This small series addresses a couple of Spectre-v2 related issues: - Fix a live migration regression introduced with the setting of CSV2 on systems that are not affected by Spectre-v2, but that don't directly expose it in ID_AA64PFR0_EL1 - Inject an UNDEF exception if the guest tries to access any of SCXTNUM_ELx, as we don't advertise it to guests. Patches on top of 5.10-rc2. Marc Zyngier (3): KVM: arm64: Allow setting of ID_AA64PFR0_EL1.CSV2 from userspace KVM: arm64: Rename access_amu() to undef_access() KVM: arm64: Handle SCXTNUM_ELx traps arch/arm64/include/asm/kvm_host.h | 2 + arch/arm64/include/asm/sysreg.h | 4 ++ arch/arm64/kvm/arm.c | 16 +++++++ arch/arm64/kvm/sys_regs.c | 70 +++++++++++++++++++++++-------- 4 files changed, 74 insertions(+), 18 deletions(-) -- 2.28.0 _______________________________________________ kvmarm mailing list kvmarm@xxxxxxxxxxxxxxxxxxxxx https://lists.cs.columbia.edu/mailman/listinfo/kvmarm