[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <172838909377.2973199.1800004411282271028.b4-ty@kernel.org>
Date: Tue, 8 Oct 2024 13:05:06 +0100
From: Marc Zyngier <maz@...nel.org>
To: Oliver Upton <oliver.upton@...ux.dev>,
James Morse <james.morse@....com>,
Suzuki K Poulose <suzuki.poulose@....com>,
Catalin Marinas <catalin.marinas@....com>,
Will Deacon <will@...nel.org>,
Joey Gouly <joey.gouly@....com>,
Mark Brown <broonie@...nel.org>
Cc: linux-arm-kernel@...ts.infradead.org,
kvmarm@...ts.linux.dev,
linux-kernel@...r.kernel.org
Subject: Re: [PATCH] KVM: arm64: Expose S1PIE to guests
On Sat, 05 Oct 2024 00:19:37 +0100, Mark Brown wrote:
> Prior to commit 70ed7238297f ("KVM: arm64: Sanitise ID_AA64MMFR3_EL1")
> we just exposed the santised view of ID_AA64MMFR3_EL1 to guests, meaning
> that they saw both TCRX and S1PIE if present on the host machine. That
> commit added VMM control over the contents of the register and exposed
> S1POE but removed S1PIE, meaning that the extension is no longer visible
> to guests. Reenable support for S1PIE with VMM control.
>
> [...]
Applied to fixes, thanks!
[1/1] KVM: arm64: Expose S1PIE to guests
commit: d4a89e5aee23eaebdc45f63cb3d6d5917ff6acf4
Cheers,
M.
--
Without deviation from the norm, progress is not possible.
Powered by blists - more mailing lists