ANDROID: KVM: arm64: Force injection of a data abort on NISV MMIO exit
If a vcpu exits for a data abort with an invalid syndrome, the expectations are that userspace has a chance to save the day if it has requested to see such exits. However, this is completely futile in the case of a protected VM, as none of the state is available. In this particular case, inject a data abort directly into the vcpu, consistent with what userspace could do. This also helps with pKVM, which discards all syndrome information when forwarding data aborts that are not known to be MMIO. Finally, hide the RETURN_NISV_IO_ABORT_TO_USER cap from userspace on protected VMs, and document this tweak to the API. Signed-off-by:Marc Zyngier <maz@kernel.org> Signed-off-by:
Will Deacon <willdeacon@google.com> Bug: 233587962 Change-Id: Ie081cf0b2fdd1ab374d479e3e355ab3cb536c960
Loading
Please sign in to comment