Patch Series

Subject KVM: x86/tdx: Have TDX handle VMXON during bringup
Author seanjc@google.com
Date 2026-02-14 01:26:47 +0000 UTC
Version
Cc acme@kernel.org bp@alien8.de chao.gao@intel.com dan.j.williams@intel.com dave.hansen@linux.intel.com kas@kernel.org kvm@vger.kernel.org linux-coco@lists.linux.dev linux-kernel@vger.kernel.org linux-perf-users@vger.kernel.org mingo@redhat.com namhyung@kernel.org pbonzini@redhat.com peterz@infradead.org seanjc@google.com tglx@kernel.org x86@kernel.org yilun.xu@linux.intel.com

Patches (16)

Name Content [All]
[PATCH v3 01/16] KVM: x86: Move kvm_rebooting to x86 [Body]
[PATCH v3 02/16] KVM: VMX: Move architectural "vmcs" and "vmcs_hdr" structures to public vmx.h [Body]
[PATCH v3 03/16] KVM: x86: Move "kvm_rebooting" to kernel as "virt_rebooting" [Body]
[PATCH v3 04/16] KVM: VMX: Unconditionally allocate root VMCSes during boot CPU bringup [Body]
[PATCH v3 05/16] x86/virt: Force-clear X86_FEATURE_VMX if configuring root VMCS fails [Body]
[PATCH v3 06/16] KVM: VMX: Move core VMXON enablement to kernel [Body]
[PATCH v3 07/16] KVM: SVM: Move core EFER.SVME enablement to kernel [Body]
[PATCH v3 08/16] KVM: x86: Move bulk of emergency virtualizaton logic to virt subsystem [Body]
[PATCH v3 09/16] x86/virt: Add refcounting of VMX/SVM usage to support multiple in-kernel users [Body]
[PATCH v3 10/16] x86/virt/tdx: Drop the outdated requirement that TDX be enabled in IRQ context [Body]
[PATCH v3 11/16] KVM: x86/tdx: Do VMXON and TDX-Module initialization during subsys init [Body]
[PATCH v3 12/16] x86/virt/tdx: Tag a pile of functions as __init, and globals as __ro_after_init [Body]
[PATCH v3 13/16] x86/virt/tdx: KVM: Consolidate TDX CPU hotplug handling [Body]
[PATCH v3 14/16] x86/virt/tdx: Use ida_is_empty() to detect if any TDs may be running [Body]
[PATCH v3 15/16] KVM: Bury kvm_{en,dis}able_virtualization() in kvm_main.c once more [Body]
[PATCH v3 16/16] KVM: TDX: Fold tdx_bringup() into tdx_hardware_setup() [Body]

Session 2026-02-14

ID (for dev) 2ee98794-48b7-4f95-99cb-f8db2b78fbee
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base 183bb0ce8c77b0fd1fb25874112bc8751a461e49 [Config] passed [Log]
[KASAN] Boot test: Base 183bb0ce8c77b0fd1fb25874112bc8751a461e49 [Config] passed [Log]
[KASAN] Build Patched 183bb0ce8c77b0fd1fb25874112bc8751a461e49 [Config] [patched] passed [Log]
[KASAN] Boot test: Patched 183bb0ce8c77b0fd1fb25874112bc8751a461e49 [Config] [patched] passed [Log]
[KASAN] Fuzzing 183bb0ce8c77b0fd1fb25874112bc8751a461e49 [Config] 183bb0ce8c77b0fd1fb25874112bc8751a461e49 [Config] [patched] passed [Log] [Artifacts]