Toggle navigation
Patchwork
linux-kernel
Patches
Bundles
About this project
Login
Register
Mail settings
Show patches with
: Submitter =
Sean Christopherson
| State =
Action Required
| Archived =
No
| 1233 patches
Series
Submitter
State
any
Action Required
New
Under Review
Accepted
Rejected
RFC
Not Applicable
Changes Requested
Awaiting Upstream
Superseded
Deferred
Unresolved
Repeat Merge
Corrupt patch
Search
Archived
No
Yes
Both
Delegate
------
Nobody
snail
snail
patchwork-bot
patchwork-bot
patchwork-bot
ww
ww
ww
Apply
«
1
2
…
7
8
9
…
12
13
»
Patch
Series
A/R/T
S/W/F
Date
Submitter
Delegate
State
[v3,07/28] drm/i915/gvt: Don't rely on KVM's gfn_to_pfn() to query possible 2M GTT
drm/i915/gvt: KVM: KVMGT fixes and page-track cleanups
- 1 1
-
-
-
2023-05-13
Sean Christopherson
New
[v3,06/28] drm/i915/gvt: Error out on an attempt to shadowing an unknown GTT entry type
drm/i915/gvt: KVM: KVMGT fixes and page-track cleanups
- 1 -
-
-
-
2023-05-13
Sean Christopherson
New
[v3,05/28] drm/i915/gvt: Explicitly check that vGPU is attached before shadowing
drm/i915/gvt: KVM: KVMGT fixes and page-track cleanups
- - -
-
-
-
2023-05-13
Sean Christopherson
New
[v3,04/28] drm/i915/gvt: Put the page reference obtained by KVM's gfn_to_pfn()
drm/i915/gvt: KVM: KVMGT fixes and page-track cleanups
- 1 -
-
-
-
2023-05-13
Sean Christopherson
New
[v3,03/28] drm/i915/gvt: Verify hugepages are contiguous in physical address space
drm/i915/gvt: KVM: KVMGT fixes and page-track cleanups
- - -
-
-
-
2023-05-13
Sean Christopherson
New
[v3,02/28] drm/i915/gvt: remove interface intel_gvt_is_valid_gfn
drm/i915/gvt: KVM: KVMGT fixes and page-track cleanups
1 - -
-
-
-
2023-05-13
Sean Christopherson
New
[v3,01/28] drm/i915/gvt: Verify pfn is "valid" before dereferencing "struct page"
drm/i915/gvt: KVM: KVMGT fixes and page-track cleanups
- 1 -
-
-
-
2023-05-13
Sean Christopherson
New
[v3,18/18] KVM: SVM: Use "standard" stgi() helper when disabling SVM
x86/reboot: KVM: Clean up "emergency" virt code
- - -
-
-
-
2023-05-12
Sean Christopherson
New
[v3,17/18] KVM: x86: Force kvm_rebooting=true during emergency reboot/crash
x86/reboot: KVM: Clean up "emergency" virt code
- 1 -
-
-
-
2023-05-12
Sean Christopherson
New
[v3,16/18] x86/virt: KVM: Move "disable SVM" helper into KVM SVM
x86/reboot: KVM: Clean up "emergency" virt code
- 1 -
-
-
-
2023-05-12
Sean Christopherson
New
[v3,15/18] KVM: VMX: Ensure CPU is stable when probing basic VMX support
x86/reboot: KVM: Clean up "emergency" virt code
- 1 -
-
-
-
2023-05-12
Sean Christopherson
New
[v3,14/18] KVM: SVM: Check that the current CPU supports SVM in kvm_is_svm_supported()
x86/reboot: KVM: Clean up "emergency" virt code
- 1 -
-
-
-
2023-05-12
Sean Christopherson
New
[v3,13/18] x86/virt: KVM: Open code cpu_has_svm() into kvm_is_svm_supported()
x86/reboot: KVM: Clean up "emergency" virt code
- 1 -
-
-
-
2023-05-12
Sean Christopherson
New
