index
:
linux.git
arm64-uaccess
dependabot/pip/drivers/gpu/drm/ci/xfails/certifi-2024.7.4
dependabot/pip/drivers/gpu/drm/ci/xfails/idna-3.7
dependabot/pip/drivers/gpu/drm/ci/xfails/pip-23.3
dependabot/pip/drivers/gpu/drm/ci/xfails/requests-2.32.2
dependabot/pip/drivers/gpu/drm/ci/xfails/setuptools-70.0.0
dependabot/pip/drivers/gpu/drm/ci/xfails/urllib3-2.0.7
dependabot/pip/drivers/gpu/drm/ci/xfails/urllib3-2.2.2
link_path_walk
master
runtime-constants
vsnprintf
word-at-a-time
x86-rep-insns
x86-uaccess-cleanup
upstream/master
Unnamed repository; edit this file 'description' to name the repository.
git
about
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
arch
/
x86
Age
Commit message (
Expand
)
Author
Files
Lines
2025-09-23
KVM: x86: Add human friendly formatting for #XM, and #VE
Sean Christopherson
1
-2
/
+2
2025-09-23
KVM: SVM: Enable shadow stack virtualization for SVM
John Allen
1
-3
/
+0
2025-09-23
KVM: SEV: Synchronize MSR_IA32_XSS from the GHCB when it's valid
Sean Christopherson
3
-2
/
+6
2025-09-23
KVM: SVM: Pass through shadow stack MSRs as appropriate
John Allen
1
-0
/
+11
2025-09-23
KVM: SVM: Update dump_vmcb with shadow stack save area additions
John Allen
1
-0
/
+11
2025-09-23
KVM: nSVM: Save/load CET Shadow Stack state to/from vmcb12/vmcb02
Sean Christopherson
1
-0
/
+20
2025-09-23
KVM: SVM: Emulate reads and writes to shadow stack MSRs
John Allen
2
-1
/
+23
2025-09-23
KVM: nVMX: Advertise new VM-Entry/Exit control bits for CET state
Chao Gao
1
-2
/
+11
2025-09-23
KVM: nVMX: Add consistency checks for CET states
Chao Gao
1
-0
/
+48
2025-09-23
KVM: nVMX: Add consistency checks for CR0.WP and CR4.CET
Chao Gao
1
-0
/
+6
2025-09-23
KVM: nVMX: Prepare for enabling CET support for nested guest
Yang Weijiang
5
-1
/
+101
2025-09-23
KVM: nVMX: Virtualize NO_HW_ERROR_CODE_CC for L1 event injection to L2
Yang Weijiang
2
-9
/
+23
2025-09-23
KVM: VMX: Configure nested capabilities after CPU capabilities
Sean Christopherson
1
-2
/
+7
2025-09-23
KVM: x86: Enable CET virtualization for VMX and advertise to userspace
Yang Weijiang
6
-3
/
+45
2025-09-23
KVM: x86: Disable support for IBT and SHSTK if allow_smaller_maxphyaddr is true
Sean Christopherson
1
-0
/
+10
2025-09-23
KVM: x86: Initialize allow_smaller_maxphyaddr earlier in setup
Sean Christopherson
2
-23
/
+23
2025-09-23
KVM: x86: Disable support for Shadow Stacks if TDP is disabled
Sean Christopherson
1
-0
/
+8
2025-09-23
KVM: x86: Add XSS support for CET_KERNEL and CET_USER
Yang Weijiang
1
-3
/
+15
2025-09-23
KVM: nVMX: Always forward XSAVES/XRSTORS exits from L2 to L1
Sean Christopherson
1
-6
/
+9
2025-09-23
KVM: x86: Allow setting CR4.CET if IBT or SHSTK is supported
Yang Weijiang
2
-1
/
+4
2025-09-23
KVM: x86/mmu: Pretty print PK, SS, and SGX flags in MMU tracepoints
Sean Christopherson
1
-0
/
+3
2025-09-23
