diff options
author | James Morse <james.morse@arm.com> | 2024-10-30 19:03:16 +0300 |
---|---|---|
committer | Oliver Upton <oliver.upton@linux.dev> | 2024-10-31 21:10:52 +0300 |
commit | 6685f5d572c22e1003e7c0d089afe1c64340ab1f (patch) | |
tree | 03a69a2e7254f70c0e55b89c52ee0c12a9e46964 /rust/helpers/helpers.c | |
parent | 7da540e29dea6016ed55d16450d3133c70761d21 (diff) | |
download | linux-6685f5d572c22e1003e7c0d089afe1c64340ab1f.tar.xz |
KVM: arm64: Disable MPAM visibility by default and ignore VMM writes
commit 011e5f5bf529f ("arm64/cpufeature: Add remaining feature bits in
ID_AA64PFR0 register") exposed the MPAM field of AA64PFR0_EL1 to guests,
but didn't add trap handling. A previous patch supplied the missing trap
handling.
Existing VMs that have the MPAM field of ID_AA64PFR0_EL1 set need to
be migratable, but there is little point enabling the MPAM CPU
interface on new VMs until there is something a guest can do with it.
Clear the MPAM field from the guest's ID_AA64PFR0_EL1 and on hardware
that supports MPAM, politely ignore the VMMs attempts to set this bit.
Guests exposed to this bug have the sanitised value of the MPAM field,
so only the correct value needs to be ignored. This means the field
can continue to be used to block migration to incompatible hardware
(between MPAM=1 and MPAM=5), and the VMM can't rely on the field
being ignored.
Signed-off-by: James Morse <james.morse@arm.com>
Co-developed-by: Joey Gouly <joey.gouly@arm.com>
Signed-off-by: Joey Gouly <joey.gouly@arm.com>
Reviewed-by: Gavin Shan <gshan@redhat.com>
Tested-by: Shameer Kolothum <shameerali.kolothum.thodi@huawei.com>
Reviewed-by: Marc Zyngier <maz@kernel.org>
Link: https://lore.kernel.org/r/20241030160317.2528209-7-joey.gouly@arm.com
Signed-off-by: Oliver Upton <oliver.upton@linux.dev>
Diffstat (limited to 'rust/helpers/helpers.c')
0 files changed, 0 insertions, 0 deletions