Show patches with: Submitter = Maxim Levitsky       |    State = Action Required       |   117 patches
« 1 2 »
Patch Series A/R/T S/W/F Date Submitter Delegate State
[v4,13/23] KVM: x86: emulator: update the emulation mode after CR0 write SMM emulation and interrupt shadow fixes - - - --- 2022-10-25 Maxim Levitsky New
[v4,12/23] KVM: x86: emulator: update the emulation mode after rsm SMM emulation and interrupt shadow fixes - - - --- 2022-10-25 Maxim Levitsky New
[v4,11/23] KVM: x86: emulator: introduce emulator_recalc_and_set_mode SMM emulation and interrupt shadow fixes - - - --- 2022-10-25 Maxim Levitsky New
[v4,10/23] KVM: x86: emulator: em_sysexit should update ctxt->mode SMM emulation and interrupt shadow fixes - - - --- 2022-10-25 Maxim Levitsky New
[v4,09/23] bug: introduce ASSERT_STRUCT_OFFSET SMM emulation and interrupt shadow fixes - - - --- 2022-10-25 Maxim Levitsky New
[v4,08/23] KVM: x86: do not define KVM_REQ_SMI if SMM disabled SMM emulation and interrupt shadow fixes - - - --- 2022-10-25 Maxim Levitsky New
[v4,07/23] KVM: x86: remove SMRAM address space if SMM is not supported SMM emulation and interrupt shadow fixes - - - --- 2022-10-25 Maxim Levitsky New
[v4,06/23] KVM: x86: compile out vendor-specific code if SMM is disabled SMM emulation and interrupt shadow fixes - - - --- 2022-10-25 Maxim Levitsky New
[v4,05/23] KVM: allow compiling out SMM support SMM emulation and interrupt shadow fixes - - - --- 2022-10-25 Maxim Levitsky New
[v4,04/23] KVM: x86: do not go through ctxt->ops when emulating rsm SMM emulation and interrupt shadow fixes - - - --- 2022-10-25 Maxim Levitsky New
[v4,03/23] KVM: x86: move SMM exit to a new file SMM emulation and interrupt shadow fixes - - - --- 2022-10-25 Maxim Levitsky New
[v4,02/23] KVM: x86: move SMM entry to a new file SMM emulation and interrupt shadow fixes - - - --- 2022-10-25 Maxim Levitsky New
[v4,01/23] KVM: x86: start moving SMM-related functions to new files SMM emulation and interrupt shadow fixes - - - --- 2022-10-25 Maxim Levitsky New
[4/4] KVM: x86: forcibly leave nested mode on vCPU reset nSVM: fix L0 crash if L2 has shutdown condtion which L1 doesn't intercept - - - --- 2022-10-20 Maxim Levitsky New
[3/4] KVM: x86: add kvm_leave_nested nSVM: fix L0 crash if L2 has shutdown condtion which L1 doesn't intercept - - - --- 2022-10-20 Maxim Levitsky New
[2/4] KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use nSVM: fix L0 crash if L2 has shutdown condtion which L1 doesn't intercept - - - --- 2022-10-20 Maxim Levitsky New
[1/4] KVM: x86: nSVM: leave nested mode on vCPU free nSVM: fix L0 crash if L2 has shutdown condtion which L1 doesn't intercept - - - --- 2022-10-20 Maxim Levitsky New
« 1 2 »