diff options
| author | Thomas Gleixner <[email protected]> | 2020-04-10 11:54:00 +0000 |
|---|---|---|
| committer | Borislav Petkov <[email protected]> | 2020-04-11 14:39:30 +0000 |
| commit | d7e94dbdac1a40924626b0efc7ff530c8baf5e4a (patch) | |
| tree | 7e41876bdd753a6e9b0e6911cb03bcee99a1c320 /scripts/gcc-plugins/gcc-common.h | |
| parent | Merge branch 'akpm' (patches from Andrew) (diff) | |
| download | kernel-d7e94dbdac1a40924626b0efc7ff530c8baf5e4a.tar.gz kernel-d7e94dbdac1a40924626b0efc7ff530c8baf5e4a.zip | |
x86/split_lock: Provide handle_guest_split_lock()
Without at least minimal handling for split lock detection induced #AC,
VMX will just run into the same problem as the VMWare hypervisor, which
was reported by Kenneth.
It will inject the #AC blindly into the guest whether the guest is
prepared or not.
Provide a function for guest mode which acts depending on the host
SLD mode. If mode == sld_warn, treat it like user space, i.e. emit a
warning, disable SLD and mark the task accordingly. Otherwise force
SIGBUS.
[ bp: Add a !CPU_SUP_INTEL stub for handle_guest_split_lock(). ]
Signed-off-by: Thomas Gleixner <[email protected]>
Signed-off-by: Borislav Petkov <[email protected]>
Acked-by: Paolo Bonzini <[email protected]>
Link: https://lkml.kernel.org/r/[email protected]
Link: https://lkml.kernel.org/r/[email protected]
Diffstat (limited to 'scripts/gcc-plugins/gcc-common.h')
0 files changed, 0 insertions, 0 deletions
