Patch Series

Subject KVM: combined patchset for MBEC/GMET support
Author pbonzini@redhat.com
Date 2026-03-21 00:09:10 +0000 UTC
Version
Cc amit.shah@amd.com bp@alien8.de jon@nutanix.com kai.huang@intel.com kvm@vger.kernel.org linux-kernel@vger.kernel.org mtosatti@redhat.com nikunj@amd.com pbonzini@redhat.com seanjc@google.com

Patches (22)

Name Content [All]
[PATCH 01/22] KVM: TDX/VMX: rework EPT_VIOLATION_EXEC_FOR_RING3_LIN into PROT_MASK [Body]
[PATCH 02/22] KVM: x86/mmu: remove SPTE_PERM_MASK [Body]
[PATCH 03/22] KVM: x86/mmu: adjust MMIO generation bit allocation and allowed mask [Body]
[PATCH 04/22] KVM: x86/mmu: shuffle high bits of SPTEs in preparation for MBEC [Body]
[PATCH 05/22] KVM: x86/mmu: remove SPTE_EPT_* [Body]
[PATCH 06/22] KVM: x86/mmu: merge make_spte_{non,}executable [Body]
[PATCH 07/22] KVM: x86/mmu: rename and clarify BYTE_MASK [Body]
[PATCH 08/22] KVM: x86/mmu: introduce ACC_READ_MASK [Body]
[PATCH 09/22] KVM: x86/mmu: separate more EPT/non-EPT permission_fault() [Body]
[PATCH 10/22] KVM: x86/mmu: split XS/XU bits for MBEC [Body]
[PATCH 11/22] KVM: x86/mmu: move cr4_smep to base role [Body]
[PATCH 12/22] KVM: VMX: enable use of MBEC [Body]
[PATCH 13/22] KVM: x86/mmu: add support for nested MBEC [Body]
[PATCH 14/22] KVM: nVMX: advertise MBEC to nested guests [Body]
[PATCH 15/22] KVM: nVMX: allow MBEC with EVMCS [Body]
[PATCH 16/22] KVM: x86/tdp_mmu: propagate access mask from kvm_mmu_page to PTE [Body]
[PATCH 17/22] KVM: x86/mmu: introduce cpu_role bit for availability of PFEC.I/D [Body]
[PATCH 18/22] KVM: SVM: add GMET bit definitions [Body]
[PATCH 19/22] KVM: x86/mmu: add support for NPT GMET [Body]
[PATCH 20/22] KVM: SVM: enable GMET and set it in MMU role [Body]
[PATCH 21/22] KVM: SVM: work around errata 1218 [Body]
[PATCH 22/22] KVM: nSVM: enable GMET for guests [Body]

Session 2026-03-21

ID (for dev) 1c6b772c-d964-4ede-8eb6-10b82d07f792
Status waiting
Test Base Patched Verdict