Patch Series

Subject KVM: emulate: enable AVX moves
Author pbonzini@redhat.com
Date 2025-11-14 00:36:24 +0000 UTC
Version
Cc chang.seok.bae@intel.com kbusch@kernel.org kvm@vger.kernel.org linux-kernel@vger.kernel.org pbonzini@redhat.com

Patches (10)

Name Content [All]
[PATCH 01/10] KVM: emulate: add MOVNTDQA [Body]
[PATCH 02/10] KVM: emulate: move Src2Shift up one bit [Body]
[PATCH 03/10] KVM: emulate: improve formatting of flags table [Body]
[PATCH 04/10] KVM: emulate: move op_prefix to struct x86_emulate_ctxt [Body]
[PATCH 05/10] KVM: emulate: share common register decoding code [Body]
[PATCH 06/10] KVM: emulate: add get_xcr callback [Body]
[PATCH 07/10] KVM: emulate: add AVX support to register fetch and writeback [Body]
[PATCH 08/10] KVM: x86: Refactor REX prefix handling in instruction emulation [Body]
[PATCH 09/10] KVM: emulate: decode VEX prefix [Body]
[PATCH 10/10] KVM: emulate: enable AVX moves [Body]

Session 2025-11-14

ID (for dev) f97e6312-687f-4c1b-91f6-d314b5876231
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base 24172e0d79900908cf5ebf366600616d29c9b417 [Config] passed [Log]
[KASAN] Boot test: Base 24172e0d79900908cf5ebf366600616d29c9b417 [Config] passed
[KASAN] Build Patched 24172e0d79900908cf5ebf366600616d29c9b417 [Config] [patched] passed [Log]
[KASAN] Boot test: Patched 24172e0d79900908cf5ebf366600616d29c9b417 [Config] [patched] passed
[KASAN] Fuzzing 24172e0d79900908cf5ebf366600616d29c9b417 [Config] 24172e0d79900908cf5ebf366600616d29c9b417 [Config] [patched] passed [Log] [Artifacts]