Re: [RFC PATCH v4 0/8] This patch-set is to enable Guest CET support

2019-04-02 Thread Sean Christopherson
On Mon, Mar 18, 2019 at 11:03:43PM +0800, Yang Weijiang wrote: > Control-flow Enforcement Technology (CET) provides protection against > return/jump-oriented programming (ROP) attacks. To make kvm Guest OS own > the capability, this patch-set is required. It enables CET related CPUID > report, xsav

Re: [RFC PATCH v4 0/8] This patch-set is to enable Guest CET support

2019-03-26 Thread Sean Christopherson
On Tue, Mar 26, 2019 at 04:45:34AM +0800, Yang Weijiang wrote: > Hi, Paolo and Sean, > Do you have any comments on v4 patches? My backlog is a bit full at the moment, I'll try to review the series later this week.

Re: [RFC PATCH v4 0/8] This patch-set is to enable Guest CET support

2019-03-26 Thread Yang Weijiang
On Mon, Mar 18, 2019 at 11:03:43PM +0800, Yang Weijiang wrote: > Control-flow Enforcement Technology (CET) provides protection against > return/jump-oriented programming (ROP) attacks. To make kvm Guest OS own > the capability, this patch-set is required. It enables CET related CPUID > report, xsav

[RFC PATCH v4 0/8] This patch-set is to enable Guest CET support

2019-03-19 Thread Yang Weijiang
Control-flow Enforcement Technology (CET) provides protection against return/jump-oriented programming (ROP) attacks. To make kvm Guest OS own the capability, this patch-set is required. It enables CET related CPUID report, xsaves/xrstors, vmx entry configuration etc. for Guest OS. PATCH 1: De