summary refs log tree commit diff
path: root/security
diff options
context:
space:
mode:
authorMark Rutland <mark.rutland@arm.com>2018-12-07 18:39:22 +0000
committerWill Deacon <will.deacon@arm.com>2018-12-13 16:42:46 +0000
commita1ee8abb95c55948dc187d0cccc88814841c85d2 (patch)
tree08dc11ae155959ae0a33d5980381c901e4a24981 /security
parent4eaed6aa2c628101246bcabc91b203bfac1193f8 (diff)
downloadlinux-a1ee8abb95c55948dc187d0cccc88814841c85d2.tar.gz
arm64/kvm: hide ptrauth from guests
In subsequent patches we're going to expose ptrauth to the host kernel
and userspace, but things are a bit trickier for guest kernels. For the
time being, let's hide ptrauth from KVM guests.

Regardless of how well-behaved the guest kernel is, guest userspace
could attempt to use ptrauth instructions, triggering a trap to EL2,
resulting in noise from kvm_handle_unknown_ec(). So let's write up a
handler for the PAC trap, which silently injects an UNDEF into the
guest, as if the feature were really missing.

Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
Signed-off-by: Mark Rutland <mark.rutland@arm.com>
Signed-off-by: Kristina Martsenko <kristina.martsenko@arm.com>
Reviewed-by: Andrew Jones <drjones@redhat.com>
Reviewed-by: Christoffer Dall <christoffer.dall@arm.com>
Cc: Marc Zyngier <marc.zyngier@arm.com>
Cc: kvmarm@lists.cs.columbia.edu
Signed-off-by: Will Deacon <will.deacon@arm.com>
Diffstat (limited to 'security')
0 files changed, 0 insertions, 0 deletions