on vmentry nested guests
- - -
-
-
-
2019-03-27
Krish Sadhukhan
New
[1/4,v2,nVMX] : Check "load IA32_PAT" VM-entry control on vmentry nested guests
[1/4,v2,nVMX] : Check "load IA32_PAT" VM-entry control on vmentry nested guests
- 1 -
-
-
-
2019-03-27
Krish Sadhukhan
New
[3/3,kvm-unit-test,nVMX] : Check "load IA32_PAT" on vmentry of L2 guests
[1/3,nVMX] : Check "load IA32_PAT" VM-exit control on vmentry of L2 guests
- 1 -
-
-
-
2019-03-19
Krish Sadhukhan
New
[2/3,nVMX] : Check "load IA32_PAT" VM-entry control on vmentry of L2 guests
[1/3,nVMX] : Check "load IA32_PAT" VM-exit control on vmentry of L2 guests
- 1 -
-
-
-
2019-03-19
Krish Sadhukhan
New
[1/3,nVMX] : Check "load IA32_PAT" VM-exit control on vmentry of L2 guests
[1/3,nVMX] : Check "load IA32_PAT" VM-exit control on vmentry of L2 guests
- 1 -
-
-
-
2019-03-19
Krish Sadhukhan
New
[v2,kvm-unit-test,nVMX] : Check Host Control Registers on vmentry of L2 guests
[v2,kvm-unit-test,nVMX] : Check Host Control Registers on vmentry of L2 guests
- 1 -
-
-
-
2019-02-18
Krish Sadhukhan
New
[kvm-unit-test,nVMX] : Check Host Control Registers on vmentry of L2 guests
[kvm-unit-test,nVMX] : Check Host Control Registers on vmentry of L2 guests
- 1 -
-
-
-
2019-02-14
Krish Sadhukhan
New
[4/4,v3,kvm-unit-test,nVMX] : Test HOST_SYSENTER_ESP and HOST_SYSENTER_EIP fields on vmentry of L2 …
[1/4,v3,nVMX] : Add a vmentry check for HOST_SYSENTER_ESP and HOST_SYSENTER_EIP fields
- 2 -
-
-
-
2019-02-07
Krish Sadhukhan
New
[3/4,v3,kvm-unit-test,nVMX] : Re-name 'test_vmx_controls' to 'test_vmx_vmlaunch' and pass the expec…
[1/4,v3,nVMX] : Add a vmentry check for HOST_SYSENTER_ESP and HOST_SYSENTER_EIP fields
- 1 -
-
-
-
2019-02-07
Krish Sadhukhan
New
[2/4,v3,kvm-unit-test,nVMX] : Move test_vm_entry_ctls() below test_vm_exit_ctls()
[1/4,v3,nVMX] : Add a vmentry check for HOST_SYSENTER_ESP and HOST_SYSENTER_EIP fields
- 2 -
-
-
-
2019-02-07
Krish Sadhukhan
New
[1/4,v3,nVMX] : Add a vmentry check for HOST_SYSENTER_ESP and HOST_SYSENTER_EIP fields
[1/4,v3,nVMX] : Add a vmentry check for HOST_SYSENTER_ESP and HOST_SYSENTER_EIP fields
- 3 -
-
-
-
2019-02-07
Krish Sadhukhan
New
[4/4,v2,kvm-unit-test,nVMX] : Test HOST_SYSENTER_ESP and HOST_SYSENTER_EIP fields on vmentry of L2 …
[1/4,v2,nVMX] : Add a vmentry check for HOST_SYSENTER_ESP and HOST_SYSENTER_EIP fields
- 1 -
-
-
-
2019-02-05
Krish Sadhukhan
New
[3/4,v2,kvm-unit-test,nVMX] : Change 'test_vmx_controls' to 'test_vmlaunch' and add a parameter for…
[1/4,v2,nVMX] : Add a vmentry check for HOST_SYSENTER_ESP and HOST_SYSENTER_EIP fields
- - -
-
-
-
2019-02-05
Krish Sadhukhan
New
[2/4,v2,kvm-unit-test,nVMX] : Move test_vm_entry_ctls() below test_vm_exit_ctls()
[1/4,v2,nVMX] : Add a vmentry check for HOST_SYSENTER_ESP and HOST_SYSENTER_EIP fields
