Jim Mattson ([email protected])

Number of posts: 926 (0.34 per day)
First post: 2016-11-22 20:03:07
Last post: 2024-06-13 19:31:12

Date List Subject
2020-03-03 21:39:09 linux-kernel Re: [PATCH v2 64/66] KVM: nSVM: Expose SVM features to L1 iff nested is enabled
2020-03-03 18:10:50 linux-kernel Re: [PATCH 2/6] KVM: x86: Fix CPUID range check for Centaur and Hypervisor ranges
2020-03-03 17:47:36 linux-kernel Re: [PATCH 2/6] KVM: x86: Fix CPUID range check for Centaur and Hypervisor ranges
2020-03-03 04:26:18 linux-kernel Re: [PATCH 2/6] KVM: x86: Fix CPUID range check for Centaur and Hypervisor ranges
2020-03-03 03:26:51 linux-kernel Re: [PATCH 2/6] KVM: x86: Fix CPUID range check for Centaur and Hypervisor ranges
2020-03-02 21:59:48 linux-kernel Re: [PATCH 2/6] KVM: x86: Fix CPUID range check for Centaur and Hypervisor ranges
2020-03-02 18:30:49 linux-kernel Re: [PATCH v2] KVM: X86: deprecate obsolete KVM_GET_CPUID2 ioctl
2020-03-02 17:45:24 linux-kernel Re: [PATCH v2] KVM: X86: deprecate obsolete KVM_GET_CPUID2 ioctl
2020-03-02 17:03:40 linux-kernel Re: [PATCH v2] KVM: X86: deprecate obsolete KVM_GET_CPUID2 ioctl
2020-02-29 20:18:29 linux-kernel Re: [FYI PATCH 1/3] KVM: nVMX: Don't emulate instructions in guest mode
2020-02-29 19:03:10 linux-kernel Re: [FYI PATCH 1/3] KVM: nVMX: Don't emulate instructions in guest mode
2020-02-27 17:59:24 linux-kernel Re: [PATCH 0/5] KVM: Support guest MAXPHYADDR < host MAXPHYADDR
2020-02-27 17:56:07 linux-kernel Re: [PATCH 2/5] KVM: VMX: Add guest physical address check in EPT violation and misconfig
2020-02-14 17:44:43 linux-kernel Re: [PATCH] kvm: x86: Print "disabled by bios" only once per host
2020-02-14 17:41:13 linux-kernel Re: [PATCH] kvm/emulate: fix a -Werror=cast-function-type
2020-01-28 22:00:58 linux-kernel Re: [PATCH] KVM: x86: Fix perfctr WRMSR for running counters
2020-01-24 22:35:56 linux-kernel Re: linux-next: Tree for Jan 24 (kvm)
2020-01-24 21:50:29 linux-kernel Re: linux-next: Tree for Jan 24 (kvm)
2020-01-23 18:24:07 linux-kernel Re: [PATCH] KVM: nVMX: set rflags to specify success in handle_invvpid() default case
2020-01-08 19:57:52 linux-kernel Re: [PATCH] KVM: x86/mmu: Fix a benign Bitwise vs. Logical OR mixup
2020-01-06 20:21:40 linux-kernel Re: [PATCH v2 12/13] KVM: x86: Protect DR-based index computations from Spectre-v1/L1TF attacks
2020-01-06 20:21:03 linux-kernel Re: [PATCH v2 13/13] KVM: x86: Protect pmu_intel.c from Spectre-v1/L1TF attacks
2020-01-06 20:20:22 linux-kernel Re: [PATCH v2 07/13] KVM: x86: Protect MSR-based index computations in fixed_msr_to_seg_unit() from Spectre-v1/L1TF attacks
2020-01-06 20:20:21 linux-kernel Re: [PATCH v2 10/13] KVM: x86: Protect memory accesses from Spectre-v1/L1TF attacks in x86.c
2020-01-06 20:20:17 linux-kernel Re: [PATCH v2 09/13] KVM: x86: Protect MSR-based index computations from Spectre-v1/L1TF attacks in x86.c
