Patch Series

Subject KVM: x86: Enable APX for guests
Author chang.seok.bae@intel.com
Date 2025-12-21 04:07:27 +0000 UTC
Version
Cc chang.seok.bae@intel.com chao.gao@intel.com kvm@vger.kernel.org linux-kernel@vger.kernel.org pbonzini@redhat.com peter.fang@intel.com seanjc@google.com

Patches (16)

Name Content [All]
[PATCH 01/16] KVM: x86: Rename register accessors to be GPR-specific [Body]
[PATCH 02/16] KVM: x86: Refactor GPR accessors to differentiate register access types [Body]
[PATCH 03/16] KVM: x86: Implement accessors for extended GPRs [Body]
[PATCH 04/16] KVM: VMX: Introduce unified instruction info structure [Body]
[PATCH 05/16] KVM: VMX: Refactor instruction information retrieval [Body]
[PATCH 06/16] KVM: VMX: Refactor GPR index retrieval from exit qualification [Body]
[PATCH 07/16] KVM: nVMX: Propagate the extended instruction info field [Body]
[PATCH 08/16] KVM: VMX: Support extended register index in exit handling [Body]
[PATCH 09/16] KVM: emulate: Support EGPR accessing and tracking [Body]
[PATCH 10/16] KVM: emulate: Handle EGPR index and REX2-incompatible opcodes [Body]
[PATCH 11/16] KVM: emulate: Support REX2-prefixed opcode decode [Body]
[PATCH 12/16] KVM: emulate: Reject EVEX-prefixed instructions [Body]
[PATCH 13/16] KVM: x86: Guard valid XCR0.APX settings [Body]
[PATCH 14/16] KVM: x86: Expose APX foundational feature bit to guests [Body]
[PATCH 15/16] KVM: x86: Expose APX sub-features to guests [Body]
[PATCH 16/16] KVM: x86: selftests: Add APX state handling and XCR0 sanity checks [Body]

Session 2025-12-21

ID (for dev) da21bb09-bdcb-48a2-b02d-1fbd970d6c48
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base 0499add8efd72456514c6218c062911ccc922a99 [Config] passed [Log]
[KASAN] Boot test: Base 0499add8efd72456514c6218c062911ccc922a99 [Config] passed [Log]
[KASAN] Build Patched 0499add8efd72456514c6218c062911ccc922a99 [Config] [patched] passed [Log]
[KASAN] Boot test: Patched 0499add8efd72456514c6218c062911ccc922a99 [Config] [patched] passed [Log]
[KASAN] Fuzzing 0499add8efd72456514c6218c062911ccc922a99 [Config] 0499add8efd72456514c6218c062911ccc922a99 [Config] [patched] passed [Log] [Artifacts]