Patch Series

Subject KVM: x86: APIC and I/O APIC cleanups
Author seanjc@google.com
Date 2025-12-06 00:43:03 +0000 UTC
Version 1
Cc dwmw2@infradead.org kvm@vger.kernel.org linux-kernel@vger.kernel.org paul@xen.org pbonzini@redhat.com seanjc@google.com vkuznets@redhat.com

Patches (9)

Name Content [All]
[PATCH 1/9] KVM: x86: Drop ASSERT()s on APIC/vCPU being non-NULL [Body]
[PATCH 2/9] KVM: x86: Drop guest/user-triggerable asserts on IRR/ISR vectors [Body]
[PATCH 3/9] KVM: x86: Drop ASSERT() on I/O APIC EOIs being only for LEVEL_to WARN_ON_ONCE [Body]
[PATCH 4/9] KVM: x86: Drop guest-triggerable ASSERT()s on I/O APIC access alignment [Body]
[PATCH 5/9] KVM: x86: Drop MAX_NR_RESERVED_IOAPIC_PINS, use KVM_MAX_IRQ_ROUTES directly [Body]
[PATCH 6/9] KVM: x86: Add a wrapper to handle common case of IRQ delivery without dest_map [Body]
[PATCH 7/9] KVM: x86: Fold "struct dest_map" into "struct rtc_status" [Body]
[PATCH 8/9] KVM: x86: Bury ioapic.h definitions behind CONFIG_KVM_IOAPIC [Body]
[PATCH 9/9] KVM: x86: Hide KVM_IRQCHIP_KERNEL behind CONFIG_KVM_IOAPIC=y [Body]

Session 2025-12-06

ID (for dev) 1c5cd57f-e301-469f-81d9-263f0c1b995a
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base e0c26d47def7382d7dbd9cad58bc653aed75737a [Config] passed [Log]
[KASAN] Boot test: Base e0c26d47def7382d7dbd9cad58bc653aed75737a [Config] passed [Log]
[KASAN] Build Patched e0c26d47def7382d7dbd9cad58bc653aed75737a [Config] [patched] passed [Log]
[KASAN] Boot test: Patched e0c26d47def7382d7dbd9cad58bc653aed75737a [Config] [patched] passed [Log]
[KASAN] Fuzzing e0c26d47def7382d7dbd9cad58bc653aed75737a [Config] e0c26d47def7382d7dbd9cad58bc653aed75737a [Config] [patched] passed [Log] [Artifacts]