diff options
author | Marc Zyngier <marc.zyngier@arm.com> | 2016-10-20 10:17:21 +0100 |
---|---|---|
committer | Marc Zyngier <marc.zyngier@arm.com> | 2016-10-21 17:26:24 +0100 |
commit | c8ea0395ff3bd5f0fd3c3aa69b383b2d1231e9fd (patch) | |
tree | f64affb3f4bdcf8740d4bc65c7c1ea1239002a35 /lib/stmp_device.c | |
parent | 60e21a0ef54cd836b9eb22c7cb396989b5b11648 (diff) | |
download | linux-c8ea0395ff3bd5f0fd3c3aa69b383b2d1231e9fd.tar.gz linux-c8ea0395ff3bd5f0fd3c3aa69b383b2d1231e9fd.tar.xz |
arm/arm64: KVM: Map the BSS at HYP
When used with a compiler that doesn't implement "asm goto"
(such as the AArch64 port of GCC 4.8), jump labels generate a
memory access to find out about the value of the key (instead
of just patching the code). The key itself is likely to be
stored in the BSS.
This is perfectly fine, except that we don't map the BSS at HYP,
leading to an exploding kernel at the first access. The obvious
fix is simply to map the BSS there (which should have been done
a long while ago, but hey...).
Reported-by: Eric Auger <eric.auger@redhat.com>
Tested-by: Eric Auger <eric.auger@redhat.com>
Signed-off-by: Marc Zyngier <marc.zyngier@arm.com>
Diffstat (limited to 'lib/stmp_device.c')
0 files changed, 0 insertions, 0 deletions