[v3,12/18] x86/virt: Drop unnecessary check on extended CPUID level in cpu_has_svm()
x86/reboot: KVM: Clean up "emergency" virt code
- - -
-
-
-
2023-05-12
Sean Christopherson
New
[v3,11/18] KVM: SVM: Make KVM_AMD depend on CPU_SUP_AMD or CPU_SUP_HYGON
x86/reboot: KVM: Clean up "emergency" virt code
- - -
-
-
-
2023-05-12
Sean Christopherson
New
[v3,10/18] x86/virt: KVM: Move VMXOFF helpers into KVM VMX
x86/reboot: KVM: Clean up "emergency" virt code
- 1 -
-
-
-
2023-05-12
Sean Christopherson
New
[v3,09/18] x86/virt: KVM: Open code cpu_has_vmx() in KVM VMX
x86/reboot: KVM: Clean up "emergency" virt code
- 1 -
-
-
-
2023-05-12
Sean Christopherson
New
[v3,08/18] x86/reboot: Expose VMCS crash hooks if and only if KVM_{INTEL,AMD} is enabled
x86/reboot: KVM: Clean up "emergency" virt code
- 1 -
-
-
-
2023-05-12
Sean Christopherson
New
[v3,07/18] x86/reboot: Hoist "disable virt" helpers above "emergency reboot" path
x86/reboot: KVM: Clean up "emergency" virt code
- 1 -
-
-
-
2023-05-12
Sean Christopherson
New
[v3,06/18] x86/reboot: Assert that IRQs are disabled when turning off virtualization
x86/reboot: KVM: Clean up "emergency" virt code
- 1 -
-
-
-
2023-05-12
Sean Christopherson
New
[v3,05/18] x86/reboot: Disable virtualization during reboot iff callback is registered
x86/reboot: KVM: Clean up "emergency" virt code
- - -
-
-
-
2023-05-12
Sean Christopherson
New
[v3,04/18] x86/reboot: KVM: Disable SVM during reboot via virt/KVM reboot callback
x86/reboot: KVM: Clean up "emergency" virt code
1 - -
-
-
-
2023-05-12
Sean Christopherson
New
[v3,03/18] x86/reboot: KVM: Handle VMXOFF in KVM's reboot callback
x86/reboot: KVM: Clean up "emergency" virt code
- - -
-
-
-
2023-05-12
Sean Christopherson
New
[v3,02/18] x86/reboot: Harden virtualization hooks for emergency reboot
x86/reboot: KVM: Clean up "emergency" virt code
- 1 -
-
-
-
2023-05-12
Sean Christopherson
New
[v3,01/18] x86/reboot: VMCLEAR active VMCSes before emergency reboot
x86/reboot: KVM: Clean up "emergency" virt code
- - -
-
-
-
2023-05-12
Sean Christopherson
New
[v2,2/2] KVM: Don't enable hardware after a restart/shutdown is initiated
KVM: Fix race between reboot and hardware enabling
- - -
-
-
-
2023-05-12
Sean Christopherson
New
[v2,1/2] KVM: Use syscore_ops instead of reboot_notifier to hook restart/shutdown
KVM: Fix race between reboot and hardware enabling
- - -
-
-
-
2023-05-12
Sean Christopherson
New
[9/9] KVM: x86/mmu: BUG() in rmap helpers iff CONFIG_BUG_ON_DATA_CORRUPTION=y
KVM: x86/mmu: Clean up MMU_DEBUG and BUG/WARN usage
- 1 -
-
-
-
2023-05-11
Sean Christopherson
New
[8/9] KVM: x86/mmu: Plumb "struct kvm" all the way to pte_list_remove()
KVM: x86/mmu: Clean up MMU_DEBUG and BUG/WARN usage
- - -
-
-
-
2023-05-11
Sean Christopherson
New
[7/9] KVM: x86/mmu: Replace MMU_DEBUG with proper KVM_PROVE_MMU Kconfig
KVM: x86/mmu: Clean up MMU_DEBUG and BUG/WARN usage
- - -
-
-
-
2023-05-11
Sean Christopherson
New
[6/9] KVM: x86/mmu: Bug the VM if a vCPU ends up in long mode without PAE enabled
