Patch Series

Subject KVM: combined patchset for MBEC/GMET support
Author pbonzini@redhat.com
Date 2026-05-05 19:51:59 +0000 UTC
Version
Cc bp@alien8.de d.riley@proxmox.com jon@nutanix.com kai.huang@intel.com kvm@vger.kernel.org linux-kernel@vger.kernel.org pbonzini@redhat.com seanjc@google.com

Patches (28)

Name Content [All]
[PATCH 01/28] KVM: TDX/VMX: rework EPT_VIOLATION_EXEC_FOR_RING3_LIN into PROT_MASK [Body]
[PATCH 02/28] KVM: x86/mmu: remove SPTE_PERM_MASK [Body]
[PATCH 03/28] KVM: x86/mmu: free up bit 10 of PTEs in preparation for MBEC [Body]
[PATCH 04/28] KVM: x86/mmu: shuffle high bits of SPTEs in preparation for MBEC [Body]
[PATCH 05/28] KVM: x86/mmu: remove SPTE_EPT_* [Body]
[PATCH 06/28] KVM: x86/mmu: merge make_spte_{non,}executable [Body]
[PATCH 07/28] KVM: x86/mmu: rename and clarify BYTE_MASK [Body]
[PATCH 08/28] KVM: x86/mmu: separate more EPT/non-EPT permission_fault() [Body]
[PATCH 09/28] KVM: x86/mmu: introduce ACC_READ_MASK [Body]
[PATCH 10/28] KVM: x86/mmu: pass PFERR_GUEST_PAGE/FINAL_MASK to kvm_translate_gpa [Body]
[PATCH 11/28] KVM: x86/mmu: pass pte_access for final nGPA->GPA walk [Body]
[PATCH 12/28] KVM: x86: make translate_nested_gpa vendor-specific [Body]
[PATCH 13/28] KVM: x86/mmu: split XS/XU bits for EPT [Body]
[PATCH 14/28] KVM: x86/mmu: move cr4_smep to base role [Body]
[PATCH 15/28] KVM: VMX: enable use of MBEC [Body]
[PATCH 16/28] KVM: nVMX: pass advanced EPT violation vmexit info to guest [Body]
[PATCH 17/28] KVM: nVMX: pass PFERR_USER_MASK to MMU on EPT violations [Body]
[PATCH 18/28] KVM: x86/mmu: add support for MBEC to EPT page table walks [Body]
[PATCH 19/28] KVM: nVMX: advertise MBEC to nested guests [Body]
[PATCH 20/28] KVM: nVMX: allow MBEC with EVMCS [Body]
[PATCH 21/28] KVM: x86/mmu: propagate access mask from root pages down [Body]
[PATCH 22/28] KVM: x86/mmu: introduce cpu_role bit for availability of PFEC.I/D [Body]
[PATCH 23/28] KVM: SVM: add GMET bit definitions [Body]
[PATCH 24/28] KVM: x86/mmu: hard code more bits in kvm_init_shadow_npt_mmu [Body]
[PATCH 25/28] KVM: x86/mmu: add support for GMET to NPT page table walks [Body]
[PATCH 26/28] KVM: SVM: enable GMET and set it in MMU role [Body]
[PATCH 27/28] KVM: SVM: work around errata 1218 [Body]
[PATCH 28/28] KVM: nSVM: enable GMET for guests [Body]
Session 2026-05-05
ID (for dev) fd366915-58da-4599-b270-3c745dc08429
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base 85f871f6ba46f20d7fbc0b016b4db648c33220dd [Config] passed [Log]
[KASAN] Boot test: Base 85f871f6ba46f20d7fbc0b016b4db648c33220dd [Config] passed [Log]
[KASAN] Build Patched 85f871f6ba46f20d7fbc0b016b4db648c33220dd [Config] [patched] passed [Log]
[KASAN] Boot test: Patched 85f871f6ba46f20d7fbc0b016b4db648c33220dd [Config] [patched] passed [Log]
[KASAN] Fuzz 85f871f6ba46f20d7fbc0b016b4db648c33220dd [Config] 85f871f6ba46f20d7fbc0b016b4db648c33220dd [Config] [patched] passed [Log] [Artifacts]