Toggle navigation
Patchwork
KVM development
Patches
Bundles
About this project
Login
Register
Mail settings
Show patches with
: Submitter =
Jim Mattson
| State =
Action Required
| 452 patches
Series
Submitter
State
any
Action Required
New
Under Review
Accepted
Rejected
RFC
Not Applicable
Changes Requested
Awaiting Upstream
Superseded
Deferred
Mainlined
Queued
Needs ACK
Handled Elsewhere
In Next
Search
Archived
No
Yes
Both
Delegate
------
Nobody
holtmann
holtmann
holtmann
agk
mchehab
mchehab
gregkh
gregkh
mtosatti
lethal
lethal
avi
cvaroqui
jbrassow
mikulas
dtor
bmarzins
tmlind
jmberg
jmberg
mcgrof
mcgrof
mcgrof
lenb
lenb
kyle
felipebalbi
varenet
helge
helge
khilman
khilman
khilman
khilman
jwoithe
mlin
Zhang Rui
Zhang Rui
iksaif
cjackiewicz
hmh
jbarnes
jbarnes
jbarnes
willy
snitzer
iwamatsu
dougsland
mjg59
rafael
rafael
rafael
ericvh@gmail.com
ykzhao
venkip
sandeen
pwsan
lucho@ionkov.net
rminnich
anholt
aystarik
roland
shefty
mason
glikely
krh
djbw
djbw
djbw
cmarinas
doyu
jrn
sage
tomba
mmarek
cjb
trondmy
jikos
bcousson
jic23
olof
olof
olof
nsekhar
weiny2
horms
horms
bwidawsk
bwidawsk
shemminger
eulfhan
josef
josef
josef
dianders
jpan9
hal
kdave
bleung
evalenti
jlbec
wsa
bhelgaas
vkoul
vkoul
szlin
davejiang
markgross
tagr
tiwai
vireshk
mmind
dledford
geert
geert
herbert
herbert
kvalo
kvalo
kvalo
bentiss
arend
rzwisler
stellarhopper
stellarhopper
jejb
matthias_bgg
dvhart
axboe
axboe
pcmoore
pcmoore
pcmoore
mkp
mkp
stefan_schmidt
leon
lucvoo
jsakkine
jsakkine
jsakkine
bamse
bamse
demarchi
krzk
groeck
groeck
sboyd
sboyd
mturquette
mturquette
0andriy
carlocaione
luca
dgc
kbingham
derosier
narmstrong
narmstrong
atull
tytso
tytso
djwong
bvanassche
omos
jpirko
jpirko
GustavoARSilva
pkshih
patersonc
brauner
shuahkh
shuahkh
shuahkh
palmer
palmer
jgg
Kishon
idosch
labbott
jsimmons
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
broonie
broonie
broonie
mricon
mricon
mricon
kees
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
arnd
linusw
perfinion
bbrezillon
bachradsusi
rostedt
rostedt
kholk
nbd
ebiggers
ebiggers
pavelm
sds
m0reeze
ganis
jwcart2
matttbe
andmur01
lorpie01
chanwoochoi
dlezcano
jhedberg
vudentz
robertfoss
bgix
tedd_an
tsbogend
wens
wcrobert
robher
kstewart
kwilczynski
hansg
bpf
netdev
dsa
ethtool
netdrv
martineau
abelloni
trix
pabeni
mani_sadhasivam
mlimonci
liusong6
mjp
tohojo
pmalani
prestwoj
prestwoj
dhowells
tzungbi
conchuod
paulmck
jes
mtkaczyk
colyli
cem
pateldipen1984
iweiny
iweiny
bjorn
mhiramat
JanKiszka
jaegeuk
mraynal
aring
konradybcio
ij
Hailan
jstitt007
denkenz
denkenz
mkorenbl
jjohnson
frank_li
geliang
mdraidci
mdraidci
