summaryrefslogtreecommitdiff
path: root/arch/riscv/kvm/vcpu_pmu.c
diff options
context:
space:
mode:
authorAnup Patel <apatel@ventanamicro.com>2024-02-13 16:34:00 +0300
committerAnup Patel <anup@brainfault.org>2024-03-06 18:23:32 +0300
commitd808f0b1be4888a87524164bc7dad2242734de38 (patch)
treeaf81b59f1c491397e593924b53965081f17b2ab1 /arch/riscv/kvm/vcpu_pmu.c
parentd0b94bcbb04262b9ffe6e172223e8cbb663a2c9d (diff)
downloadlinux-d808f0b1be4888a87524164bc7dad2242734de38.tar.xz
RISC-V: KVM: Forward SEED CSR access to user space
The SEED CSR access from VS/VU mode (guest) will always trap to HS-mode (KVM) when Zkr extension is available to the Guest/VM. Forward this CSR access to KVM user space so that it can be emulated based on the method chosen by VMM. Fixes: f370b4e668f0 ("RISC-V: KVM: Allow scalar crypto extensions for Guest/VM") Signed-off-by: Anup Patel <apatel@ventanamicro.com> Reviewed-by: Andrew Jones <ajones@ventanamicro.com> Signed-off-by: Anup Patel <anup@brainfault.org>
Diffstat (limited to 'arch/riscv/kvm/vcpu_pmu.c')
0 files changed, 0 insertions, 0 deletions