KVM: x86/mmu: Clean up MMU_DEBUG and BUG/WARN usage
- - -
-
-
-
2023-05-11
Sean Christopherson
New
[5/9] KVM: x86/mmu: Convert "runtime" WARN_ON() assertions to WARN_ON_ONCE()
KVM: x86/mmu: Clean up MMU_DEBUG and BUG/WARN usage
- - -
-
-
-
2023-05-11
Sean Christopherson
New
[4/9] KVM: x86/mmu: Rename MMU_WARN_ON() to KVM_MMU_WARN_ON()
KVM: x86/mmu: Clean up MMU_DEBUG and BUG/WARN usage
- - -
-
-
-
2023-05-11
Sean Christopherson
New
[3/9] KVM: x86/mmu: Delete the "dbg" module param
KVM: x86/mmu: Clean up MMU_DEBUG and BUG/WARN usage
- - -
-
-
-
2023-05-11
Sean Christopherson
New
[2/9] KVM: x86/mmu: Delete rmap_printk() and all its usage
KVM: x86/mmu: Clean up MMU_DEBUG and BUG/WARN usage
- - -
-
-
-
2023-05-11
Sean Christopherson
New
[1/9] KVM: x86/mmu: Delete pgprintk() and all its usage
KVM: x86/mmu: Clean up MMU_DEBUG and BUG/WARN usage
- - -
-
-
-
2023-05-11
Sean Christopherson
New
[v2,8/8] KVM: x86: Move common handling of PAT MSR writes to kvm_set_msr_common()
KVM: x86: Clean up MSR PAT handling
- 1 -
-
-
-
2023-05-11
Sean Christopherson
New
[v2,7/8] KVM: x86: Make kvm_mtrr_valid() static now that there are no external users
KVM: x86: Clean up MSR PAT handling
- 1 -
-
-
-
2023-05-11
Sean Christopherson
New
[v2,6/8] KVM: x86: Move PAT MSR handling out of mtrr.c
KVM: x86: Clean up MSR PAT handling
- 1 -
-
-
-
2023-05-11
Sean Christopherson
New
[v2,5/8] KVM: x86: Use MTRR macros to define possible MTRR MSR ranges
KVM: x86: Clean up MSR PAT handling
- 1 -
-
-
-
2023-05-11
Sean Christopherson
New
[v2,4/8] KVM: x86: Add helper to get variable MTRR range from MSR index
KVM: x86: Clean up MSR PAT handling
- 1 -
-
-
-
2023-05-11
Sean Christopherson
New
[v2,3/8] KVM: x86: Add helper to query if variable MTRR MSR is base (versus mask)
KVM: x86: Clean up MSR PAT handling
- - -
-
-
-
2023-05-11
Sean Christopherson
New
[v2,2/8] KVM: SVM: Use kvm_pat_valid() directly instead of kvm_mtrr_valid()
KVM: x86: Clean up MSR PAT handling
- 1 -
-
-
-
2023-05-11
Sean Christopherson
New
[v2,1/8] KVM: VMX: Open code writing vCPU's PAT in VMX's MSR handler
KVM: x86: Clean up MSR PAT handling
- 1 -
-
-
-
2023-05-11
Sean Christopherson
New
[5/5] KVM: x86: Move PAT MSR handling out of mtrr.c
KVM: x86: Clean up MSR PAT handling
- - -
-
-
-
2023-05-03
Sean Christopherson
New
[4/5] KVM: x86: WARN if writes to PAT MSR are handled by common KVM code
KVM: x86: Clean up MSR PAT handling
- - -
-
-
-
2023-05-03
Sean Christopherson
New
[3/5] KVM: x86: Use MTRR macros to define possible MTRR MSR ranges
KVM: x86: Clean up MSR PAT handling
- - -
-
-
-
2023-05-03
Sean Christopherson
New
[2/5] KVM: SVM: Use kvm_pat_valid() directly instead of kvm_mtrr_valid()
KVM: x86: Clean up MSR PAT handling
- 1 -
-
-
-
2023-05-03
Sean Christopherson
New
[1/5] KVM: VMX: Open code writing vCPU's PAT in VMX's MSR handler
KVM: x86: Clean up MSR PAT handling
- - -
-
-
-
2023-05-03
Sean Christopherson