peluse
joelgranados
Apply
«
1
2
3
4
…
4
5
»
Patch
Series
A/R/T
S/W/F
Date
Submitter
Delegate
State
[v5,4/4] KVM: x86: AMD's IBPB is not equivalent to Intel's IBPB
Distinguish between variants of IBPB
- 1 -
-
-
-
2024-10-11
Jim Mattson
New
[v5,3/4] KVM: x86: Advertise AMD_IBPB_RET to userspace
Distinguish between variants of IBPB
- 2 -
-
-
-
2024-10-11
Jim Mattson
New
[v5,2/4] x86/cpufeatures: Define X86_FEATURE_AMD_IBPB_RET
Distinguish between variants of IBPB
- 2 -
-
-
-
2024-10-11
Jim Mattson
New
[v5,1/4] x86/cpufeatures: Clarify semantics of X86_FEATURE_IBPB
Distinguish between variants of IBPB
- - -
-
-
-
2024-10-11
Jim Mattson
New
[v4,3/3] KVM: x86: AMD's IBPB is not equivalent to Intel's IBPB
Distinguish between variants of IBPB
- - -
-
-
-
2024-09-13
Jim Mattson
New
[v4,2/3] KVM: x86: Advertise AMD_IBPB_RET to userspace
Distinguish between variants of IBPB
- - -
-
-
-
2024-09-13
Jim Mattson
New
[v4,1/3] x86/cpufeatures: Define X86_FEATURE_AMD_IBPB_RET
Distinguish between variants of IBPB
- - -
-
-
-
2024-09-13
Jim Mattson
New
[v3,4/4] KVM: x86: AMD's IBPB is not equivalent to Intel's IBPB
Distinguish between variants of IBPB
- - -
-
-
-
2024-08-23
Jim Mattson
New
[v3,3/4] KVM: x86: Advertise AMD_IBPB_RET to userspace
Distinguish between variants of IBPB
- - -
-
-
-
2024-08-23
Jim Mattson
New
[v3,2/4] x86/cpufeatures: Define X86_FEATURE_AMD_IBPB_RET
Distinguish between variants of IBPB
- - -
-
-
-
2024-08-23
Jim Mattson
New
[v3,1/4] x86/cpufeatures: Clarify semantics of X86_FEATURE_IBPB
Distinguish between variants of IBPB
- - -
-
-
-
2024-08-23
Jim Mattson
New
[v2,2/2] KVM: x86: AMD's IBPB is not equivalent to Intel's IBPB
[v2,1/2] x86/cpufeatures: Define X86_FEATURE_AMD_IBPB_RET
- 1 -
-
-
-
2024-08-16
Jim Mattson
New
[v2,1/2] x86/cpufeatures: Define X86_FEATURE_AMD_IBPB_RET
[v2,1/2] x86/cpufeatures: Define X86_FEATURE_AMD_IBPB_RET
- - -
-
-
-
2024-08-16
Jim Mattson
New
KVM: x86: Eliminate log spam from limited APIC timer periods
KVM: x86: Eliminate log spam from limited APIC timer periods
- - -
-
-
-
2024-07-24
Jim Mattson
New
[v2] KVM: x86: Complain about an attempt to change the APIC base address
[v2] KVM: x86: Complain about an attempt to change the APIC base address
- - -
-
-
-
2024-06-25
Jim Mattson
New
KVM: x86: Complain about an attempt to change the APIC base address
KVM: x86: Complain about an attempt to change the APIC base address
- - -
-
-
-
2024-06-21
Jim Mattson
New
KVM: x86: AMD's IBPB is not equivalent to Intel's IBPB
KVM: x86: AMD's IBPB is not equivalent to Intel's IBPB
- - -
-
-
-
2024-04-11
Jim Mattson
New
