Patch Series

Subject KVM: VMX: Inject #UD if guest tries to execute SEAMCALL or TDCALL
Author seanjc@google.com
Date 2025-10-14 23:10:42 +0000 UTC
Version 1
Cc kai.huang@intel.com kvm@vger.kernel.org linux-kernel@vger.kernel.org pbonzini@redhat.com rick.p.edgecombe@intel.com seanjc@google.com xiaoyao.li@intel.com

Patches (1)

Name Content [All]
[PATCH] KVM: VMX: Inject #UD if guest tries to execute SEAMCALL or TDCALL [Body]

Session 2025-10-14

ID (for dev) a5037e8c-23f8-4dc8-88ad-69311072bbfe
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base 6b36119b94d0b2bb8cea9d512017efafd461d6ac [Config] passed [Log]
[KASAN] Boot test: Base 6b36119b94d0b2bb8cea9d512017efafd461d6ac [Config] passed
[KASAN] Build Patched 6b36119b94d0b2bb8cea9d512017efafd461d6ac [Config] [patched] passed [Log]
[KASAN] Boot test: Patched 6b36119b94d0b2bb8cea9d512017efafd461d6ac [Config] [patched] passed
[KASAN] Fuzzing 6b36119b94d0b2bb8cea9d512017efafd461d6ac [Config] 6b36119b94d0b2bb8cea9d512017efafd461d6ac [Config] [patched] passed [Log] [Artifacts]