New
[v2,3/3] KVM: x86: Open code supported XCR0 calculation in kvm_vcpu_after_set_cpuid()
KVM: x86: SGX vs. XCR0 cleanups
- 1 1
-
-
-
2023-05-03
Sean Christopherson
New
[v2,2/3] KVM: x86: Don't adjust guest's CPUID.0x12.1 (allowed SGX enclave XFRM)
KVM: x86: SGX vs. XCR0 cleanups
- 1 1
-
-
-
2023-05-03
Sean Christopherson
New
[v2,1/3] KVM: VMX: Don't rely _only_ on CPUID to enforce XCR0 restrictions for ECREATE
KVM: x86: SGX vs. XCR0 cleanups
- 1 1
-
-
-
2023-05-03
Sean Christopherson
New
[v3] KVM: x86: Preserve TDP MMU roots until they are explicitly invalidated
[v3] KVM: x86: Preserve TDP MMU roots until they are explicitly invalidated
- - 1
-
-
-
2023-04-26
Sean Christopherson
New
[v2] KVM: x86: Preserve TDP MMU roots until they are explicitly invalidated
[v2] KVM: x86: Preserve TDP MMU roots until they are explicitly invalidated
- - 1
-
-
-
2023-04-21
Sean Christopherson
New
[2/2] KVM: VMX: Use proper accessor to read guest CR4 in handle_desc()
KVM: VMX: UMIP emulation related cleanups
- - -
-
-
-
2023-04-13
Sean Christopherson
New
[1/2] KVM: VMX: Treat UMIP as emulated if and only if the host doesn't have UMIP
KVM: VMX: UMIP emulation related cleanups
- - -
-
-
-
2023-04-13
Sean Christopherson
New
KVM: x86: Preserve TDP MMU roots until they are explicitly invalidated
KVM: x86: Preserve TDP MMU roots until they are explicitly invalidated
- 1 1
-
-
-
2023-04-13
Sean Christopherson
New
[v3,2/2] Documentation/process: Add a maintainer handbook for KVM x86
Documentation/process: Add a maintainer handbook for KVM x86
- - -
-
-
-
2023-04-11
Sean Christopherson
New
[v3,1/2] Documentation/process: Add a label for the tip tree handbook's coding style
Documentation/process: Add a maintainer handbook for KVM x86
- - -
-
-
-
2023-04-11
Sean Christopherson
New
[v4,6/6] KVM: selftests: Test the PMU event "Instructions retired"
KVM: selftests: Add "instructions required" testcase
- - -
-
-
-
2023-04-07
Sean Christopherson
New
[v4,5/6] KVM: selftests: Copy full counter values from guest in PMU event filter test
KVM: selftests: Add "instructions required" testcase
- - -
-
-
-
2023-04-07
Sean Christopherson
New
[v4,4/6] KVM: selftests: Use error codes to signal errors in PMU event filter test
KVM: selftests: Add "instructions required" testcase
- - -
-
-
-
2023-04-07
Sean Christopherson
New
[v4,3/6] KVM: selftests: Print detailed info in PMU event filter asserts
KVM: selftests: Add "instructions required" testcase
- - -
-
-
-
2023-04-07
Sean Christopherson
New
[v4,2/6] KVM: selftests: Add helpers for PMC asserts in PMU event filter test
KVM: selftests: Add "instructions required" testcase
- - -
-
-
-
2023-04-07
Sean Christopherson
New
[v4,1/6] KVM: selftests: Add a common helper for the PMU event filter guest code
KVM: selftests: Add "instructions required" testcase
- - -
-
-
-
2023-04-07
Sean Christopherson
New
KVM: selftests: Refactor stable TSC check to use TEST_REQUIRE()
