Patch Series

Subject KVM: VMX: Handle SEAMCALL or TDCALL VM-Exits
Author seanjc@google.com
Date 2025-10-16 18:21:47 +0000 UTC
Version
Cc binbin.wu@linux.intel.com dan.j.williams@intel.com kai.huang@intel.com kvm@vger.kernel.org linux-kernel@vger.kernel.org pbonzini@redhat.com rick.p.edgecombe@intel.com seanjc@google.com xiaoyao.li@intel.com

Patches (2)

Name Content [All]
[PATCH v2 1/2] KVM: VMX: Inject #UD if guest tries to execute SEAMCALL or TDCALL [Body]
[PATCH v2 2/2] KVM: TDX: WARN if a SEAMCALL VM-Exit makes its way out to KVM [Body]

Session 2025-10-16

ID (for dev) 2a640df1-d757-4a27-930e-67249f72dbf6
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base 6b36119b94d0b2bb8cea9d512017efafd461d6ac [Config] passed [Log]
[KASAN] Boot test: Base 6b36119b94d0b2bb8cea9d512017efafd461d6ac [Config] passed
[KASAN] Build Patched 6b36119b94d0b2bb8cea9d512017efafd461d6ac [Config] [patched] passed [Log]
[KASAN] Boot test: Patched 6b36119b94d0b2bb8cea9d512017efafd461d6ac [Config] [patched] passed
[KASAN] Fuzzing 6b36119b94d0b2bb8cea9d512017efafd461d6ac [Config] 6b36119b94d0b2bb8cea9d512017efafd461d6ac [Config] [patched] passed [Log] [Artifacts]