You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Right now, bhyve can use an ioctl to set the guest's PC to any address, with bounds inherited from the GVA root capability. This should be reworked to ensure that existing bounds are respected. In particular, I think vmm should do the following:
During guest creation, initialize each vcpu's nextpc to a copy of the GVA root cap.
Require the caller of VM_SET_REGISTER to provide an untagged capability which can be derived from the current nextpc value. This should be enough to let bhyve set nextpc before initial execution of guest code.
Optionally provide a mechanism to override this restriction, following, e.g., security.cheri.ptrace_caps.
The text was updated successfully, but these errors were encountered:
Right now, bhyve can use an ioctl to set the guest's PC to any address, with bounds inherited from the GVA root capability. This should be reworked to ensure that existing bounds are respected. In particular, I think vmm should do the following:
nextpc
to a copy of the GVA root cap.VM_SET_REGISTER
to provide an untagged capability which can be derived from the currentnextpc
value. This should be enough to let bhyve setnextpc
before initial execution of guest code.security.cheri.ptrace_caps
.The text was updated successfully, but these errors were encountered: