]> git.ipfire.org Git - thirdparty/qemu.git/commit
i386/cpu: Save/restore SSP0 MSR for FRED
authorXin Li (Intel) <xin@zytor.com>
Thu, 11 Dec 2025 06:07:52 +0000 (14:07 +0800)
committerPaolo Bonzini <pbonzini@redhat.com>
Sat, 27 Dec 2025 09:11:10 +0000 (10:11 +0100)
commit0fa1025904fd1c4e5eac345ddeb8285d78b0a01d
treed3232713d3d041f6bb9b5901718b61d03694ce27
parentad88fb1bd5ffb59d6ef4f0c8919760759665386c
i386/cpu: Save/restore SSP0 MSR for FRED

Both FRED and CET shadow stack define the MSR MSR_IA32_PL0_SSP (aka
MSR_IA32_FRED_SSP0 in FRED spec).

MSR_IA32_PL0_SSP is a FRED SSP MSR, so that if a processor doesn't
support CET shadow stack, FRED transitions won't use MSR_IA32_PL0_SSP,
but this MSR would still be accessible using MSR-access instructions
(e.g., RDMSR, WRMSR).

Therefore, save/restore SSP0 MSR for FRED.

Tested-by: Farrah Chen <farrah.chen@intel.com>
Signed-off-by: Xin Li (Intel) <xin@zytor.com>
Signed-off-by: Zhao Liu <zhao1.liu@intel.com>
Link: https://lore.kernel.org/r/20251211060801.3600039-14-zhao1.liu@intel.com
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
target/i386/cpu.h
target/i386/kvm/kvm.c