Show patches with: Submitter = Maxim Levitsky       |   82 patches
Patch Series S/W/F Date Submitter Delegate State
[v2,2/2] KVM: VMX: read the PML log in the same order as it was written KVM: x86: read the PML log in the same order it was written --- 2024-12-19 Maxim Levitsky New
[v2,1/2] KVM: VMX: refactor PML terminology KVM: x86: read the PML log in the same order it was written --- 2024-12-19 Maxim Levitsky New
[4/4] KVM: selftests: dirty_log_test: support multiple write retires KVM: selftests: dirty_log_test: fixes for running the test nested --- 2024-12-11 Maxim Levitsky New
[3/4] KVM: selftests: dirty_log_test: run the guest until some dirty ring entries were harvested KVM: selftests: dirty_log_test: fixes for running the test nested --- 2024-12-11 Maxim Levitsky New
[2/4] KVM: selftests: dirty_log_test: Limit s390x workaround to s390x KVM: selftests: dirty_log_test: fixes for running the test nested --- 2024-12-11 Maxim Levitsky New
[1/4] KVM: VMX: read the PML log in the same order as it was written KVM: selftests: dirty_log_test: fixes for running the test nested --- 2024-12-11 Maxim Levitsky New
KVM: selftests: memslot_perf_test: increase guest sync timeout KVM: selftests: memslot_perf_test: increase guest sync timeout --- 2024-10-04 Maxim Levitsky Accepted
[1/1] KVM: selftests: pmu_counters_test: increase robustness of LLC cache misses KVM: selftests: pmu_counters_test: increase robustness of LLC cache misses --- 2024-06-21 Maxim Levitsky New
KVM: selftests: fix max_guest_memory_test with more that 256 vCPUs KVM: selftests: fix max_guest_memory_test with more that 256 vCPUs --- 2024-03-15 Maxim Levitsky Accepted
[v2,9/9] KVM: x86: remove exit_int_info warning in svm_handle_exit nSVM: Security and correctness fixes --- 2022-11-03 Maxim Levitsky New
[v2,8/9] KVM: selftests: add svm part to triple_fault_test nSVM: Security and correctness fixes --- 2022-11-03 Maxim Levitsky Superseded
[v2,7/9] KVM: x86: allow L1 to not intercept triple fault nSVM: Security and correctness fixes --- 2022-11-03 Maxim Levitsky Accepted
[v2,6/9] kvm: selftests: add svm nested shutdown test nSVM: Security and correctness fixes --- 2022-11-03 Maxim Levitsky Superseded
[v2,5/9] KVM: selftests: move idt_entry to header nSVM: Security and correctness fixes --- 2022-11-03 Maxim Levitsky Accepted
[v2,4/9] KVM: x86: forcibly leave nested mode on vCPU reset nSVM: Security and correctness fixes --- 2022-11-03 Maxim Levitsky Superseded
[v2,3/9] KVM: x86: add kvm_leave_nested nSVM: Security and correctness fixes --- 2022-11-03 Maxim Levitsky Superseded
[v2,2/9] KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use nSVM: Security and correctness fixes --- 2022-11-03 Maxim Levitsky Superseded
[v2,1/9] KVM: x86: nSVM: leave nested mode on vCPU free nSVM: Security and correctness fixes --- 2022-11-03 Maxim Levitsky Superseded
[9/9] KVM: x86: remove exit_int_info warning in svm_handle_exit nSVM: Security and correctness fixes --- 2022-11-03 Maxim Levitsky Superseded
[8/9] KVM: selftests: add svm part to triple_fault_test nSVM: Security and correctness fixes --- 2022-11-03 Maxim Levitsky Accepted
[7/9] KVM: x86: allow L1 to not intercept triple fault nSVM: Security and correctness fixes --- 2022-11-03 Maxim Levitsky Superseded
[6/9] kvm: selftests: add svm nested shutdown test nSVM: Security and correctness fixes --- 2022-11-03 Maxim Levitsky Accepted
[5/9] KVM: selftests: move idt_entry to header nSVM: Security and correctness fixes --- 2022-11-03 Maxim Levitsky Superseded
[4/9] KVM: x86: forcibly leave nested mode on vCPU reset nSVM: Security and correctness fixes --- 2022-11-03 Maxim Levitsky Accepted
[3/9] KVM: x86: add kvm_leave_nested nSVM: Security and correctness fixes --- 2022-11-03 Maxim Levitsky Accepted
[2/9] KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use nSVM: Security and correctness fixes --- 2022-11-03 Maxim Levitsky Accepted
[1/9] KVM: x86: nSVM: leave nested mode on vCPU free nSVM: Security and correctness fixes --- 2022-11-03 Maxim Levitsky Accepted
