diff options
author | Mark Rutland <mark.rutland@arm.com> | 2018-12-07 18:39:22 +0000 |
---|---|---|
committer | Will Deacon <will.deacon@arm.com> | 2018-12-13 16:42:46 +0000 |
commit | a1ee8abb95c55948dc187d0cccc88814841c85d2 (patch) | |
tree | 08dc11ae155959ae0a33d5980381c901e4a24981 /drivers/perf | |
parent | 4eaed6aa2c628101246bcabc91b203bfac1193f8 (diff) | |
download | linux-a1ee8abb95c55948dc187d0cccc88814841c85d2.tar.gz |
arm64/kvm: hide ptrauth from guests
In subsequent patches we're going to expose ptrauth to the host kernel and userspace, but things are a bit trickier for guest kernels. For the time being, let's hide ptrauth from KVM guests. Regardless of how well-behaved the guest kernel is, guest userspace could attempt to use ptrauth instructions, triggering a trap to EL2, resulting in noise from kvm_handle_unknown_ec(). So let's write up a handler for the PAC trap, which silently injects an UNDEF into the guest, as if the feature were really missing. Reviewed-by: Richard Henderson <richard.henderson@linaro.org> Signed-off-by: Mark Rutland <mark.rutland@arm.com> Signed-off-by: Kristina Martsenko <kristina.martsenko@arm.com> Reviewed-by: Andrew Jones <drjones@redhat.com> Reviewed-by: Christoffer Dall <christoffer.dall@arm.com> Cc: Marc Zyngier <marc.zyngier@arm.com> Cc: kvmarm@lists.cs.columbia.edu Signed-off-by: Will Deacon <will.deacon@arm.com>
Diffstat (limited to 'drivers/perf')
0 files changed, 0 insertions, 0 deletions