On Thu, Mar 26, 2020 at 04:18:37PM +0800, Yang Weijiang wrote: > Control-flow Enforcement Technology (CET) provides protection against > Return/Jump-Oriented Programming (ROP/JOP) attack. It includes two > sub-features: Shadow Stack (SHSTK) and Indirect Branch Tracking (IBT). > > KVM needs to update to enable guest CET feature. > This patchset implements CET related CPUID/XSAVES enumeration, MSRs > and vmentry/vmexit configuration etc.so that guest kernel can setup CET > runtime infrastructure based on them. Some CET MSRs and related feature > flags used reference the definitions in kernel patchset. > > CET kernel patches are here: > https://lkml.org/lkml/2020/2/5/593 > https://lkml.org/lkml/2020/2/5/604 lkml.org is pretty worthless for this sort of thing, and lkml.kernel.org is the preferred link method in general. The syntax is https://lkml.kernel.org/r/<Message-ID> e.g. https://lkml.kernel.org/r/20200205181935.3712-1-yu-cheng.yu@xxxxxxxxx Note, that will redirect to lore.kernel.org, but the above format is preferred because it isn't dependent on binning the thread to a specific mailing list. Anyways, kernel.org provides a link to download the entire thread in mbox format, which allows reviewers to get the prerequisite series without much fuss. https://lore.kernel.org/linux-api/20200205181935.3712-1-yu-cheng.yu@xxxxxxxxx/t.mbox.gz