[RESEND,v4,23/23] KVM: x86: smm: preserve interrupt shadow in SMRAM SMM emulation and interrupt shadow fixes --- 2022-10-25 Maxim Levitsky New
[RESEND,v4,22/23] KVM: x86: SVM: don't save SVM state to SMRAM when VM is not long mode capable SMM emulation and interrupt shadow fixes --- 2022-10-25 Maxim Levitsky Accepted
[RESEND,v4,21/23] KVM: x86: SVM: use smram structs SMM emulation and interrupt shadow fixes --- 2022-10-25 Maxim Levitsky Accepted
[RESEND,v4,20/23] KVM: svm: drop explicit return value of kvm_vcpu_map SMM emulation and interrupt shadow fixes --- 2022-10-25 Maxim Levitsky Accepted
[RESEND,v4,19/23] KVM: x86: smm: use smram struct for 64 bit smram load/restore SMM emulation and interrupt shadow fixes --- 2022-10-25 Maxim Levitsky Accepted
[RESEND,v4,18/23] KVM: x86: smm: use smram struct for 32 bit smram load/restore SMM emulation and interrupt shadow fixes --- 2022-10-25 Maxim Levitsky Accepted
[RESEND,v4,17/23] KVM: x86: smm: use smram structs in the common code SMM emulation and interrupt shadow fixes --- 2022-10-25 Maxim Levitsky Superseded
[RESEND,v4,16/23] KVM: x86: smm: add structs for KVM's smram layout Untitled series #190517 --- 2022-10-25 Maxim Levitsky Accepted
[RESEND,v4,15/23] KVM: x86: smm: check for failures on smm entry SMM emulation and interrupt shadow fixes --- 2022-10-25 Maxim Levitsky Superseded
[RESEND,v4,14/23] KVM: x86: smm: number of GPRs in the SMRAM image depends on the image format SMM emulation and interrupt shadow fixes --- 2022-10-25 Maxim Levitsky New
[RESEND,v4,13/23] KVM: x86: emulator: update the emulation mode after CR0 write SMM emulation and interrupt shadow fixes --- 2022-10-25 Maxim Levitsky Superseded
[RESEND,v4,12/23] KVM: x86: emulator: update the emulation mode after rsm SMM emulation and interrupt shadow fixes --- 2022-10-25 Maxim Levitsky New
[RESEND,v4,11/23] KVM: x86: emulator: introduce emulator_recalc_and_set_mode SMM emulation and interrupt shadow fixes --- 2022-10-25 Maxim Levitsky Superseded
[RESEND,v4,10/23] KVM: x86: emulator: em_sysexit should update ctxt->mode SMM emulation and interrupt shadow fixes --- 2022-10-25 Maxim Levitsky Superseded
[RESEND,v4,09/23] bug: introduce ASSERT_STRUCT_OFFSET SMM emulation and interrupt shadow fixes --- 2022-10-25 Maxim Levitsky Superseded
[RESEND,v4,08/23] KVM: x86: do not define KVM_REQ_SMI if SMM disabled SMM emulation and interrupt shadow fixes --- 2022-10-25 Maxim Levitsky Superseded
[RESEND,v4,07/23] KVM: x86: remove SMRAM address space if SMM is not supported SMM emulation and interrupt shadow fixes --- 2022-10-25 Maxim Levitsky Superseded
[RESEND,v4,06/23] KVM: x86: compile out vendor-specific code if SMM is disabled SMM emulation and interrupt shadow fixes --- 2022-10-25 Maxim Levitsky Superseded
[RESEND,v4,05/23] KVM: allow compiling out SMM support SMM emulation and interrupt shadow fixes --- 2022-10-25 Maxim Levitsky Superseded
[RESEND,v4,04/23] KVM: x86: do not go through ctxt->ops when emulating rsm SMM emulation and interrupt shadow fixes --- 2022-10-25 Maxim Levitsky Superseded
[RESEND,v4,03/23] KVM: x86: move SMM exit to a new file SMM emulation and interrupt shadow fixes --- 2022-10-25 Maxim Levitsky Superseded
[RESEND,v4,02/23] KVM: x86: move SMM entry to a new file SMM emulation and interrupt shadow fixes --- 2022-10-25 Maxim Levitsky Superseded
[RESEND,v4,01/23] KVM: x86: start moving SMM-related functions to new files SMM emulation and interrupt shadow fixes --- 2022-10-25 Maxim Levitsky New
[v4,17/23] KVM: x86: smm: use smram structs in the common code SMM emulation and interrupt shadow fixes --- 2022-10-25 Maxim Levitsky Accepted
[v4,16/23] KVM: x86: smm: add structs for KVM's smram layout SMM emulation and interrupt shadow fixes --- 2022-10-25 Maxim Levitsky Superseded
[v4,15/23] KVM: x86: smm: check for failures on smm entry SMM emulation and interrupt shadow fixes --- 2022-10-25 Maxim Levitsky Accepted
