Patch Series

Subject KVM: x86: Emulator MMIO fix and cleanups
Author seanjc@google.com
Date 2026-02-25 01:20:36 +0000 UTC
Version
Cc binbin.wu@linux.intel.com kas@kernel.org kvm@vger.kernel.org linux-coco@lists.linux.dev linux-kernel@vger.kernel.org michael.roth@amd.com pbonzini@redhat.com rick.p.edgecombe@intel.com seanjc@google.com thomas.lendacky@amd.com x86@kernel.org xiaoyao.li@intel.com zhangjiaji1@huawei.com

Patches (14)

Name Content [All]
[PATCH 01/14] KVM: x86: Use scratch field in MMIO fragment to hold small write values [Body]
[PATCH 02/14] KVM: x86: Open code handling of completed MMIO reads in emulator_read_write() [Body]
[PATCH 03/14] KVM: x86: Trace unsatisfied MMIO reads on a per-page basis [Body]
[PATCH 04/14] KVM: x86: Use local MMIO fragment variable to clean up emulator_read_write() [Body]
[PATCH 05/14] KVM: x86: Open code read vs. write userspace MMIO exits in emulator_read_write() [Body]
[PATCH 06/14] KVM: x86: Move MMIO write tracing into vcpu_mmio_write() [Body]
[PATCH 07/14] KVM: x86: Harden SEV-ES MMIO against on-stack use-after-free [Body]
[PATCH 08/14] KVM: x86: Dedup kvm_sev_es_mmio_{read,write}() [Body]
[PATCH 09/14] KVM: x86: Consolidate SEV-ES MMIO emulation into a single public API [Body]
[PATCH 10/14] KVM: x86: Bury emulator read/write ops in emulator_{read,write}_emulated() [Body]
[PATCH 11/14] KVM: x86: Fold emulator_write_phys() into write_emulate() [Body]
[PATCH 12/14] KVM: x86: Rename .read_write_emulate() to .read_write_guest() [Body]
[PATCH 13/14] KVM: x86: Don't panic the kernel if completing userspace I/O / MMIO goes sideways [Body]
[PATCH 14/14] KVM: x86: Add helpers to prepare kvm_run for userspace MMIO exit [Body]

Session 2026-02-25

ID (for dev) 8dd6edec-2a86-4c68-b410-79a46822af02
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base 183bb0ce8c77b0fd1fb25874112bc8751a461e49 [Config] passed [Log]
[KASAN] Boot test: Base 183bb0ce8c77b0fd1fb25874112bc8751a461e49 [Config] passed [Log]
[KASAN] Build Patched 183bb0ce8c77b0fd1fb25874112bc8751a461e49 [Config] [patched] passed [Log]
[KASAN] Boot test: Patched 183bb0ce8c77b0fd1fb25874112bc8751a461e49 [Config] [patched] passed [Log]
[KASAN] Fuzz 183bb0ce8c77b0fd1fb25874112bc8751a461e49 [Config] 183bb0ce8c77b0fd1fb25874112bc8751a461e49 [Config] [patched] passed [Log] [Artifacts]