- 1 -
-
-
-
2019-02-05
Krish Sadhukhan
New
[1/4,v2,nVMX] : Add a vmentry check for HOST_SYSENTER_ESP and HOST_SYSENTER_EIP fields
[1/4,v2,nVMX] : Add a vmentry check for HOST_SYSENTER_ESP and HOST_SYSENTER_EIP fields
- 2 -
-
-
-
2019-02-05
Krish Sadhukhan
New
[2/2,kvm-unit-test,nVMX] : Test HOST_SYSENTER_ESP and HOST_SYSENTER_EIP fields on vmentry of L2 gue…
[1/2,nVMX] : Add a vmentry check for HOST_SYSENTER_ESP and HOST_SYSENTER_EIP fields
- 1 -
-
-
-
2019-02-04
Krish Sadhukhan
New
[1/2,nVMX] : Add a vmentry check for HOST_SYSENTER_ESP and HOST_SYSENTER_EIP fields
[1/2,nVMX] : Add a vmentry check for HOST_SYSENTER_ESP and HOST_SYSENTER_EIP fields
- 1 -
-
-
-
2019-02-04
Krish Sadhukhan
New
[kvm-unit-test,nVMX] If "enable EPT" is enabled in a test, EPT pointer must also be set up
[kvm-unit-test,nVMX] If "enable EPT" is enabled in a test, EPT pointer must also be set up
- 1 -
-
-
-
2019-01-23
Krish Sadhukhan
New
[kvm-unit-test,nVMX] If "enable EPT" is enabled in a test, EPT pointer must also be set up
[kvm-unit-test,nVMX] If "enable EPT" is enabled in a test, EPT pointer must also be set up
- - -
-
-
-
2019-01-22
Krish Sadhukhan
New
[kvm-unit-test,nVMX,2/2] : Check VM-entry MSR-load address on vmentry of L2 guests
[kvm-unit-test,nVMX,1/2] : vmlaunch_succeeds() needs to check failure of VM-entry MSR-load
- 2 -
-
-
-
2019-01-15
Krish Sadhukhan
New
[kvm-unit-test,nVMX,1/2] : vmlaunch_succeeds() needs to check failure of VM-entry MSR-load
[kvm-unit-test,nVMX,1/2] : vmlaunch_succeeds() needs to check failure of VM-entry MSR-load
- 2 -
-
-
-
2019-01-15
Krish Sadhukhan
New
[kvm-unit-test,nVMX] : Check VM-exit MSR-load address on vmentry of L2 guests
[kvm-unit-test,nVMX] : Check VM-exit MSR-load address on vmentry of L2 guests
- 1 -
-
-
-
2019-01-15
Krish Sadhukhan
New
[kvm-unit-test,v3,4/4] KVM nVMX: Check VM-exit MSR-store address on vmentry of L2 guests
[kvm-unit-test,v3,1/4] KVM nVMX: Change the names of the functions test_vmcs_page_* to test_vmcs_ad…
- 1 -
-
-
-
2018-12-13
Krish Sadhukhan
New
[kvm-unit-test,v3,3/4] KVM nVMX: test_vmcs_page_values() needs to accept a bit range
[kvm-unit-test,v3,1/4] KVM nVMX: Change the names of the functions test_vmcs_page_* to test_vmcs_ad…
- 2 -
-
-
-
2018-12-13
Krish Sadhukhan
New
[kvm-unit-test,v3,2/4] KVM nVMX: test_vmcs_page_* functions need to accept alignment size as a para…
[kvm-unit-test,v3,1/4] KVM nVMX: Change the names of the functions test_vmcs_page_* to test_vmcs_ad…
- 1 -
-
-
-
2018-12-13
Krish Sadhukhan
New
[kvm-unit-test,v3,1/4] KVM nVMX: Change the names of the functions test_vmcs_page_* to test_vmcs_ad…
[kvm-unit-test,v3,1/4] KVM nVMX: Change the names of the functions test_vmcs_page_* to test_vmcs_ad…
- 1 -
-
-
-
2018-12-13
Krish Sadhukhan
New
«
1
2
3
4
»