2020-01-06 20:20:12 linux-kernel Re: [PATCH v2 06/13] KVM: x86: Protect kvm_lapic_reg_write() from Spectre-v1/L1TF attacks
2020-01-06 20:19:53 linux-kernel Re: [PATCH v2 05/13] KVM: x86: Protect ioapic_write_indirect() from Spectre-v1/L1TF attacks
2020-01-06 20:19:52 linux-kernel Re: [PATCH v2 08/13] KVM: x86: Protect MSR-based index computations in pmu.h from Spectre-v1/L1TF attacks
2020-01-06 20:19:44 linux-kernel Re: [PATCH v2 04/13] KVM: x86: Protect ioapic_read_indirect() from Spectre-v1/L1TF attacks
2020-01-06 20:19:17 linux-kernel Re: [PATCH v2 03/13] KVM: x86: Refactor picdev_write() to prevent Spectre-v1/L1TF attacks
2020-01-06 20:18:11 linux-kernel Re: [PATCH v2 01/13] KVM: x86: Protect x86_decode_insn from Spectre-v1/L1TF attacks
2020-01-06 20:17:59 linux-kernel Re: [PATCH v2 02/13] KVM: x86: Protect kvm_hv_msr_[get|set]_crash_data() from Spectre-v1/L1TF attacks
2019-12-12 17:58:04 linux-kernel Re: [PATCH v4 11/19] x86/cpu: Print VMX flags in /proc/cpuinfo using VMX_FEATURES_*
2019-12-12 17:46:13 linux-kernel Re: [PATCH v2 02/13] KVM: x86: Protect kvm_hv_msr_[get|set]_crash_data() from Spectre-v1/L1TF attacks
2019-12-11 18:29:30 linux-kernel Re: [PATCH 2/2] KVM: x86: Refactor and rename bit() to feature_bit() macro
2019-12-11 18:25:49 linux-kernel Re: [PATCH 1/2] KVM: x86: Add build-time assertion on usage of bit()
2019-12-04 23:50:57 linux-kernel Re: [PATCH 4/5] KVM: vmx: implement MSR_IA32_TSX_CTRL disable RTM functionality
2019-11-22 20:42:00 linux-kernel Re: [PATCH] KVM: x86: Remove a spurious export of a static function
2019-11-19 21:09:13 linux-kernel Re: [PATCH 4/5] KVM: vmx: implement MSR_IA32_TSX_CTRL disable RTM functionality
2019-11-19 20:06:59 linux-kernel Re: [PATCH 3/5] KVM: x86: implement MSR_IA32_TSX_CTRL effect on CPUID
2019-11-19 19:03:09 linux-kernel Re: [PATCH 2/5] KVM: x86: do not modify masked bits of shared MSRs
2019-11-18 20:50:41 linux-kernel Re: [PATCH 1/5] KVM: x86: fix presentation of TSX feature in ARCH_CAPABILITIES
2019-11-18 19:43:46 linux-kernel Re: [PATCH 1/5] KVM: x86: fix presentation of TSX feature in ARCH_CAPABILITIES
2019-11-12 18:52:26 linux-kernel Re: [PATCH 2/2] KVM: fix placement of refcount initialization
2019-11-12 18:51:33 linux-kernel Re: [PATCH 1/2] KVM: Fix NULL-ptr deref after kvm_create_vm fails
2019-11-05 17:38:50 linux-kernel Re: [PATCH RFC] KVM: x86: tell guests if the exposed SMT topology is trustworthy
2019-11-01 20:11:16 linux-kernel Re: [PATCH 2/4] kvm: svm: Enable UMIP feature on AMD
2019-11-01 19:44:40 linux-kernel Re: [PATCH 1/4] kvm: x86: Dont set UMIP feature bit unconditionally
2019-11-01 18:37:45 linux-kernel Re: [PATCH 1/4] kvm: x86: Dont set UMIP feature bit unconditionally
2019-11-01 18:31:12 linux-kernel Re: [PATCH 2/4] kvm: svm: Enable UMIP feature on AMD
2019-10-30 16:58:31 linux-kernel Re: [KVM] 671ddc700f: kvm-unit-tests.vmx.fail