aboutsummaryrefslogtreecommitdiffstats
path: root/tools/perf/builtin-script.c
diff options
context:
space:
mode:
authorSean Christopherson <[email protected]>2023-06-13 20:30:37 +0000
committerPaolo Bonzini <[email protected]>2023-07-29 15:05:32 +0000
commit5a7591176c47cce363c1eed704241e5d1c42c5a6 (patch)
treeab592ba4cf60a9185dd31a08c039c3e3a0ec0b31 /tools/perf/builtin-script.c
parentKVM: VMX: Don't fudge CR0 and CR4 for restricted L2 guest (diff)
downloadkernel-5a7591176c47cce363c1eed704241e5d1c42c5a6.tar.gz
kernel-5a7591176c47cce363c1eed704241e5d1c42c5a6.zip
KVM: selftests: Expand x86's sregs test to cover illegal CR0 values
Add coverage to x86's set_sregs_test to verify KVM rejects vendor-agnostic illegal CR0 values, i.e. CR0 values whose legality doesn't depend on the current VMX mode. KVM historically has neglected to reject bad CR0s from userspace, i.e. would happily accept a completely bogus CR0 via KVM_SET_SREGS{2}. Punt VMX specific subtests to future work, as they would require quite a bit more effort, and KVM gets coverage for CR0 checks in general through other means, e.g. KVM-Unit-Tests. Signed-off-by: Sean Christopherson <[email protected]> Message-Id: <[email protected]> Signed-off-by: Paolo Bonzini <[email protected]>
Diffstat (limited to 'tools/perf/builtin-script.c')
0 files changed, 0 insertions, 0 deletions