Skip to content
Intel® Hardware Accelerated Execution Manager (Intel® HAXM)
Branch: master
Clone or download
raphaelning Merge pull request #187 from kryptoslogic/repne-fix
Allow REPNE prefixes in REP-only instructions
Latest commit 7cb307c Mar 1, 2019
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
.github/ISSUE_TEMPLATE Add Reproducibility in bug template Jan 30, 2019
HaxmLoader HaxmLoader: Show version number in usage Sep 19, 2018
core Merge pull request #187 from kryptoslogic/repne-fix Mar 1, 2019
docs
include Bump version for 7.4.1 release Jan 31, 2019
platforms Changed major numbers per tech-kern@ discussion for NetBSD kernel module Feb 23, 2019
tests Added support for CMPS{B,W,D,Q} instructions Feb 21, 2019
.gitignore
.travis.yml Use Travis CI's default macOS build environment Feb 21, 2019
CODE_OF_CONDUCT.md
CONTRIBUTING.md Create CONTRIBUTING.md Aug 3, 2018
LICENSE Create LICENSE Nov 14, 2017
README.md Revamp README.md Feb 12, 2019

README.md

Intel Hardware Accelerated Execution Manager (HAXM)

HAXM is a cross-platform hardware-assisted virtualization engine (hypervisor), widely used as an accelerator for Android Emulator and QEMU. It has always supported running on Windows and macOS, and has been ported to other host operating systems as well, such as Linux and NetBSD.

HAXM runs as a kernel-mode driver on the host operating system, and provides a KVM-like interface to user space, thereby enabling applications like QEMU to utilize the hardware virtualization capabilities built into modern Intel CPUs, namely Intel Virtualization Technology.

Downloads

The latest HAXM release for Windows and macOS hosts are available here.

Contributing

Detailed instructions for building and testing HAXM can be found at:

If you would like to contribute a patch to the code base, please also read these guidelines.

Reporting an Issue

You are welcome to file a GitHub issue if you discover a general HAXM bug or have a feature request.

However, please do not use the GitHub issue tracker to report security vulnerabilities. If you have information about a security issue or vulnerability with HAXM, please send an email to secure@intel.com, and use the PGP key located at https://www.intel.com/security to encrypt any sensitive information.

Code of Conduct

This project has adopted the Contributor Covenant, in the hope of building a welcoming and inclusive community. All participants in the project should adhere to this code of conduct.

You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session.