original_kernel/arch/arm64/kvm
Fuad Tabba afb91f5f8a KVM: arm64: Ensure that SME controls are disabled in protected mode
KVM (and pKVM) do not support SME guests. Therefore KVM ensures
that the host's SME state is flushed and that SME controls for
enabling access to ZA storage and for streaming are disabled.

pKVM needs to protect against a buggy/malicious host. Ensure that
it wouldn't run a guest when protected mode is enabled should any
of the SME controls be enabled.

Signed-off-by: Fuad Tabba <tabba@google.com>
Link: https://lore.kernel.org/r/20240603122852.3923848-10-tabba@google.com
Signed-off-by: Marc Zyngier <maz@kernel.org>
2024-06-04 15:06:33 +01:00
..
hyp KVM: arm64: Ensure that SME controls are disabled in protected mode 2024-06-04 15:06:33 +01:00
vgic
.gitignore
Kconfig
Makefile
arch_timer.c
arm.c KVM: arm64: Consolidate initializing the host data's fpsimd_state/sve in pKVM 2024-06-04 15:06:33 +01:00
debug.c
emulate-nested.c KVM: arm64: nv: Fix relative priorities of exceptions generated by ERETAx 2024-05-30 17:36:22 +01:00
fpsimd.c KVM: arm64: Ensure that SME controls are disabled in protected mode 2024-06-04 15:06:33 +01:00
guest.c
handle_exit.c
hypercalls.c
inject_fault.c
mmio.c
mmu.c
nested.c KVM: arm64: nv: Expose BTI and CSV_frac to a guest hypervisor 2024-05-30 17:36:22 +01:00
pauth.c
pkvm.c
pmu-emul.c
pmu.c
psci.c
pvtime.c
reset.c KVM: arm64: Allocate memory mapped at hyp for host sve state in pKVM 2024-06-04 15:06:33 +01:00
stacktrace.c
sys_regs.c
sys_regs.h
trace.h
trace_arm.h
trace_handle_exit.h
trng.c
va_layout.c
vgic-sys-reg-v3.c
vmid.c