[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <accc21e9-f987-7244-b10a-a01842a3da3c@codeaurora.org>
Date: Tue, 26 Jan 2021 12:30:51 -0800
From: Srinivas Ramana <sramana@...eaurora.org>
To: Catalin Marinas <catalin.marinas@....com>,
Marc Zyngier <maz@...nel.org>
Cc: linux-arm-kernel@...ts.infradead.org, kvmarm@...ts.cs.columbia.edu,
linux-kernel@...r.kernel.org, Will Deacon <will@...nel.org>,
Mark Rutland <mark.rutland@....com>,
David Brazdil <dbrazdil@...gle.com>,
Alexandru Elisei <alexandru.elisei@....com>,
Ard Biesheuvel <ardb@...nel.org>,
Jing Zhang <jingzhangos@...gle.com>,
Ajay Patil <pajay@....qualcomm.com>,
Prasad Sodagudi <psodagud@...eaurora.org>,
James Morse <james.morse@....com>,
Julien Thierry <julien.thierry.kdev@...il.com>,
Suzuki K Poulose <suzuki.poulose@....com>,
kernel-team@...roid.com
Subject: Re: [PATCH v4 21/21] arm64: cpufeatures: Allow disabling of Pointer
Auth from the command-line
Hi Marc,
On 1/23/2021 6:28 AM, Catalin Marinas wrote:
> On Mon, Jan 18, 2021 at 09:45:33AM +0000, Marc Zyngier wrote:
>> In order to be able to disable Pointer Authentication at runtime,
>> whether it is for testing purposes, or to work around HW issues,
>> let's add support for overriding the ID_AA64ISAR1_EL1.{GPI,GPA,API,APA}
>> fields.
>>
>> This is further mapped on the arm64.nopauth command-line alias.
>>
>> Signed-off-by: Marc Zyngier <maz@...nel.org>
> Reviewed-by: Catalin Marinas <catalin.marinas@....com>
Verified this Series for PAC control feature from command line. with
arm64.nopauth, we could see PAUTH is disabled on both primary and
secondary cores as expected.
HWCAPs show no PAC support and kernel instructions are being treated as
NOPs.
Tested-by: Srinivas Ramana <sramana@...eaurora.org>
Powered by blists - more mailing lists