KVM: x86/mmu: WARN on attempt to check permissions for Shadow Stack #PF
Sean Christopherson
2
-1
/
+2
2025-09-23
KVM: x86: Emulate SSP[63:32]!=0 #GP(0) for FAR JMP to 32-bit mode
Sean Christopherson
2
-0
/
+44
2025-09-23
KVM: x86: Don't emulate task switches when IBT or SHSTK is enabled
Sean Christopherson
1
-7
/
+28
2025-09-23
KVM: x86: Don't emulate instructions affected by CET features
Sean Christopherson
1
-13
/
+102
2025-09-23
KVM: VMX: Set host constant supervisor states to VMCS fields
Yang Weijiang
4
-0
/
+32
2025-09-23
KVM: VMX: Set up interception for CET MSRs
Yang Weijiang
1
-0
/
+19
2025-09-23
KVM: x86: Save and reload SSP to/from SMRAM
Yang Weijiang
2
-1
/
+9
2025-09-23
KVM: VMX: Emulate read and write to CET MSRs
Yang Weijiang
3
-2
/
+103
2025-09-23
KVM: x86: Enable guest SSP read/write interface with new uAPIs
Yang Weijiang
3
-4
/
+46
2025-09-23
KVM: VMX: Introduce CET VMCS fields and control bits
Yang Weijiang
1
-0
/
+8
2025-09-23
KVM: x86: Report KVM supported CET MSRs as to-be-saved
Yang Weijiang
1
-0
/
+18
2025-09-23
KVM: x86: Add fault checks for guest CR4.CET setting
Yang Weijiang
1
-0
/
+6
2025-09-23
KVM: x86: Load guest FPU state when access XSAVE-managed MSRs
Sean Christopherson
1
-1
/
+86
2025-09-23
KVM: x86: Initialize kvm_caps.supported_xss
Yang Weijiang
1
-8
/
+15
2025-09-23
KVM: x86: Refresh CPUID on write to guest MSR_IA32_XSS
Yang Weijiang
2
-1
/
+4
2025-09-23
KVM: x86: Check XSS validity against guest CPUIDs
Chao Gao
3
-5
/
+17
2025-09-23
KVM: x86: Report XSS as to-be-saved if there are supported features
Sean Christopherson
1
-1
/
+5
2025-09-23
KVM: x86: Introduce KVM_{G,S}ET_ONE_REG uAPIs support
Yang Weijiang
2
-0
/
+126
2025-09-23
KVM: x86: Merge 'svm' into 'cet' to pick up GHCB dependencies
Sean Christopherson
8
-103
/
+136
2025-09-23
KVM: SVM: Enable AVIC by default for Zen4+ if x2AVIC is support
Naveen N Rao
1
-4
/
+36
2025-09-23
KVM: SVM: Move global "avic" variable to avic.c
Sean Christopherson
2
-18
/
+26
2025-09-23
KVM: SVM: Don't advise the user to do force_avic=y (when x2AVIC is detected)
Sean Christopherson
1
-4
/
+2
2025-09-23
KVM: SVM: Always print "AVIC enabled" separately, even when force enabled
Sean Christopherson
1
-10
/
+9
2025-09-23
KVM: SVM: Update "APICv in x2APIC without x2AVIC" in avic.c, not svm.c
Sean Christopherson
3
-6
/
+5
2025-09-23
KVM: SVM: Move x2AVIC MSR interception helper to avic.c
Sean Christopherson
3
-53
/
+54
2025-09-23
KVM: SVM: Make svm_x86_ops globally visible, clean up on-HyperV usage
Sean Christopherson
4
-32
/
+31
2025-09-23
KVM: SVM: Re-load current, not host, TSC_AUX on #VMEXIT from SEV-ES guest
Hou Wenlong
3
-19
/
+18
2025-09-23
KVM: x86: Add helper to retrieve current value of user return MSR
Hou Wenlong
2
-0
/
+7
2025-09-23
KVM: SEV: Reject non-positive effective lengths during LAUNCH_UPDATE
Sean Christopherson
1
-1
/
+1
[prev]
[next]