aboutsummaryrefslogtreecommitdiffstats
path: root/arch (follow)
AgeCommit message (Expand)AuthorFilesLines
2025-09-23KVM: nSVM: Save/load CET Shadow Stack state to/from vmcb12/vmcb02Sean Christopherson1-0/+20
2025-09-23KVM: SVM: Emulate reads and writes to shadow stack MSRsJohn Allen2-1/+23
2025-09-23KVM: nVMX: Advertise new VM-Entry/Exit control bits for CET stateChao Gao1-2/+11
2025-09-23KVM: nVMX: Add consistency checks for CET statesChao Gao1-0/+48
2025-09-23KVM: nVMX: Add consistency checks for CR0.WP and CR4.CETChao Gao1-0/+6
2025-09-23KVM: nVMX: Prepare for enabling CET support for nested guestYang Weijiang5-1/+101
2025-09-23KVM: nVMX: Virtualize NO_HW_ERROR_CODE_CC for L1 event injection to L2Yang Weijiang2-9/+23
2025-09-23KVM: VMX: Configure nested capabilities after CPU capabilitiesSean Christopherson1-2/+7
2025-09-23KVM: x86: Enable CET virtualization for VMX and advertise to userspaceYang Weijiang6-3/+45
2025-09-23KVM: x86: Disable support for IBT and SHSTK if allow_smaller_maxphyaddr is trueSean Christopherson1-0/+10
2025-09-23KVM: x86: Initialize allow_smaller_maxphyaddr earlier in setupSean Christopherson2-23/+23
2025-09-23KVM: x86: Disable support for Shadow Stacks if TDP is disabledSean Christopherson1-0/+8
2025-09-23KVM: x86: Add XSS support for CET_KERNEL and CET_USERYang Weijiang1-3/+15
2025-09-23KVM: nVMX: Always forward XSAVES/XRSTORS exits from L2 to L1Sean Christopherson1-6/+9
2025-09-23KVM: x86: Allow setting CR4.CET if IBT or SHSTK is supportedYang Weijiang2-1/+4
2025-09-23KVM: x86/mmu: Pretty print PK, SS, and SGX flags in MMU tracepointsSean Christopherson1-0/+3
2025-09-23KVM: x86/mmu: WARN on attempt to check permissions for Shadow Stack #PFSean Christopherson2-1/+2
2025-09-23KVM: x86: Emulate SSP[63:32]!=0 #GP(0) for FAR JMP to 32-bit modeSean Christopherson2-0/+44
2025-09-23KVM: x86: Don't emulate task switches when IBT or SHSTK is enabledSean Christopherson1-7/+28
2025-09-23KVM: x86: Don't emulate instructions affected by CET featuresSean Christopherson1-13/+102
2025-09-23KVM: VMX: Set host constant supervisor states to VMCS fieldsYang Weijiang4-0/+32
2025-09-23KVM: VMX: Set up interception for CET MSRsYang Weijiang1-0/+19
2025-09-23KVM: x86: Save and reload SSP to/from SMRAMYang Weijiang2-1/+9
2025-09-23KVM: VMX: Emulate read and write to CET MSRsYang Weijiang3-2/+103
2025-09-23KVM: x86: Enable guest SSP read/write interface with new uAPIsYang Weijiang3-4/+46
2025-09-23KVM: VMX: Introduce CET VMCS fields and control bitsYang Weijiang1-0/+8
2025-09-23KVM: x86: Report KVM supported CET MSRs as to-be-savedYang Weijiang1-0/+18
2025-09-23KVM: x86: Add fault checks for guest CR4.CET settingYang Weijiang1-0/+6
2025-09-23KVM: x86: Load guest FPU state when access XSAVE-managed MSRsSean Christopherson1-1/+86
2025-09-23KVM: x86: Initialize kvm_caps.supported_xssYang Weijiang1-8/+15
2025-09-23KVM: x86: Refresh CPUID on write to guest MSR_IA32_XSSYang Weijiang2-1/+4
2025-09-23KVM: x86: Check XSS validity against guest CPUIDsChao Gao3-5/+17
2025-09-23KVM: x86: Report XSS as to-be-saved if there are supported featuresSean Christopherson1-1/+5
2025-09-23KVM: x86: Introduce KVM_{G,S}ET_ONE_REG uAPIs supportYang Weijiang2-0/+126
2025-09-23KVM: x86: Merge 'svm' into 'cet' to pick up GHCB dependenciesSean Christopherson8-103/+136
2025-09-23KVM: SVM: Enable AVIC by default for Zen4+ if x2AVIC is supportNaveen N Rao1-4/+36
2025-09-23KVM: SVM: Move global "avic" variable to avic.cSean Christopherson2-18/+26
2025-09-23KVM: SVM: Don't advise the user to do force_avic=y (when x2AVIC is detected)Sean Christopherson1-4/+2
2025-09-23KVM: SVM: Always print "AVIC enabled" separately, even when force enabledSean Christopherson1-10/+9
2025-09-23KVM: SVM: Update "APICv in x2APIC without x2AVIC" in avic.c, not svm.cSean Christopherson3-6/+5
2025-09-23KVM: SVM: Move x2AVIC MSR interception helper to avic.cSean Christopherson3-53/+54
2025-09-23KVM: SVM: Make svm_x86_ops globally visible, clean up on-HyperV usageSean Christopherson4-32/+31
2025-09-23KVM: SVM: Re-load current, not host, TSC_AUX on #VMEXIT from SEV-ES guestHou Wenlong3-19/+18
2025-09-23KVM: x86: Add helper to retrieve current value of user return MSRHou Wenlong2-0/+7
2025-09-23KVM: SEV: Reject non-positive effective lengths during LAUNCH_UPDATESean Christopherson1-1/+1
2025-09-23KVM: SEV: Validate XCR0 provided by guest in GHCBSean Christopherson3-5/+5
2025-09-23KVM: SEV: Read save fields from GHCB exactly onceSean Christopherson2-21/+26
2025-09-23KVM: SEV: Rename kvm_ghcb_get_sw_exit_code() to kvm_get_cached_sw_exit_code()Sean Christopherson1-4/+4
2025-09-23LoongArch: KVM: Move kvm_iocsr tracepoint out of generic codeSteven Rostedt1-0/+35
2025-09-23LoongArch: KVM: Rework pch_pic_update_batch_irqs()Yury Norov (NVIDIA)1-8/+3