| Subject | KVM: VMX: Inject #UD if guest tries to execute SEAMCALL or TDCALL |
|---|---|
| Author | seanjc@google.com |
| Date | 2025-10-14 23:10:42 +0000 UTC |
| Version | 1 |
| Cc | kai.huang@intel.com kvm@vger.kernel.org linux-kernel@vger.kernel.org pbonzini@redhat.com rick.p.edgecombe@intel.com seanjc@google.com xiaoyao.li@intel.com |
| Name | Content [All] |
|---|---|
| [PATCH] KVM: VMX: Inject #UD if guest tries to execute SEAMCALL or TDCALL | [Body] |
| ID (for dev) | a5037e8c-23f8-4dc8-88ad-69311072bbfe |
|---|---|
| Status | finished |
| Triaged | OK [Log] |
| Execution Log | [Link] |
| Test | Base | Patched | Verdict |
|---|---|---|---|
| [KASAN] Build Base | 6b36119b94d0b2bb8cea9d512017efafd461d6ac [Config] | passed [Log] | |
| [KASAN] Boot test: Base | 6b36119b94d0b2bb8cea9d512017efafd461d6ac [Config] | passed | |
| [KASAN] Build Patched | 6b36119b94d0b2bb8cea9d512017efafd461d6ac [Config] [patched] | passed [Log] | |
| [KASAN] Boot test: Patched | 6b36119b94d0b2bb8cea9d512017efafd461d6ac [Config] [patched] | passed | |
| [KASAN] Fuzzing | 6b36119b94d0b2bb8cea9d512017efafd461d6ac [Config] | 6b36119b94d0b2bb8cea9d512017efafd461d6ac [Config] [patched] | passed [Log] [Artifacts] |