Patch Series

Subject KVM: x86: Super Mega CET
Author seanjc@google.com
Date 2025-09-19 22:32:08 +0000 UTC
Version 16
Cc binbin.wu@linux.intel.com chao.gao@intel.com john.allen@amd.com kvm@vger.kernel.org linux-kernel@vger.kernel.org minipli@grsecurity.net mlevitsk@redhat.com pbonzini@redhat.com rick.p.edgecombe@intel.com seanjc@google.com thomas.lendacky@amd.com xiaoyao.li@intel.com xin@zytor.com yi.z.zhang@linux.intel.com

Patches (51)

Name Content
[PATCH v16 01/51] KVM: SEV: Rename kvm_ghcb_get_sw_exit_code() to kvm_get_cached_sw_exit_code() [Body]
[PATCH v16 02/51] KVM: SEV: Read save fields from GHCB exactly once [Body]
[PATCH v16 03/51] KVM: SEV: Validate XCR0 provided by guest in GHCB [Body]
[PATCH v16 04/51] KVM: x86: Introduce KVM_{G,S}ET_ONE_REG uAPIs support [Body]
[PATCH v16 05/51] KVM: x86: Report XSS as to-be-saved if there are supported features [Body]
[PATCH v16 06/51] KVM: x86: Check XSS validity against guest CPUIDs [Body]
[PATCH v16 07/51] KVM: x86: Refresh CPUID on write to guest MSR_IA32_XSS [Body]
[PATCH v16 08/51] KVM: x86: Initialize kvm_caps.supported_xss [Body]
[PATCH v16 09/51] KVM: x86: Load guest FPU state when access XSAVE-managed MSRs [Body]
[PATCH v16 10/51] KVM: x86: Add fault checks for guest CR4.CET setting [Body]
[PATCH v16 11/51] KVM: x86: Report KVM supported CET MSRs as to-be-saved [Body]
[PATCH v16 12/51] KVM: VMX: Introduce CET VMCS fields and control bits [Body]
[PATCH v16 13/51] KVM: x86: Enable guest SSP read/write interface with new uAPIs [Body]
[PATCH v16 14/51] KVM: VMX: Emulate read and write to CET MSRs [Body]
[PATCH v16 15/51] KVM: x86: Save and reload SSP to/from SMRAM [Body]
[PATCH v16 16/51] KVM: VMX: Set up interception for CET MSRs [Body]
[PATCH v16 17/51] KVM: VMX: Set host constant supervisor states to VMCS fields [Body]
[PATCH v16 18/51] KVM: x86: Don't emulate instructions affected by CET features [Body]
[PATCH v16 19/51] KVM: x86: Don't emulate task switches when IBT or SHSTK is enabled [Body]
[PATCH v16 20/51] KVM: x86: Emulate SSP[63:32]!=0 #GP(0) for FAR JMP to 32-bit mode [Body]
[PATCH v16 21/51] KVM: x86/mmu: WARN on attempt to check permissions for Shadow Stack #PF [Body]
[PATCH v16 22/51] KVM: x86/mmu: Pretty print PK, SS, and SGX flags in MMU tracepoints [Body]
[PATCH v16 23/51] KVM: x86: Allow setting CR4.CET if IBT or SHSTK is supported [Body]
[PATCH v16 24/51] KVM: nVMX: Always forward XSAVES/XRSTORS exits from L2 to L1 [Body]
[PATCH v16 25/51] KVM: x86: Add XSS support for CET_KERNEL and CET_USER [Body]
[PATCH v16 26/51] KVM: x86: Disable support for Shadow Stacks if TDP is disabled [Body]
[PATCH v16 27/51] KVM: x86: Disable support for IBT and SHSTK if allow_smaller_maxphyaddr is true [Body]
[PATCH v16 28/51] KVM: x86: Enable CET virtualization for VMX and advertise to userspace [Body]
[PATCH v16 29/51] KVM: VMX: Configure nested capabilities after CPU capabilities [Body]
[PATCH v16 30/51] KVM: nVMX: Virtualize NO_HW_ERROR_CODE_CC for L1 event injection to L2 [Body]
[PATCH v16 31/51] KVM: nVMX: Prepare for enabling CET support for nested guest [Body]
[PATCH v16 32/51] KVM: nVMX: Add consistency checks for CR0.WP and CR4.CET [Body]
[PATCH v16 33/51] KVM: nVMX: Add consistency checks for CET states [Body]
[PATCH v16 34/51] KVM: nVMX: Advertise new VM-Entry/Exit control bits for CET state [Body]
[PATCH v16 35/51] KVM: SVM: Emulate reads and writes to shadow stack MSRs [Body]
[PATCH v16 36/51] KVM: nSVM: Save/load CET Shadow Stack state to/from vmcb12/vmcb02 [Body]
[PATCH v16 37/51] KVM: SVM: Update dump_vmcb with shadow stack save area additions [Body]
[PATCH v16 38/51] KVM: SVM: Pass through shadow stack MSRs as appropriate [Body]
[PATCH v16 39/51] KVM: SEV: Synchronize MSR_IA32_XSS from the GHCB when it's valid [Body]
[PATCH v16 40/51] KVM: SVM: Enable shadow stack virtualization for SVM [Body]
[PATCH v16 41/51] KVM: x86: Add human friendly formatting for #XM, and #VE [Body]
[PATCH v16 42/51] KVM: x86: Define Control Protection Exception (#CP) vector [Body]
[PATCH v16 43/51] KVM: x86: Define AMD's #HV, #VC, and #SX exception vectors [Body]
[PATCH v16 44/51] KVM: selftests: Add ex_str() to print human friendly name of exception vectors [Body]
[PATCH v16 45/51] KVM: selftests: Add an MSR test to exercise guest/host and read/write [Body]
[PATCH v16 46/51] KVM: selftests: Add support for MSR_IA32_{S,U}_CET to MSRs test [Body]
[PATCH v16 47/51] KVM: selftests: Extend MSRs test to validate vCPUs without supported features [Body]
[PATCH v16 48/51] KVM: selftests: Add KVM_{G,S}ET_ONE_REG coverage to MSRs test [Body]
[PATCH v16 49/51] KVM: selftests: Add coverate for KVM-defined registers in MSRs test [Body]
[PATCH v16 50/51] KVM: selftests: Verify MSRs are (not) in save/restore list when (un)supported [Body]
[PATCH v16 51/51] KVM: VMX: Make CR4.CET a guest owned bit [Body]

Session 2025-09-19

ID (for dev) a4154809-4f9f-4aa2-86ee-11603f7cc580
Status skipped
Triaged Skipped: failed to find a base commit: series does not apply [Log]
Execution Log [Link]
Test Base Patched Verdict