Patch Series

Subject Enable CET Virtualization
Author chao.gao@intel.com
Date 2025-08-12 02:55:09 +0000 UTC
Version 12
Cc bp@alien8.de chao.gao@intel.com dave.hansen@linux.intel.com hpa@zytor.com john.allen@amd.com kvm@vger.kernel.org linux-kernel@vger.kernel.org mingo@redhat.com minipli@grsecurity.net mlevitsk@redhat.com pbonzini@redhat.com rick.p.edgecombe@intel.com seanjc@google.com tglx@linutronix.de weijiang.yang@intel.com x86@kernel.org xin@zytor.com yi.z.zhang@linux.intel.com

Patches (24)

Name Content
[PATCH v12 01/24] KVM: x86: Rename kvm_{g,s}et_msr()* to show that they emulate guest accesses [Body]
[PATCH v12 02/24] KVM: x86: Use double-underscore read/write MSR helpers as appropriate [Body]
[PATCH v12 03/24] KVM: x86: Add kvm_msr_{read,write}() helpers [Body]
[PATCH v12 04/24] KVM: x86: Manually clear MPX state only on INIT [Body]
[PATCH v12 05/24] KVM: x86: Zero XSTATE components on INIT by iterating over supported features [Body]
[PATCH v12 06/24] KVM: x86: Introduce KVM_{G,S}ET_ONE_REG uAPIs support [Body]
[PATCH v12 07/24] KVM: x86: Report XSS as to-be-saved if there are supported features [Body]
[PATCH v12 08/24] KVM: x86: Refresh CPUID on write to guest MSR_IA32_XSS [Body]
[PATCH v12 09/24] KVM: x86: Initialize kvm_caps.supported_xss [Body]
[PATCH v12 10/24] KVM: x86: Load guest FPU state when access XSAVE-managed MSRs [Body]
[PATCH v12 11/24] KVM: x86: Add fault checks for guest CR4.CET setting [Body]
[PATCH v12 12/24] KVM: x86: Report KVM supported CET MSRs as to-be-saved [Body]
[PATCH v12 13/24] KVM: VMX: Introduce CET VMCS fields and control bits [Body]
[PATCH v12 14/24] KVM: x86: Enable guest SSP read/write interface with new uAPIs [Body]
[PATCH v12 15/24] KVM: VMX: Emulate read and write to CET MSRs [Body]
[PATCH v12 16/24] KVM: x86: Save and reload SSP to/from SMRAM [Body]
[PATCH v12 17/24] KVM: VMX: Set up interception for CET MSRs [Body]
[PATCH v12 18/24] KVM: VMX: Set host constant supervisor states to VMCS fields [Body]
[PATCH v12 19/24] KVM: x86: Don't emulate instructions guarded by CET [Body]
[PATCH v12 20/24] KVM: x86: Enable CET virtualization for VMX and advertise to userspace [Body]
[PATCH v12 21/24] KVM: nVMX: Virtualize NO_HW_ERROR_CODE_CC for L1 event injection to L2 [Body]
[PATCH v12 22/24] KVM: nVMX: Enable CET support for nested guest [Body]
[PATCH v12 23/24] KVM: nVMX: Add consistency checks for CR0.WP and CR4.CET [Body]
[PATCH v12 24/24] KVM: nVMX: Add consistency checks for CET states [Body]

Session 2025-08-12

ID (for dev) 263b4bc0-4c54-44f8-a3ff-f2ab1fbb2395
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
Build Base cca7a0aae8958c9b1cd14116cb8b2f22ace2205e [Config] passed [Log]
Build Patched cca7a0aae8958c9b1cd14116cb8b2f22ace2205e [Config] [patched] passed [Log]
Boot test: Patched cca7a0aae8958c9b1cd14116cb8b2f22ace2205e [Config] [patched] passed
Boot test: Base cca7a0aae8958c9b1cd14116cb8b2f22ace2205e [Config] passed
Fuzzing cca7a0aae8958c9b1cd14116cb8b2f22ace2205e [Config] cca7a0aae8958c9b1cd14116cb8b2f22ace2205e [Config] [patched] passed [Log] [Artifacts]