index
:
linux
for-next
master
Mirror of https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/
about
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
arch
(
follow
)
Age
Commit message (
Expand
)
Author
Files
Lines
2025-09-23
KVM: nSVM: Save/load CET Shadow Stack state to/from vmcb12/vmcb02
Sean Christopherson
1
-0
/
+20
2025-09-23
KVM: SVM: Emulate reads and writes to shadow stack MSRs
John Allen
2
-1
/
+23
2025-09-23
KVM: nVMX: Advertise new VM-Entry/Exit control bits for CET state
Chao Gao
1
-2
/
+11
2025-09-23
KVM: nVMX: Add consistency checks for CET states
Chao Gao
1
-0
/
+48
2025-09-23
KVM: nVMX: Add consistency checks for CR0.WP and CR4.CET
Chao Gao
1
-0
/
+6
2025-09-23
KVM: nVMX: Prepare for enabling CET support for nested guest
Yang Weijiang
5
-1
/
+101
2025-09-23
KVM: nVMX: Virtualize NO_HW_ERROR_CODE_CC for L1 event injection to L2
Yang Weijiang
2
-9
/
+23
2025-09-23
KVM: VMX: Configure nested capabilities after CPU capabilities
Sean Christopherson
1
-2
/
+7
2025-09-23
KVM: x86: Enable CET virtualization for VMX and advertise to userspace
Yang Weijiang
6
-3
/
+45
2025-09-23
KVM: x86: Disable support for IBT and SHSTK if allow_smaller_maxphyaddr is true
Sean Christopherson
1
-0
/
+10
2025-09-23
KVM: x86: Initialize allow_smaller_maxphyaddr earlier in setup
Sean Christopherson
2
-23
/
+23
2025-09-23
KVM: x86: Disable support for Shadow Stacks if TDP is disabled
Sean Christopherson
1
-0
/
+8
2025-09-23
KVM: x86: Add XSS support for CET_KERNEL and CET_USER
Yang Weijiang
1
-3
/
+15
2025-09-23
KVM: nVMX: Always forward XSAVES/XRSTORS exits from L2 to L1
Sean Christopherson
1
-6
/
+9
2025-09-23
KVM: x86: Allow setting CR4.CET if IBT or SHSTK is supported
Yang Weijiang
2
-1
/
+4
2025-09-23
KVM: x86/mmu: Pretty print PK, SS, and SGX flags in MMU tracepoints
Sean Christopherson
1
-0
/
+3
2025-09-23
KVM: x86/mmu: WARN on attempt to check permissions for Shadow Stack #PF
Sean Christopherson
2
-1
/
+2
2025-09-23
KVM: x86: Emulate SSP[63:32]!=0 #GP(0) for FAR JMP to 32-bit mode
Sean Christopherson
2
-0
/
+44
2025-09-23
KVM: x86: Don't emulate task switches when IBT or SHSTK is enabled
Sean Christopherson
1
-7
/
+28
2025-09-23
KVM: x86: Don't emulate instructions affected by CET features
Sean Christopherson
1
-13
/
+102
2025-09-23
KVM: VMX: Set host constant supervisor states to VMCS fields
Yang Weijiang
4
-0
/
+32
2025-09-23
KVM: VMX: Set up interception for CET MSRs
Yang Weijiang
1
-0
/
+19
2025-09-23
KVM: x86: Save and reload SSP to/from SMRAM
Yang Weijiang
2
-1
/
+9
2025-09-23
KVM: VMX: Emulate read and write to CET MSRs
Yang Weijiang
3
-2
/
+103
2025-09-23
KVM: x86: Enable guest SSP read/write interface with new uAPIs
Yang Weijiang
3
-4
/
+46
2025-09-23
KVM: VMX: Introduce CET VMCS fields and control bits
Yang Weijiang
1
-0
/
+8
2025-09-23
KVM: x86: Report KVM supported CET MSRs as to-be-saved
Yang Weijiang
1
-0
/
+18
2025-09-23
KVM: x86: Add fault checks for guest CR4.CET setting
Yang Weijiang
1
-0
/
+6
2025-09-23
KVM: x86: Load guest FPU state when access XSAVE-managed MSRs
Sean Christopherson
1
-1
/
+86
2025-09-23
KVM: x86: Initialize kvm_caps.supported_xss
Yang Weijiang
1
-8
/
+15
2025-09-23
KVM: x86: Refresh CPUID on write to guest MSR_IA32_XSS
Yang Weijiang
2
-1
/
+4
2025-09-23
KVM: x86: Check XSS validity against guest CPUIDs
Chao Gao
3
-5
/
+17
2025-09-23
KVM: x86: Report XSS as to-be-saved if there are supported features
Sean Christopherson
1
-1
/
+5
2025-09-23
KVM: x86: Introduce KVM_{G,S}ET_ONE_REG uAPIs support
Yang Weijiang
2
-0
/
+126
2025-09-23
KVM: x86: Merge 'svm' into 'cet' to pick up GHCB dependencies
Sean Christopherson
8
-103
/
+136
2025-09-23
KVM: SVM: Enable AVIC by default for Zen4+ if x2AVIC is support
Naveen N Rao
1
-4
/
+36
2025-09-23
KVM: SVM: Move global "avic" variable to avic.c
Sean Christopherson
2
-18
/
+26
2025-09-23
KVM: SVM: Don't advise the user to do force_avic=y (when x2AVIC is detected)
Sean Christopherson
1
-4
/
+2
2025-09-23
KVM: SVM: Always print "AVIC enabled" separately, even when force enabled
Sean Christopherson
1
-10
/
+9
2025-09-23
KVM: SVM: Update "APICv in x2APIC without x2AVIC" in avic.c, not svm.c
Sean Christopherson
3
-6
/
+5
2025-09-23
KVM: SVM: Move x2AVIC MSR interception helper to avic.c
Sean Christopherson
3
-53
/
+54
2025-09-23
KVM: SVM: Make svm_x86_ops globally visible, clean up on-HyperV usage
Sean Christopherson
4
-32
/
+31
2025-09-23
KVM: SVM: Re-load current, not host, TSC_AUX on #VMEXIT from SEV-ES guest
Hou Wenlong
3
-19
/
+18
2025-09-23
KVM: x86: Add helper to retrieve current value of user return MSR
Hou Wenlong
2
-0
/
+7
2025-09-23
KVM: SEV: Reject non-positive effective lengths during LAUNCH_UPDATE
Sean Christopherson
1
-1
/
+1
2025-09-23
KVM: SEV: Validate XCR0 provided by guest in GHCB
Sean Christopherson
3
-5
/
+5
2025-09-23
KVM: SEV: Read save fields from GHCB exactly once
Sean Christopherson
2
-21
/
+26
2025-09-23
KVM: SEV: Rename kvm_ghcb_get_sw_exit_code() to kvm_get_cached_sw_exit_code()
Sean Christopherson
1
-4
/
+4
2025-09-23
LoongArch: KVM: Move kvm_iocsr tracepoint out of generic code
Steven Rostedt
1
-0
/
+35
2025-09-23
LoongArch: KVM: Rework pch_pic_update_batch_irqs()
Yury Norov (NVIDIA)
1
-8
/
+3
[prev]
[next]