There is currently no way to disable nVHE ASLR, e.g. for debugging, so the first patch in this series makes it conditional on RANDOMIZE_BASE, same as KASLR. Note that the 'nokaslr' command line flag has no effect here. Second patch unifies the HARDEN_EL2_VECTORS errate for A57 and A72 behind the same Kconfig for simplicity. Happy to make it just depend on RANDOMIZE_BASE if having an option to keep randomization on but hardenning off is preferred. David Brazdil (2): KVM: arm64: Make nVHE ASLR conditional on RANDOMIZE_BASE KVM: arm64: Substitute RANDOMIZE_BASE for HARDEN_EL2_VECTORS arch/arm64/Kconfig | 16 ---------------- arch/arm64/include/asm/mmu.h | 6 ++---- arch/arm64/kernel/cpu_errata.c | 4 ++-- arch/arm64/kvm/Kconfig | 2 +- arch/arm64/kvm/va_layout.c | 2 +- 5 files changed, 6 insertions(+), 24 deletions(-) -- 2.27.0 _______________________________________________ kvmarm mailing list kvmarm@xxxxxxxxxxxxxxxxxxxxx https://lists.cs.columbia.edu/mailman/listinfo/kvmarm