[kvm-unit-tests,5/5] nVMX: add test for posted interrupts
nVMX: Simple posted interrupts test
- - -
-
-
-
2023-12-11
Jim Mattson
New
[kvm-unit-tests,4/5] nVMX: add self-IPI tests to vmx_basic_vid_test
nVMX: Simple posted interrupts test
- - -
-
-
-
2023-12-11
Jim Mattson
New
[kvm-unit-tests,3/5] nVMX: test nested EOI virtualization
nVMX: Simple posted interrupts test
- - -
-
-
-
2023-12-11
Jim Mattson
New
[kvm-unit-tests,2/5] nVMX: test nested "virtual-interrupt delivery"
nVMX: Simple posted interrupts test
- - -
-
-
-
2023-12-11
Jim Mattson
New
[kvm-unit-tests,1/5] nVMX: Enable x2APIC mode for virtual-interrupt delivery tests
nVMX: Simple posted interrupts test
- - -
-
-
-
2023-12-11
Jim Mattson
New
[v4,10/12] KVM: x86: never write to memory from kvm_vcpu_check_block()
Untitled series #807667
- - -
-
-
-
2023-12-07
Jim Mattson
New
KVM: x86: Remove IA32_PERF_GLOBAL_OVF_CTRL from KVM_GET_MSR_INDEX_LIST
KVM: x86: Remove IA32_PERF_GLOBAL_OVF_CTRL from KVM_GET_MSR_INDEX_LIST
- - -
-
-
-
2023-11-13
Jim Mattson
New
[2/2] KVM: x86: Use a switch statement in __feature_translate()
[1/2] KVM: x86: Advertise CPUID.(EAX=7,ECX=2):EDX[5:0] to userspace
- - -
-
-
-
2023-10-24
Jim Mattson
New
[1/2] KVM: x86: Advertise CPUID.(EAX=7,ECX=2):EDX[5:0] to userspace
[1/2] KVM: x86: Advertise CPUID.(EAX=7,ECX=2):EDX[5:0] to userspace
- 1 -
-
-
-
2023-10-24
Jim Mattson
New
[v2] x86: KVM: Add feature flag for CPUID.80000021H:EAX[bit 1]
[v2] x86: KVM: Add feature flag for CPUID.80000021H:EAX[bit 1]
- 2 -
-
-
-
2023-10-05
Jim Mattson
New
x86: KVM: Add feature flag for AMD's FsGsKernelGsBaseNonSerializing
x86: KVM: Add feature flag for AMD's FsGsKernelGsBaseNonSerializing
- - -
-
-
-
2023-10-04
Jim Mattson
New
[v4,3/3] KVM: selftests: Test behavior of HWCR
KVM: x86: Update HWCR virtualization
- - -
-
-
-
2023-09-29
Jim Mattson
New
[v4,2/3] KVM: x86: Virtualize HWCR.TscFreqSel[bit 24]
KVM: x86: Update HWCR virtualization
- - -
-
-
-
2023-09-29
Jim Mattson
New
[v4,1/3] KVM: x86: Allow HWCR.McStatusWrEn to be cleared once set
KVM: x86: Update HWCR virtualization
- - -
-
-
-
2023-09-29
Jim Mattson
New
[v3,3/3] KVM: selftests: Test behavior of HWCR
[v3,1/3] KVM: x86: Allow HWCR.McStatusWrEn to be cleared once set
- - -
-
-
-
2023-09-28
Jim Mattson
New
[v3,2/3] KVM: x86: Virtualize HWCR.TscFreqSel[bit 24]
[v3,1/3] KVM: x86: Allow HWCR.McStatusWrEn to be cleared once set
- - -
-
-
-
2023-09-28
Jim Mattson
New
[v3,1/3] KVM: x86: Allow HWCR.McStatusWrEn to be cleared once set
[v3,1/3] KVM: x86: Allow HWCR.McStatusWrEn to be cleared once set
- - -
-
-
-
2023-09-28
Jim Mattson
New
[v2,3/3] KVM: selftests: Test behavior of HWCR
