Patch Series

Subject KVM: SVM: Fix x2AVIC MSR interception issues
Author seanjc@google.com
Date 2026-05-06 18:47:42 +0000 UTC
Version
Cc kvm@vger.kernel.org linux-kernel@vger.kernel.org naveen@kernel.org pbonzini@redhat.com seanjc@google.com

Patches (5)

Name Content [All]
[PATCH v2 1/5] KVM: SVM: Disable x2AVIC RDMSR interception for MSRs KVM actually supports [Body]
[PATCH v2 2/5] KVM: SVM: Always intercept RDMSR for TMCCT (current APIC timer count) [Body]
[PATCH v2 3/5] KVM: SVM: Only disable x2AVIC WRMSR interception for MSRs that are accelerated [Body]
[PATCH v2 4/5] *** DO NOT MERGE *** KVM: x86: Hack in a stat to track guest-induced exits (for testing) [Body]
[PATCH v2 5/5] *** DO NOT MERGE *** KVM: selftests: Add hacky test to verify x2APIC MSR interception [Body]
Session 2026-05-06
ID (for dev) 2becf033-f283-4b30-8113-4f2a01882204
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base 6d35786de28116ecf78797a62b84e6bf3c45aa5a [Config] passed [Log]
[KASAN] Boot test: Base 6d35786de28116ecf78797a62b84e6bf3c45aa5a [Config] passed [Log]
[KASAN] Build Patched 6d35786de28116ecf78797a62b84e6bf3c45aa5a [Config] [patched] passed [Log]
[KASAN] Boot test: Patched 6d35786de28116ecf78797a62b84e6bf3c45aa5a [Config] [patched] passed [Log]
[KASAN] Fuzz 6d35786de28116ecf78797a62b84e6bf3c45aa5a [Config] 6d35786de28116ecf78797a62b84e6bf3c45aa5a [Config] [patched] passed [Log] [Artifacts]