[v4,14/23] KVM: x86: smm: number of GPRs in the SMRAM image depends on the image format SMM emulation and interrupt shadow fixes --- 2022-10-25 Maxim Levitsky Superseded
[v4,13/23] KVM: x86: emulator: update the emulation mode after CR0 write SMM emulation and interrupt shadow fixes --- 2022-10-25 Maxim Levitsky Accepted
[v4,12/23] KVM: x86: emulator: update the emulation mode after rsm SMM emulation and interrupt shadow fixes --- 2022-10-25 Maxim Levitsky Superseded
[v4,11/23] KVM: x86: emulator: introduce emulator_recalc_and_set_mode SMM emulation and interrupt shadow fixes --- 2022-10-25 Maxim Levitsky Accepted
[v4,10/23] KVM: x86: emulator: em_sysexit should update ctxt->mode SMM emulation and interrupt shadow fixes --- 2022-10-25 Maxim Levitsky Accepted
[v4,09/23] bug: introduce ASSERT_STRUCT_OFFSET SMM emulation and interrupt shadow fixes --- 2022-10-25 Maxim Levitsky Accepted
[v4,08/23] KVM: x86: do not define KVM_REQ_SMI if SMM disabled SMM emulation and interrupt shadow fixes --- 2022-10-25 Maxim Levitsky New
[v4,07/23] KVM: x86: remove SMRAM address space if SMM is not supported SMM emulation and interrupt shadow fixes --- 2022-10-25 Maxim Levitsky New
[v4,06/23] KVM: x86: compile out vendor-specific code if SMM is disabled SMM emulation and interrupt shadow fixes --- 2022-10-25 Maxim Levitsky New
[v4,05/23] KVM: allow compiling out SMM support SMM emulation and interrupt shadow fixes --- 2022-10-25 Maxim Levitsky New
[v4,04/23] KVM: x86: do not go through ctxt->ops when emulating rsm SMM emulation and interrupt shadow fixes --- 2022-10-25 Maxim Levitsky New
[v4,03/23] KVM: x86: move SMM exit to a new file SMM emulation and interrupt shadow fixes --- 2022-10-25 Maxim Levitsky New
[v4,02/23] KVM: x86: move SMM entry to a new file SMM emulation and interrupt shadow fixes --- 2022-10-25 Maxim Levitsky New
[v4,01/23] KVM: x86: start moving SMM-related functions to new files SMM emulation and interrupt shadow fixes --- 2022-10-25 Maxim Levitsky Superseded
[13/14] KVM: x86: nSVM: implement nested TSC scaling [01/14] KVM: x86: nSVM: restore int_vector in svm_clear_vintr --- 2021-09-14 Maxim Levitsky New
[11/14] KVM: x86: nSVM: implement nested VMLOAD/VMSAVE [01/14] KVM: x86: nSVM: restore int_vector in svm_clear_vintr --- 2021-09-14 Maxim Levitsky New
[09/14] KVM: x86: nSVM: correctly virtualize LBR msrs when L2 is running [01/14] KVM: x86: nSVM: restore int_vector in svm_clear_vintr --- 2021-09-14 Maxim Levitsky Accepted
[07/14] KVM: x86: SVM: add warning for CVE-2021-3656 [01/14] KVM: x86: nSVM: restore int_vector in svm_clear_vintr --- 2021-09-14 Maxim Levitsky New
[05/14] KVM: x86: nSVM: don't copy virt_ext from vmcb12 [01/14] KVM: x86: nSVM: restore int_vector in svm_clear_vintr --- 2021-09-14 Maxim Levitsky Accepted
[03/14] KVM: x86: nSVM: test eax for 4K alignment for GP errata workaround [01/14] KVM: x86: nSVM: restore int_vector in svm_clear_vintr --- 2021-09-14 Maxim Levitsky Accepted
[01/14] KVM: x86: nSVM: restore int_vector in svm_clear_vintr [01/14] KVM: x86: nSVM: restore int_vector in svm_clear_vintr --- 2021-09-14 Maxim Levitsky Accepted
[v3,6/6] KVM: selftests: test KVM_GUESTDBG_BLOCKIRQ Untitled series #151603 --- 2021-08-11 Maxim Levitsky Accepted
[v3,4/6] scripts/gdb: rework lx-symbols gdb script Untitled series #151603 --- 2021-08-11 Maxim Levitsky New
[v3,2/6] KVM: x86: add force_intercept_exceptions_mask Untitled series #151603 --- 2021-08-11 Maxim Levitsky New
[v2] KVM: selftests: fix hyperv_clock test [v2] KVM: selftests: fix hyperv_clock test --- 2021-08-04 Maxim Levitsky Superseded
KVM: selftests: fix hyperv_clock test KVM: selftests: fix hyperv_clock test --- 2021-08-04 Maxim Levitsky Accepted
[v2,3/3] kvm/selftests: update tsc_msrs_test to cover KVM_X86_QUIRK_TSC_HOST_ACCESS RFC: Precise TSC migration --- 2020-12-03 Maxim Levitsky New
[v2,2/3] KVM: x86: introduce KVM_X86_QUIRK_TSC_HOST_ACCESS RFC: Precise TSC migration --- 2020-12-03 Maxim Levitsky New
[v2,1/3] KVM: x86: implement KVM_{GET|SET}_TSC_STATE RFC: Precise TSC migration --- 2020-12-03 Maxim Levitsky New