[PATCH v2 0/2] KVM: arm64: Expose CSV3 to guests on running on Meltdown-safe HW
Will Deacon
will at kernel.org
Thu Dec 10 08:53:41 EST 2020
On Fri, Dec 04, 2020 at 06:37:07PM +0000, Marc Zyngier wrote:
> Will recently pointed out that when running on big-little systems that
> are known not to be vulnerable to Metldown, guests are not presented
> with the CSV3 property if the physical HW include a core that doesn't
> have CSV3, despite being known to be safe (it is on the kpti_safe_list).
>
> Since this is valuable information that can be cheaply given to the
> guest, let's just do that. The scheme is the same as what we do for
> CSV2, allowing userspace to change the default setting if this doesn't
> advertise a safer setting than what the kernel thinks it is.
>
> * From v1:
> - Fix the clearing of ID_AA64PFR0_EL1.CSV3 on update from userspace
> - Actually store the userspace value
>
> Marc Zyngier (2):
> arm64: Make the Meltdown mitigation state available
> KVM: arm64: Advertise ID_AA64PFR0_EL1.CSV3=1 if the CPUs are
> Meltdown-safe
Acked-by: Will Deacon <will at kernel.org>
Will
More information about the linux-arm-kernel
mailing list