diff options
author | Marc Zyngier <maz@kernel.org> | 2020-06-04 11:14:00 +0100 |
---|---|---|
committer | Marc Zyngier <maz@kernel.org> | 2020-06-09 10:59:52 +0100 |
commit | 29eb5a3c57f7e06d803bb44a0ce2f9ed79f39cd9 (patch) | |
tree | 1aaa34366253af947959bea389bd21d51e9fc687 /net/nsh | |
parent | ef3e40a7ea8dbe2abd0a345032cd7d5023b9684f (diff) |
KVM: arm64: Handle PtrAuth traps early
The current way we deal with PtrAuth is a bit heavy handed:
- We forcefully save the host's keys on each vcpu_load()
- Handling the PtrAuth trap forces us to go all the way back
to the exit handling code to just set the HCR bits
Overall, this is pretty cumbersome. A better approach would be
to handle it the same way we deal with the FPSIMD registers:
- On vcpu_load() disable PtrAuth for the guest
- On first use, save the host's keys, enable PtrAuth in the
guest
Crucially, this can happen as a fixup, which is done very early
on exit. We can then reenter the guest immediately without
leaving the hypervisor role.
Another thing is that it simplify the rest of the host handling:
exiting all the way to the host means that the only possible
outcome for this trap is to inject an UNDEF.
Reviewed-by: Mark Rutland <mark.rutland@arm.com>
Signed-off-by: Marc Zyngier <maz@kernel.org>
Diffstat (limited to 'net/nsh')
0 files changed, 0 insertions, 0 deletions