aboutsummaryrefslogtreecommitdiffstatshomepage
path: root/arch/arm64/kernel/smp.c
diff options
context:
space:
mode:
authorWill Deacon <will@kernel.org>2021-10-08 14:58:35 +0100
committerMarc Zyngier <maz@kernel.org>2021-10-11 09:07:28 +0100
commit8f4566f18db5d1257fc2d5442e16274424a529c1 (patch)
tree7f69c5a15c91555b754b7afecfcfa9f8c0e21f4a /arch/arm64/kernel/smp.c
parentKVM: arm64: Turn __KVM_HOST_SMCCC_FUNC_* into an enum (mostly) (diff)
downloadwireguard-linux-8f4566f18db5d1257fc2d5442e16274424a529c1.tar.xz
wireguard-linux-8f4566f18db5d1257fc2d5442e16274424a529c1.zip
arm64: Prevent kexec and hibernation if is_protected_kvm_enabled()
When pKVM is enabled, the hypervisor code at EL2 and its data structures are inaccessible to the host kernel and cannot be torn down or replaced as this would defeat the integrity properies which pKVM aims to provide. Furthermore, the ABI between the host and EL2 is flexible and private to whatever the current implementation of KVM requires and so booting a new kernel with an old EL2 component is very likely to end in disaster. In preparation for uninstalling the hyp stub calls which are relied upon to reset EL2, disable kexec and hibernation in the host when protected KVM is enabled. Cc: Marc Zyngier <maz@kernel.org> Cc: Quentin Perret <qperret@google.com> Signed-off-by: Will Deacon <will@kernel.org> Signed-off-by: Marc Zyngier <maz@kernel.org> Link: https://lore.kernel.org/r/20211008135839.1193-3-will@kernel.org
Diffstat (limited to 'arch/arm64/kernel/smp.c')
-rw-r--r--arch/arm64/kernel/smp.c3
1 files changed, 2 insertions, 1 deletions
diff --git a/arch/arm64/kernel/smp.c b/arch/arm64/kernel/smp.c
index 6f6ff072acbd..44369b99a57e 100644
--- a/arch/arm64/kernel/smp.c
+++ b/arch/arm64/kernel/smp.c
@@ -1128,5 +1128,6 @@ bool cpus_are_stuck_in_kernel(void)
{
bool smp_spin_tables = (num_possible_cpus() > 1 && !have_cpu_die());
- return !!cpus_stuck_in_kernel || smp_spin_tables;
+ return !!cpus_stuck_in_kernel || smp_spin_tables ||
+ is_protected_kvm_enabled();
}