Patch Series

Subject KVM: VMX: Introduce Intel Mode-Based Execute Control (MBEC)
Author jon@nutanix.com
Date 2025-12-23 05:13:16.384245489 +0000 UTC
Version 1
Cc alexander.grest@microsoft.com bp@alien8.de chao.gao@intel.com corbet@lwn.net dave.hansen@linux.intel.com hpa@zytor.com jon@nutanix.com kai.huang@intel.com kas@kernel.org ken@codelabs.ch kvm@vger.kernel.org linux-coco@lists.linux.dev linux-doc@vger.kernel.org linux-kernel@vger.kernel.org madvenka@linux.microsoft.com mic@digikod.net mingo@redhat.com nsaenz@amazon.es pbonzini@redhat.com rick.p.edgecombe@intel.com seanjc@google.com tao1.su@linux.intel.com tglx@linutronix.de x86@kernel.org xiaoyao.li@intel.com zhao1.liu@intel.com

Patches (8)

Name Content [All]
[PATCH 1/8] KVM: TDX/VMX: rework EPT_VIOLATION_EXEC_FOR_RING3_LIN into PROT_MASK [Body]
[PATCH 2/8] KVM: x86/mmu: remove SPTE_PERM_MASK [Body]
[PATCH 3/8] KVM: x86/mmu: adjust MMIO generation bit allocation and allowed mask [Body]
[PATCH 4/8] KVM: x86/mmu: update access permissions from ACC_ALL to ACC_RWX [Body]
[PATCH 5/8] KVM: x86/mmu: bootstrap support for Intel MBEC [Body]
[PATCH 6/8] KVM: VMX: enhance EPT violation handler for MBEC [Body]
[PATCH 7/8] KVM: VMX: allow MBEC with EVMCS [Body]
[PATCH 8/8] KVM: nVMX: advertise MBEC and setup mmu has_mbec [Body]

Session 2025-12-23

ID (for dev) fbe6c60f-48bc-4c5e-8741-3a8d65d828d1
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base 0499add8efd72456514c6218c062911ccc922a99 [Config] passed [Log]
[KASAN] Boot test: Base 0499add8efd72456514c6218c062911ccc922a99 [Config] passed [Log]
[KASAN] Build Patched 0499add8efd72456514c6218c062911ccc922a99 [Config] [patched] passed [Log]
[KASAN] Boot test: Patched 0499add8efd72456514c6218c062911ccc922a99 [Config] [patched] passed [Log]
[KASAN] Fuzzing 0499add8efd72456514c6218c062911ccc922a99 [Config] 0499add8efd72456514c6218c062911ccc922a99 [Config] [patched] passed [Log] [Artifacts]