summaryrefslogtreecommitdiff
path: root/arch/arm64/kernel/vdso32-wrap.S
diff options
context:
space:
mode:
authorJing Zhang <jingzhangos@google.com>2023-06-09 22:00:51 +0300
committerOliver Upton <oliver.upton@linux.dev>2023-06-15 15:55:20 +0300
commitc118cead07a762592c9e67252064616efa4574fa (patch)
treed531bbe269aef10b8b0be6415dcfc103fe19465a /arch/arm64/kernel/vdso32-wrap.S
parent2e8bf0cbd0589bae3a0466a3ed45f9cf9f3164eb (diff)
downloadlinux-c118cead07a762592c9e67252064616efa4574fa.tar.xz
KVM: arm64: Use generic sanitisation for ID_(AA64)DFR0_EL1
KVM allows userspace to specify a PMU version for the guest by writing to the corresponding ID registers. Currently the validation of these writes is done manuallly, but there's no reason we can't switch over to the generic sanitisation infrastructure. Start screening user writes through arm64_check_features() to prevent userspace from over-promising in terms of vPMU support. Leave the old masking in place for now, as we aren't completely ready to serve reads from the VM-wide values. Signed-off-by: Jing Zhang <jingzhangos@google.com> Link: https://lore.kernel.org/r/20230609190054.1542113-9-oliver.upton@linux.dev [Oliver: split off from monster patch, cleaned up handling of NI vPMU values, wrote commit description] Signed-off-by: Oliver Upton <oliver.upton@linux.dev>
Diffstat (limited to 'arch/arm64/kernel/vdso32-wrap.S')
0 files changed, 0 insertions, 0 deletions