diff options
author | Marc Zyngier <maz@kernel.org> | 2024-10-08 10:39:27 +0100 |
---|---|---|
committer | Marc Zyngier <maz@kernel.org> | 2024-10-08 10:40:04 +0100 |
commit | 9b7c3dd5964b252f187f1982996fb9c0c2159da9 (patch) | |
tree | 7d2015301ade613008594e393a812061399470c0 /drivers/platform/surface/aggregator/ssh_parser.c | |
parent | a1d402abf8e3ff1d821e88993fc5331784fac0da (diff) | |
parent | dc9b5d7e0bd40e68a94013766b27be3dda10c006 (diff) |
Merge branch kvm-arm64/idregs-6.12 into kvmarm/fixes
* kvm-arm64/idregs-6.12:
: .
: Make some fields of ID_AA64DFR0_EL1 and ID_AA64PFR1_EL1
: writable from userspace, so that a VMM can influence the
: set of guest-visible features.
:
: - for ID_AA64DFR0_EL1: DoubleLock, WRPs, PMUVer and DebugVer
: are writable (courtesy of Shameer Kolothum)
:
: - for ID_AA64PFR1_EL1: BT, SSBS, CVS2_frac are writable
: (courtesy of Shaoqin Huang)
: .
KVM: selftests: aarch64: Add writable test for ID_AA64PFR1_EL1
KVM: arm64: Allow userspace to change ID_AA64PFR1_EL1
KVM: arm64: Use kvm_has_feat() to check if FEAT_SSBS is advertised to the guest
KVM: arm64: Disable fields that KVM doesn't know how to handle in ID_AA64PFR1_EL1
KVM: arm64: Make the exposed feature bits in AA64DFR0_EL1 writable from userspace
Signed-off-by: Marc Zyngier <maz@kernel.org>
Diffstat (limited to 'drivers/platform/surface/aggregator/ssh_parser.c')
0 files changed, 0 insertions, 0 deletions