diff options
author | Oliver Upton <oliver.upton@linux.dev> | 2024-11-11 19:38:30 +0100 |
---|---|---|
committer | Oliver Upton <oliver.upton@linux.dev> | 2024-11-11 19:38:30 +0100 |
commit | 24bb181136483f9dbade65cb41763fd8a5d155b5 (patch) | |
tree | 90b1acb92aa77fbc0a1a1cf6565387546b53503e /samples/ftrace | |
parent | Merge branch kvm-arm64/psci-1.3 into kvmarm/next (diff) | |
parent | KVM: arm64: Make L1Ip feature in CTR_EL0 writable from userspace (diff) | |
download | linux-24bb181136483f9dbade65cb41763fd8a5d155b5.tar.xz linux-24bb181136483f9dbade65cb41763fd8a5d155b5.zip |
Merge branch kvm-arm64/mpam-ni into kvmarm/next
* kvm-arm64/mpam-ni:
: Hiding FEAT_MPAM from KVM guests, courtesy of James Morse + Joey Gouly
:
: Fix a longstanding bug where FEAT_MPAM was accidentally exposed to KVM
: guests + the EL2 trap configuration was not explicitly configured. As
: part of this, bring in skeletal support for initialising the MPAM CPU
: context so KVM can actually set traps for its guests.
:
: Be warned -- if this series leads to boot failures on your system,
: you're running on turd firmware.
:
: As an added bonus (that builds upon the infrastructure added by the MPAM
: series), allow userspace to configure CTR_EL0.L1Ip, courtesy of Shameer
: Kolothum.
KVM: arm64: Make L1Ip feature in CTR_EL0 writable from userspace
KVM: arm64: selftests: Test ID_AA64PFR0.MPAM isn't completely ignored
KVM: arm64: Disable MPAM visibility by default and ignore VMM writes
KVM: arm64: Add a macro for creating filtered sys_reg_descs entries
KVM: arm64: Fix missing traps of guest accesses to the MPAM registers
arm64: cpufeature: discover CPU support for MPAM
arm64: head.S: Initialise MPAM EL2 registers and disable traps
arm64/sysreg: Convert existing MPAM sysregs and add the remaining entries
Signed-off-by: Oliver Upton <oliver.upton@linux.dev>
Diffstat (limited to 'samples/ftrace')
0 files changed, 0 insertions, 0 deletions