diff options
author | James Morse <[email protected]> | 2024-10-30 16:03:17 +0000 |
---|---|---|
committer | Oliver Upton <[email protected]> | 2024-10-31 18:10:52 +0000 |
commit | 75cd027cbcb161e277209e20df14f0818c62d9e7 (patch) | |
tree | 0417ebbe9d31df706fd1b794f9e49051fa447518 /scripts/gdb/linux/interrupts.py | |
parent | 6685f5d572c22e1003e7c0d089afe1c64340ab1f (diff) |
KVM: arm64: selftests: Test ID_AA64PFR0.MPAM isn't completely ignored
The ID_AA64PFR0.MPAM bit was previously accidentally exposed to guests,
and is ignored by KVM. KVM will always present the guest with 0 here,
and trap the MPAM system registers to inject an undef.
But, this value is still needed to prevent migration when the value
is incompatible with the target hardware. Add a kvm unit test to try
and write multiple values to ID_AA64PFR0.MPAM. Only the hardware value
previously exposed should be ignored, all other values should be
rejected.
Signed-off-by: James Morse <[email protected]>
Signed-off-by: Joey Gouly <[email protected]>
Tested-by: Shameer Kolothum <[email protected]>
Reviewed-by: Gavin Shan <[email protected]>
Reviewed-by: Marc Zyngier <[email protected]>
Link: https://lore.kernel.org/r/[email protected]
Signed-off-by: Oliver Upton <[email protected]>
Diffstat (limited to 'scripts/gdb/linux/interrupts.py')
0 files changed, 0 insertions, 0 deletions