KVM: x86: Update HWCR virtualization
- - -
-
-
-
2023-09-25
Jim Mattson
New
[v2,2/3] KVM: x86: Virtualize HWCR.TscFreqSel[bit 24]
KVM: x86: Update HWCR virtualization
- - -
-
-
-
2023-09-25
Jim Mattson
New
[v2,1/3] KVM: x86: Allow HWCR.McStatusWrEn to be cleared once set
KVM: x86: Update HWCR virtualization
- - -
-
-
-
2023-09-25
Jim Mattson
New
[3/3] KVM: selftests: Test behavior of HWCR
[1/3] KVM: x86: Allow HWCR.McStatusWrEn to be cleared once set
- - -
-
-
-
2023-09-22
Jim Mattson
New
[2/3] KVM: x86: Virtualize HWCR.TscFreqSel[bit 24]
[1/3] KVM: x86: Allow HWCR.McStatusWrEn to be cleared once set
- - -
-
-
-
2023-09-22
Jim Mattson
New
[1/3] KVM: x86: Allow HWCR.McStatusWrEn to be cleared once set
[1/3] KVM: x86: Allow HWCR.McStatusWrEn to be cleared once set
- - -
-
-
-
2023-09-22
Jim Mattson
New
[2/2] KVM: x86: Mask LVTPC when handling a PMI
[1/2] KVM: x86: Synthesize at most one PMI per VM-exit
- 1 1
-
-
-
2023-09-01
Jim Mattson
New
[1/2] KVM: x86: Synthesize at most one PMI per VM-exit
[1/2] KVM: x86: Synthesize at most one PMI per VM-exit
- - 2
-
-
-
2023-09-01
Jim Mattson
New
[v2,2/2] KVM: VMX: Execute IBPB on emulated VM-exit when guest has IBRS
KVM: nVMX: Add IBPB between L2 and L1 to
- 1 -
-
-
-
2022-10-19
Jim Mattson
New
[v2,1/2] KVM: VMX: Guest usage of IA32_SPEC_CTRL is likely
KVM: nVMX: Add IBPB between L2 and L1 to
- 1 -
-
-
-
2022-10-19
Jim Mattson
New
KVM: x86: Advertise that the SMM_CTL MSR is not supported
KVM: x86: Advertise that the SMM_CTL MSR is not supported
- - -
-
-
-
2022-10-07
Jim Mattson
New
[6/6] KVM: x86: Mask off reserved bits in CPUID.8000001FH
[1/6] KVM: x86: Mask off reserved bits in CPUID.80000001H
- - -
-
-
-
2022-09-29
Jim Mattson
New
[5/6] KVM: x86: Mask off reserved bits in CPUID.8000001EH
[1/6] KVM: x86: Mask off reserved bits in CPUID.80000001H
- - -
-
-
-
2022-09-29
Jim Mattson
New
[4/6] KVM: x86: Mask off reserved bits in CPUID.8000001AH
[1/6] KVM: x86: Mask off reserved bits in CPUID.80000001H
- - -
-
-
-
2022-09-29
Jim Mattson
New
[3/6] KVM: x86: Mask off reserved bits in CPUID.80000008H
[1/6] KVM: x86: Mask off reserved bits in CPUID.80000001H
- - -
-
-
-
2022-09-29
Jim Mattson
New
[2/6] KVM: x86: Mask off reserved bits in CPUID.80000006H
[1/6] KVM: x86: Mask off reserved bits in CPUID.80000001H
- - -
-
-
-
2022-09-29
Jim Mattson
New
[1/6] KVM: x86: Mask off reserved bits in CPUID.80000001H
[1/6] KVM: x86: Mask off reserved bits in CPUID.80000001H
- - -
-
-
-
2022-09-29
Jim Mattson
New
[2/2] KVM: VMX: Execute IBPB on emulated VM-exit when guest has IBRS
[1/2] KVM: VMX: Guest usage of IA32_SPEC_CTRL is likely
