Patch Series

Subject AMD: Add Secure AVIC KVM Support
Author neeraj.upadhyay@amd.com
Date 2025-09-23 05:03:01 +0000 UTC
Version 2
Cc bp@alien8.de david.kaplan@amd.com huibo.wang@amd.com kvm@vger.kernel.org linux-kernel@vger.kernel.org naveen.rao@amd.com neeraj.upadhyay@amd.com nikunj@amd.com pbonzini@redhat.com santosh.shukla@amd.com seanjc@google.com suravee.suthikulpanit@amd.com thomas.lendacky@amd.com tiala@microsoft.com vasant.hegde@amd.com

Patches (17)

Name Content
[RFC PATCH v2 01/17] KVM: x86/lapic: Differentiate protected APIC interrupt mechanisms [Body]
[RFC PATCH v2 02/17] x86/cpufeatures: Add Secure AVIC CPU feature [Body]
[RFC PATCH v2 03/17] KVM: SVM: Add support for Secure AVIC capability in KVM [Body]
[RFC PATCH v2 04/17] KVM: SVM: Set guest APIC protection flags for Secure AVIC [Body]
[RFC PATCH v2 05/17] KVM: SVM: Do not intercept SECURE_AVIC_CONTROL MSR for SAVIC guests [Body]
[RFC PATCH v2 06/17] KVM: SVM: Implement interrupt injection for Secure AVIC [Body]
[RFC PATCH v2 07/17] KVM: SVM: Add IPI Delivery Support for Secure AVIC [Body]
[RFC PATCH v2 08/17] KVM: SVM: Do not inject exception for Secure AVIC [Body]
[RFC PATCH v2 09/17] KVM: SVM: Do not intercept exceptions for Secure AVIC guests [Body]
[RFC PATCH v2 10/17] KVM: SVM: Set VGIF in VMSA area for Secure AVIC guests [Body]
[RFC PATCH v2 11/17] KVM: SVM: Enable NMI support for Secure AVIC guests [Body]
[RFC PATCH v2 12/17] KVM: SVM: Add VMGEXIT handler for Secure AVIC backing page [Body]
[RFC PATCH v2 13/17] KVM: SVM: Add IOAPIC EOI support for Secure AVIC guests [Body]
[RFC PATCH v2 14/17] KVM: x86/ioapic: Disable RTC EOI tracking for protected APIC guests [Body]
[RFC PATCH v2 15/17] KVM: SVM: Check injected timers for Secure AVIC guests [Body]
[RFC PATCH v2 16/17] KVM: x86/cpuid: Disable paravirt APIC features for protected APIC [Body]
[RFC PATCH v2 17/17] KVM: SVM: Advertise Secure AVIC support for SNP guests [Body]

Session 2025-09-23

ID (for dev) 1d4ddbec-c850-4682-8b84-3e895ccc2da2
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
Build Base a6ad54137af92535cfe32e19e5f3bc1bb7dbd383 [Config] passed [Log]
Build Patched a6ad54137af92535cfe32e19e5f3bc1bb7dbd383 [Config] [patched] passed [Log]
Boot test: Patched a6ad54137af92535cfe32e19e5f3bc1bb7dbd383 [Config] [patched] passed
Boot test: Base a6ad54137af92535cfe32e19e5f3bc1bb7dbd383 [Config] passed
Fuzzing a6ad54137af92535cfe32e19e5f3bc1bb7dbd383 [Config] a6ad54137af92535cfe32e19e5f3bc1bb7dbd383 [Config] [patched] passed [Log] [Artifacts]
general protection fault in kvm_apply_cpuid_pv_features_quirk [Log] [Syz Repro] [C Repro]