[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20240821-kvm-arm64-hide-pie-regs-v1-0-08cb3c79cb57@kernel.org>
Date: Wed, 21 Aug 2024 14:07:14 +0100
From: Mark Brown <broonie@...nel.org>
To: Marc Zyngier <maz@...nel.org>, Oliver Upton <oliver.upton@...ux.dev>,
James Morse <james.morse@....com>,
Suzuki K Poulose <suzuki.poulose@....com>,
Catalin Marinas <catalin.marinas@....com>, Will Deacon <will@...nel.org>,
Joey Gouly <joey.gouly@....com>
Cc: linux-arm-kernel@...ts.infradead.org, kvmarm@...ts.linux.dev,
linux-kernel@...r.kernel.org, Mark Brown <broonie@...nel.org>
Subject: [PATCH 0/2] KVM: arm64: Control visibility of S1PIE related
sysregs to userspace
While looking at the KVM system register code I noticed that we do not
have visibility operations for TCR2 or the S1PIE registers, I may be
missing some reason why they are not required but in case I'm not I
figured the most direct way to ask was to propose adding the operations.
Signed-off-by: Mark Brown <broonie@...nel.org>
---
Mark Brown (2):
KVM: arm64: Hide TCR2_EL1 from userspace when disabled for guests
KVM: arm64: Hide S1PIE registers from userspace when disabled for guests
arch/arm64/include/asm/kvm_host.h | 6 ++++++
arch/arm64/kvm/sys_regs.c | 31 ++++++++++++++++++++++++++-----
2 files changed, 32 insertions(+), 5 deletions(-)
---
base-commit: 6e4436539ae182dc86d57d13849862bcafaa4709
change-id: 20240820-kvm-arm64-hide-pie-regs-2236f70703ab
Best regards,
--
Mark Brown <broonie@...nel.org>
Powered by blists - more mailing lists