- - -
-
-
-
2022-09-28
Jim Mattson
New
[1/2] KVM: VMX: Guest usage of IA32_SPEC_CTRL is likely
[1/2] KVM: VMX: Guest usage of IA32_SPEC_CTRL is likely
- - -
-
-
-
2022-09-28
Jim Mattson
New
KVM: x86: Pass host's CPUID.16H through to KVM_GET_SUPPORTED_CPUID
KVM: x86: Pass host's CPUID.16H through to KVM_GET_SUPPORTED_CPUID
- - -
-
-
-
2022-09-23
Jim Mattson
New
KVM: x86: Hide IA32_PLATFORM_DCA_CAP[31:0] from the guest
KVM: x86: Hide IA32_PLATFORM_DCA_CAP[31:0] from the guest
- - -
-
-
-
2022-09-22
Jim Mattson
New
Documentation: KVM: Describe guest CPUID.15H settings for in-kernel APIC
Documentation: KVM: Describe guest CPUID.15H settings for in-kernel APIC
- - -
-
-
-
2022-09-21
Jim Mattson
New
[v2,3/3] KVM: SVM: Unconditionally enumerate EferLmsleUnsupported
KVM: EFER.LMSLE cleanup
- - -
-
-
-
2022-09-20
Jim Mattson
New
[v2,2/3] x86/cpufeatures: Introduce X86_FEATURE_NO_LMSLE
KVM: EFER.LMSLE cleanup
1 - -
-
-
-
2022-09-20
Jim Mattson
New
[v2,1/3] Revert "KVM: SVM: Allow EFER.LMSLE to be set with nested svm"
KVM: EFER.LMSLE cleanup
- - -
-
-
-
2022-09-20
Jim Mattson
New
[5/5] KVM: svm: Set X86_FEATURE_NO_LMSLE when !nested
KVM: EFER.LMSLE cleanup
- - -
-
-
-
2022-09-16
Jim Mattson
New
[4/5] KVM: x86: Enforce X86_FEATURE_NO_LMSLE in guest cpuid
KVM: EFER.LMSLE cleanup
- - -
-
-
-
2022-09-16
Jim Mattson
New
[3/5] KVM: x86: Report host's X86_FEATURE_NO_LMSLE in KVM_GET_SUPPORTED_CPUID
KVM: EFER.LMSLE cleanup
- - -
-
-
-
2022-09-16
Jim Mattson
New
[2/5] KVM: svm: Disallow EFER.LMSLE on hardware that doesn't support it
KVM: EFER.LMSLE cleanup
- - -
-
-
-
2022-09-16
Jim Mattson
New
[1/5] x86/cpufeatures: Introduce X86_FEATURE_NO_LMSLE
KVM: EFER.LMSLE cleanup
- - -
-
-
-
2022-09-16
Jim Mattson
New
[v3,2/2] KVM: x86: Expose CPUID.(EAX=7,ECX=1).EAX[12:10] to the guest
[v3,1/2] x86/cpufeatures: Add macros for Intel's new fast rep string features
- 1 -
-
-
-
2022-09-01
Jim Mattson
New
[v3,1/2] x86/cpufeatures: Add macros for Intel's new fast rep string features
[v3,1/2] x86/cpufeatures: Add macros for Intel's new fast rep string features
- 1 -
-
-
-
2022-09-01
Jim Mattson
New
[v2] x86/cpufeatures: Add macros for Intel's new fast rep string features
[v2] x86/cpufeatures: Add macros for Intel's new fast rep string features
- - -
-
-
-
2022-08-31
Jim Mattson
New
[v2,2/2] KVM: x86: Expose Predictive Store Forwarding Disable on Intel parts
[v2,1/2] KVM: x86: Insert "AMD" in KVM_X86_FEATURE_PSFD
- - -
-
-
-
2022-08-30
Jim Mattson
New
[v2,1/2] KVM: x86: Insert "AMD" in KVM_X86_FEATURE_PSFD
[v2,1/2] KVM: x86: Insert "AMD" in KVM_X86_FEATURE_PSFD
