aboutsummaryrefslogtreecommitdiff
path: root/lib/test_fortify/write_overflow-strncpy.c
diff options
context:
space:
mode:
authorMarc Zyngier <[email protected]>2023-10-23 10:54:44 +0100
committerOliver Upton <[email protected]>2023-10-25 00:25:06 +0000
commit3f7915ccc90261c201664b5fdce139db09480a36 (patch)
tree4c1eb99403d291424a82f92a22a4cc0d5f5eda3e /lib/test_fortify/write_overflow-strncpy.c
parentc7d11a61c7f7de75e4e269485644ea8c5a4e0bf6 (diff)
KVM: arm64: Handle AArch32 SPSR_{irq,abt,und,fiq} as RAZ/WI
When trapping accesses from a NV guest that tries to access SPSR_{irq,abt,und,fiq}, make sure we handle them as RAZ/WI, as if AArch32 wasn't implemented. This involves a bit of repainting to make the visibility handler more generic. Signed-off-by: Marc Zyngier <[email protected]> Link: https://lore.kernel.org/r/[email protected] Signed-off-by: Oliver Upton <[email protected]>
Diffstat (limited to 'lib/test_fortify/write_overflow-strncpy.c')
0 files changed, 0 insertions, 0 deletions