KVM: selftests: Refactor stable TSC check to use TEST_REQUIRE()
- - -
-
-
-
2023-04-06
Sean Christopherson
New
[2/2] KVM: VMX: Inject #GP, not #UD, if SGX2 ENCLS leafs are unsupported
KVM: VMX: Fixes for faults on ENCLS emulation
- 1 1
-
-
-
2023-04-05
Sean Christopherson
New
[1/2] KVM: VMX: Inject #GP on ENCLS if vCPU has paging disabled (CR0.PG==0)
KVM: VMX: Fixes for faults on ENCLS emulation
- 1 1
-
-
-
2023-04-05
Sean Christopherson
New
[3/3] KVM: x86: Open code supported XCR0 calculation in kvm_vcpu_after_set_cpuid()
[1/3] KVM: VMX: Don't rely _only_ on CPUID to enforce XCR0 restrictions for ECREATE
- - -
-
-
-
2023-04-05
Sean Christopherson
New
[2/3] KVM: x86: Don't adjust guest's CPUID.0x12.1 (allowed SGX enclave XFRM)
[1/3] KVM: VMX: Don't rely _only_ on CPUID to enforce XCR0 restrictions for ECREATE
- - -
-
-
-
2023-04-05
Sean Christopherson
New
[1/3] KVM: VMX: Don't rely _only_ on CPUID to enforce XCR0 restrictions for ECREATE
[1/3] KVM: VMX: Don't rely _only_ on CPUID to enforce XCR0 restrictions for ECREATE
- 1 1
-
-
-
2023-04-05
Sean Christopherson
New
[0/3] KVM: x86: SGX vs. XCR0 cleanups
- - -
-
-
-
2023-04-05
Sean Christopherson
New
[v4,6/6] KVM: selftests: Add test to verify KVM's supported XCR0
KVM: x86: Fix unpermitted XTILE CPUID reporting
- - -
-
-
-
2023-04-05
Sean Christopherson
New
[v4,5/6] KVM: selftests: Add all known XFEATURE masks to common code
KVM: x86: Fix unpermitted XTILE CPUID reporting
- - -
-
-
-
2023-04-05
Sean Christopherson
New
[v4,4/6] KVM: selftests: Rework dynamic XFeature helper to take mask, not bit
KVM: x86: Fix unpermitted XTILE CPUID reporting
- - -
-
-
-
2023-04-05
Sean Christopherson
New
[v4,3/6] KVM: selftests: Move XGETBV and XSETBV helpers to common code
KVM: x86: Fix unpermitted XTILE CPUID reporting
- 2 -
-
-
-
2023-04-05
Sean Christopherson
New
[v4,2/6] KVM: x86: Filter out XTILE_CFG if XTILE_DATA isn't permitted
KVM: x86: Fix unpermitted XTILE CPUID reporting
- - -
-
-
-
2023-04-05
Sean Christopherson
New
[v4,1/6] KVM: x86: Add a helper to handle filtering of unpermitted XCR0 features
KVM: x86: Fix unpermitted XTILE CPUID reporting
- 1 -
-
-
-
2023-04-05
Sean Christopherson
New
[2/2] KVM: x86/mmu: Move filling of Hyper-V's TLB range struct into Hyper-V code
KVM: x86: More cleanups for Hyper-V range flushing
- - -
-
-
-
2023-04-05
Sean Christopherson
New
[1/2] KVM: x86: Rename Hyper-V remote TLB hooks to match established scheme
KVM: x86: More cleanups for Hyper-V range flushing
- - -
-
-
-
2023-04-05
Sean Christopherson
New
KVM: x86/mmu: Refresh CR0.WP prior to checking for emulated permission faults
KVM: x86/mmu: Refresh CR0.WP prior to checking for emulated permission faults
- - 1
-
-
-
2023-04-05
Sean Christopherson
New
KVM: nVMX: Emulate NOPs in L2, and PAUSE if it's not intercepted
KVM: nVMX: Emulate NOPs in L2, and PAUSE if it's not intercepted
- 1 -
-
-
-
2023-04-05
Sean Christopherson
New