- - -
-
-
-
2022-08-30
Jim Mattson
New
[v2] KVM: x86: Mask off unsupported and unknown bits of IA32_ARCH_CAPABILITIES
[v2] KVM: x86: Mask off unsupported and unknown bits of IA32_ARCH_CAPABILITIES
- 2 -
-
-
-
2022-08-30
Jim Mattson
New
KVM: x86: Mask off unsupported and unknown bits of IA32_ARCH_CAPABILITIES
KVM: x86: Mask off unsupported and unknown bits of IA32_ARCH_CAPABILITIES
- 1 -
-
-
-
2022-08-26
Jim Mattson
New
[3/3] KVM: x86: Expose Predictive Store Forwarding Disable on Intel parts
[1/3] KVM: x86: Insert "AMD" in KVM_X86_FEATURE_PSFD
- - -
-
-
-
2022-08-26
Jim Mattson
New
[2/3] KVM: x86: Report CPUID.7.1 support on CPUs with CPUID.7 indices > 1
[1/3] KVM: x86: Insert "AMD" in KVM_X86_FEATURE_PSFD
- - -
-
-
-
2022-08-26
Jim Mattson
New
[1/3] KVM: x86: Insert "AMD" in KVM_X86_FEATURE_PSFD
[1/3] KVM: x86: Insert "AMD" in KVM_X86_FEATURE_PSFD
- - -
-
-
-
2022-08-26
Jim Mattson
New
KVM: VMX: Heed the 'msr' argument in msr_write_intercepted()
KVM: VMX: Heed the 'msr' argument in msr_write_intercepted()
- 1 -
-
-
-
2022-08-10
Jim Mattson
New
[kvm-unit-tests] x86: kvmclock: Fix a non-prototype function declaration
[kvm-unit-tests] x86: kvmclock: Fix a non-prototype function declaration
- 1 -
-
-
-
2022-07-22
Jim Mattson
New
[v3] KVM: VMX: Avoid a JMP over the RSB-stuffing sequence
[v3] KVM: VMX: Avoid a JMP over the RSB-stuffing sequence
- 1 -
-
-
-
2022-07-07
Jim Mattson
New
[v2] KVM: VMX: Move VM-exit RSB stuffing out of line
[v2] KVM: VMX: Move VM-exit RSB stuffing out of line
- - -
-
-
-
2022-06-30
Jim Mattson
New
KVM: x86: VMX: Replace some Intel model numbers with mnemonics
KVM: x86: VMX: Replace some Intel model numbers with mnemonics
- 1 -
-
-
-
2022-06-29
Jim Mattson
New
[kvm-unit-tests] x86: VMX: Fix the VMX-preemption timer expiration test
[kvm-unit-tests] x86: VMX: Fix the VMX-preemption timer expiration test
- - 1
-
-
-
2022-06-29
Jim Mattson
New
KVM: VMX: Move VM-exit RSB stuffing out of line
KVM: VMX: Move VM-exit RSB stuffing out of line
- - -
-
-
-
2022-06-22
Jim Mattson
New
[v3,2/2] KVM: VMX: Print VM-instruction error as unsigned
[v3,1/2] KVM: VMX: Print VM-instruction error when it may be helpful
- 1 -
-
-
-
2022-05-10
Jim Mattson
New
[v3,1/2] KVM: VMX: Print VM-instruction error when it may be helpful
[v3,1/2] KVM: VMX: Print VM-instruction error when it may be helpful
- 1 -
-
-
-
2022-05-10
Jim Mattson
New
[v2] KVM: VMX: Print VM-instruction error when it may be helpful
[v2] KVM: VMX: Print VM-instruction error when it may be helpful
- - -
-
-
-
2022-05-08
Jim Mattson
New
KVM: VMX: unify VMX instruction error reporting
