[PATCH v3 3/3] arm64: kprobe: disable probe of fault prone ptrauth instruction

Amit Daniel Kachhap amit.kachhap at arm.com
Tue Jun 23 09:17:49 EDT 2020



On 6/22/20 8:10 PM, Dave Martin wrote:
> On Thu, Jun 18, 2020 at 10:40:29AM +0530, Amit Daniel Kachhap wrote:
>> This patch disables the probing of authenticate ptrauth instruction (AUT*)
>> which falls under the hint instructions region. This is done to disallow
>> probe of authenticate instruction which may lead to ptrauth faults with the
>> addition of Armv8.6 enhanced ptrauth features.
>>
>> The corresponding append pac ptrauth instruction (PAC*) is not disabled
>> and they can still be probed.
> 
> Seems sensible.  Might be worth noting here why we think this is
> reasonable: AUT* instructions make no sense at function entry points,
> so most realistic probes would be unaffected by this change.

Ok sure it make sense to add these details. Thanks for pointing this out.

> 
> Since stepping on older hardware is safe, we could make this conditional
> based on cpufeatures.  It hardly seems worth it, though.

Yes agreed.

> 
>> Signed-off-by: Amit Daniel Kachhap <amit.kachhap at arm.com>
>> ---

>>   
>>   		/*
>> -		 * The HINT instruction is is problematic when single-stepping,
>> +		 * The HINT instruction is problematic when single-stepping,
> 
> Nit: doesn't matter too much, but ideally this should be a separate
> patch (or just don't bother).

ok.

> 
> Cheers
> ---Dave
> 



More information about the linux-arm-kernel mailing list