[2/2] KVM: nVMX: Do not report error code when synthesizing VM-Exit from Real Mode
[1/2] KVM: x86: Clear "has_error_code", not "error_code", for RM exception injection
- - -
-
-
-
2023-03-22
Sean Christopherson
New
[1/2] KVM: x86: Clear "has_error_code", not "error_code", for RM exception injection
[1/2] KVM: x86: Clear "has_error_code", not "error_code", for RM exception injection
- - -
-
-
-
2023-03-22
Sean Christopherson
New
[0/2] KVM: x86: Fix RM exception injection bugs
- - -
-
-
-
2023-03-22
Sean Christopherson
New
KVM: x86: Suppress pending MMIO write exits if emulator detects exception
KVM: x86: Suppress pending MMIO write exits if emulator detects exception
- - -
-
-
-
2023-03-22
Sean Christopherson
New
[6/6] KVM: SVM: Return the local "r" variable from svm_set_msr()
KVM: x86: Unhost the *_CMD MSR mess
- - -
-
-
-
2023-03-22
Sean Christopherson
New
[5/6] KVM: x86: Virtualize FLUSH_L1D and passthrough MSR_IA32_FLUSH_CMD
KVM: x86: Unhost the *_CMD MSR mess
- - -
-
-
-
2023-03-22
Sean Christopherson
New
[4/6] KVM: x86: Move MSR_IA32_PRED_CMD WRMSR emulation to common code
KVM: x86: Unhost the *_CMD MSR mess
- 1 -
-
-
-
2023-03-22
Sean Christopherson
New
[3/6] KVM: SVM: Passthrough MSR_IA32_PRED_CMD based purely on host+guest CPUID
KVM: x86: Unhost the *_CMD MSR mess
- - -
-
-
-
2023-03-22
Sean Christopherson
New
[2/6] KVM: VMX: Passthrough MSR_IA32_PRED_CMD based purely on host+guest CPUID
KVM: x86: Unhost the *_CMD MSR mess
- 1 -
-
-
-
2023-03-22
Sean Christopherson
New
[1/6] KVM: x86: Revert MSR_IA32_FLUSH_CMD.FLUSH_L1D enabling
KVM: x86: Unhost the *_CMD MSR mess
- - 1
-
-
-
2023-03-22
Sean Christopherson
New
[v4,13/13] KVM: x86/mmu: Merge all handle_changed_pte*() functions
KVM: x86/mmu: Optimize clear dirty log
- 2 -
-
-
-
2023-03-21
Sean Christopherson
New
[v4,12/13] KVM: x86/mmu: Remove handle_changed_spte_dirty_log()
KVM: x86/mmu: Optimize clear dirty log
- 1 -
-
-
-
2023-03-21
Sean Christopherson
New
[v4,11/13] KVM: x86/mmu: Remove "record_acc_track" in __tdp_mmu_set_spte()
KVM: x86/mmu: Optimize clear dirty log
- 1 -
-
-
-
2023-03-21
Sean Christopherson
New
[v4,10/13] KVM: x86/mmu: Bypass __handle_changed_spte() when aging TDP MMU SPTEs
KVM: x86/mmu: Optimize clear dirty log
- 1 -
-
-
-
2023-03-21
Sean Christopherson
New
[v4,09/13] KVM: x86/mmu: Drop unnecessary dirty log checks when aging TDP MMU SPTEs
KVM: x86/mmu: Optimize clear dirty log
- - -
-
-
-
2023-03-21
Sean Christopherson
New
[v4,08/13] KVM: x86/mmu: Clear only A-bit (if enabled) when aging TDP MMU SPTEs
KVM: x86/mmu: Optimize clear dirty log
- 1 -
-
-
-
2023-03-21
Sean Christopherson
New
[v4,07/13] KVM: x86/mmu: Remove "record_dirty_log" in __tdp_mmu_set_spte()
KVM: x86/mmu: Optimize clear dirty log
- 1 -
-
-
-
2023-03-21
Sean Christopherson
New
[v4,06/13] KVM: x86/mmu: Bypass __handle_changed_spte() when clearing TDP MMU dirty bits
KVM: x86/mmu: Optimize clear dirty log
- 1 -
-
-
-
2023-03-21
Sean Christopherson
New
«
1
2
…
7
8
9
…
12
13
»