KVM: VMX: unify VMX instruction error reporting
- - -
-
-
-
2022-05-04
Jim Mattson
New
[kvm-unit-tests] x86: VMX: Require 16-byte alignment for struct vmx_msr_entry
[kvm-unit-tests] x86: VMX: Require 16-byte alignment for struct vmx_msr_entry
- 1 -
-
-
-
2022-04-14
Jim Mattson
New
KVM: x86/pmu: Use different raw event masks for AMD and Intel
KVM: x86/pmu: Use different raw event masks for AMD and Intel
- - -
-
-
-
2022-03-08
Jim Mattson
New
KVM: x86/svm: Clear reserved bits written to PerfEvtSeln MSRs
KVM: x86/svm: Clear reserved bits written to PerfEvtSeln MSRs
- 2 -
-
-
-
2022-02-26
Jim Mattson
New
KVM: VMX: Fix header file dependency of asm/vmx.h
KVM: VMX: Fix header file dependency of asm/vmx.h
- 1 -
-
-
-
2022-02-25
Jim Mattson
New
[kvm-unit-tests] x86/pmu: Set appropriate expectations for reference cycles
[kvm-unit-tests] x86/pmu: Set appropriate expectations for reference cycles
- - -
-
-
-
2022-02-13
Jim Mattson
New
[2/2] KVM: x86/pmu: Use AMD64_RAW_EVENT_MASK for PERF_TYPE_RAW
[1/2] KVM: x86/pmu: Don't truncate the PerfEvtSeln MSR when creating a perf event
- 1 -
-
-
-
2022-02-03
Jim Mattson
New
[1/2] KVM: x86/pmu: Don't truncate the PerfEvtSeln MSR when creating a perf event
[1/2] KVM: x86/pmu: Don't truncate the PerfEvtSeln MSR when creating a perf event
- 1 -
-
-
-
2022-02-03
Jim Mattson
New
[kvm-unit-tests,3/3] x86: Define wrtsc(tsc) as wrmsr(MSR_IA32_TSC, tsc)
[kvm-unit-tests,1/3] x86: tsc_adjust: Remove flaky timing test
- - -
-
-
-
2022-01-27
Jim Mattson
New
[kvm-unit-tests,2/3] x86: tsc_adjust: Use report_skip when skipping test
[kvm-unit-tests,1/3] x86: tsc_adjust: Remove flaky timing test
- - -
-
-
-
2022-01-27
Jim Mattson
New
[kvm-unit-tests,1/3] x86: tsc_adjust: Remove flaky timing test
[kvm-unit-tests,1/3] x86: tsc_adjust: Remove flaky timing test
- - -
-
-
-
2022-01-27
Jim Mattson
New
KVM: VMX: Remove vmcs_config.order
KVM: VMX: Remove vmcs_config.order
- - -
-
-
-
2022-01-25
Jim Mattson
New
[v3,6/6] selftests: kvm/x86: Add test for KVM_SET_PMU_EVENT_FILTER
KVM: x86/pmu: Use binary search to check filtered events
- - -
-
-
-
2022-01-15
Jim Mattson
New
[v3,5/6] selftests: kvm/x86: Introduce x86_model()
KVM: x86/pmu: Use binary search to check filtered events
- - -
-
-
-
2022-01-15
Jim Mattson
New
[v3,4/6] selftests: kvm/x86: Export x86_family() for use outside of processor.c
KVM: x86/pmu: Use binary search to check filtered events
- - -
-
-
-
2022-01-15
Jim Mattson
New
[v3,3/6] selftests: kvm/x86: Introduce is_amd_cpu()
KVM: x86/pmu: Use binary search to check filtered events
- - -
-
-
-
2022-01-15
Jim Mattson
New
«
1
2
3
4
…
4
5
»