Patch Series

Subject KVM: x86: Enable APX for guests
Author chang.seok.bae@intel.com
Date 2026-04-28 05:00:52 +0000 UTC
Version
Cc chang.seok.bae@intel.com chao.gao@intel.com kvm@vger.kernel.org linux-kernel@vger.kernel.org pbonzini@redhat.com peter.fang@intel.com seanjc@google.com

Patches (20)

Name Content [All]
[PATCH v3 01/20] KVM: VMX: Macrofy 64-bit GPR swapping in __vmx_vcpu_run() [Body]
[PATCH v3 02/20] KVM: SVM: Macrofy 64-bit GPR swapping in __svm_vcpu_run() [Body]
[PATCH v3 03/20] KVM: SEV: Macrofy 64-bit GPR swapping in __svm_sev_es_vcpu_run() [Body]
[PATCH v3 04/20] KVM: x86: Extend VCPU registers for EGPRs [Body]
[PATCH v3 05/20] KVM: VMX: Save guest EGPRs in VCPU cache [Body]
[PATCH v3 06/20] KVM: x86: Support APX state for XSAVE ABI [Body]
[PATCH v3 07/20] KVM: VMX: Refactor VMX instruction information access [Body]
[PATCH v3 08/20] KVM: VMX: Refactor instruction information decoding [Body]
[PATCH v3 09/20] KVM: VMX: Refactor register index retrieval from exit qualification [Body]
[PATCH v3 10/20] KVM: VMX: Support instruction information extension [Body]
[PATCH v3 11/20] KVM: nVMX: Propagate the extended instruction info field [Body]
[PATCH v3 12/20] KVM: x86: Support EGPR accessing and tracking for emulator [Body]
[PATCH v3 13/20] KVM: x86: Handle EGPR index and REX2-incompatible opcodes [Body]
[PATCH v3 14/20] KVM: x86: Support REX2-prefixed opcode decode [Body]
[PATCH v3 15/20] KVM: x86: Reject EVEX-prefixed instructions [Body]
[PATCH v3 16/20] KVM: x86: Guard valid XCR0.APX settings [Body]
[PATCH v3 17/20] KVM: x86: Expose APX foundation feature to guests [Body]
[PATCH v3 18/20] KVM: x86: Expose APX sub-features to guests [Body]
[PATCH v3 19/20] KVM: x86: selftests: Add APX state and ABI test [Body]
[PATCH v3 20/20] KVM: x86: selftests: Add APX state handling and XCR0 sanity checks [Body]
Session 2026-04-28
ID (for dev) 8a4d4f12-33bc-44ea-a563-245da9bcfc7c
Status skipped
Triaged Skipped: failed to find a base commit: series does not apply [Log]
Execution Log [Link]
Test Base Patched Verdict