ANDROID: KVM: arm64: Inject SIGSEGV on illegal accesses
The pKVM hypervisor will currently panic if the host tries to access memory that it doesn't own (e.g. protected guest memory). Sadly, as guest memory can still be mapped into the VMM's address space, userspace can trivially crash the kernel/hypervisor by poking into guest memory. To prevent this, inject the abort back in the host with S1PTW set in the ESR, hence allowing the host to differentiate this abort from normal userspace faults and inject a SIGSEGV cleanly. Signed-off-by:Quentin Perret <qperret@google.com> Signed-off-by:
Will Deacon <willdeacon@google.com> Bug: 233587962 Change-Id: I09ee54fbf4c202dc3ac2e1b5eea264d4dc84f613
Loading
Please sign in to comment