Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp4596455imm; Mon, 25 Jun 2018 19:47:17 -0700 (PDT) X-Google-Smtp-Source: ADUXVKKBnAcgdXGQJIKLx7w/XYe5+D1JZFWxUZM5h1RgITtX3HT3Ze1ZQk6oSnUA3p8dYysaMFGg X-Received: by 2002:a17:902:d209:: with SMTP id t9-v6mr10148226ply.63.1529981237637; Mon, 25 Jun 2018 19:47:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1529981237; cv=none; d=google.com; s=arc-20160816; b=U4OSjFntbEGTDhA8hfdIeV5N6BETFtP18pr7nN52+732a1Kq2i+qgLzMoy4L+GWLPb 7aDZMK5JYddYga5yR5QxWreTuZ8fD3SLIp21aa1fGYkt62dlY03VDFOtlIOxwl2M+XYT Y/s61DY3AfFkY0wmJVrVnfx3Az8IgQ97hQtrmzjgdodP302iWu/3YdYjAxJtiD0YSeoT SyIMYFC6cVK8IDIRsPubITyYAOUqeXEvIjtI4d1Lmxq8LY4Uka79f4BfHx5VhxJZwhc0 rJQw+NDbGE0cVRp7Cg62an9AcxM5pjDcbXfgyOra22NLPTY2lbiXy/3Czs//Kk+eQwnQ LaKg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature :arc-authentication-results; bh=OzBmhIJfAsVeBzxgrm8gIPWnnYbiLu0ldeO1S5DsT2E=; b=VFRGhkOjj61mdDXC4YMbyPUgMtMVlSuiHnP5iotrZpJSOGa2nPGdL8oglIpuaKxPpS GsceNsLv58bIhwmdPp68ByTA1F8370J4neXEu2zCFt7jn+KjDgL5LqZiOTnk0mniBHYi a3mHy/7RgkwWTYrwUZlwYRqqpwinYnxgNDf+xt8T1pcssa6ul9xXKtRk/9DWEPjYNyiU fdHUBTpPkNQ+NTDvoUrVEB3KSLOuNCIPpnhgIWXvC6pfeAAkyWhAvpJqVEduyG8kFbQo ksAUtItZ4JA5jlEr5/kgiHMGcHp9EgSExpoVrIoRdlBRwSNJEeWnArU6VFB03i4K7/Fn a/ag== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b="ofZmo0/v"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k30-v6si469773pgf.415.2018.06.25.19.47.02; Mon, 25 Jun 2018 19:47:17 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b="ofZmo0/v"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755875AbeFZCqX (ORCPT + 99 others); Mon, 25 Jun 2018 22:46:23 -0400 Received: from mail-oi0-f66.google.com ([209.85.218.66]:41498 "EHLO mail-oi0-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755848AbeFZCqV (ORCPT ); Mon, 25 Jun 2018 22:46:21 -0400 Received: by mail-oi0-f66.google.com with SMTP id 21-v6so3870655oip.8 for ; Mon, 25 Jun 2018 19:46:21 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=OzBmhIJfAsVeBzxgrm8gIPWnnYbiLu0ldeO1S5DsT2E=; b=ofZmo0/voErzFZ3IpaK5RMnKcZRmY5BYUFmXeR2F9pDttZGjfViZE4pupYv5oPbi1I 1TgK8pM4R9U4aaEr14d1GKOuEz1lnC64/WdCr2jCEnZHt64nLhENiF/ekX1bLxOxO4bb 49SLBofHeVK8vAbzArMxl0vwQXdzG5YGmxA3vmoIJ1Bms3FkMGYvnBv4/btAcdq3sceK xA2a2x64p8xuAY7vJi0XCHzQzg2CQyOIFC45tUKHRBgzetBv4nZnaZLLiICK5xuSjHqN 6H3yF7I21p5x8JpVeetDViSoy2US5W7AccZdwrHxW1aIT2QZJCFQOyxJytCeetvrkA8m UjSA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=OzBmhIJfAsVeBzxgrm8gIPWnnYbiLu0ldeO1S5DsT2E=; b=Klaqrbm8PBG42wTYcriGg7KaqvXbzIWrfM3YpxNIDmmZFF+6FK6OXnrb9KvIg29HCe ktOQ0yg3l7Z4sh2YlNlfBIsiFbIEirAGQnF/OeCOFkLimWtNbg9boOJZqx8rvIH06cBB aEE9KC59SZRpeUfcsGvfTYAyH9Q/0OLoQbU/93orsmD7DmwwtXDc4Ex4a7LHPdKSznZ2 CShCBHfI9ENp84uCjdlkcr5ml3te7RCdnnggAl6Oy7VwRzZJHYq440F6RwAupVlRCelv ZNUnuTLsNk9XvBqe2UDsAG1RbelPTmXffBp+Vnalr4ZDVPclumKJIM/4kZ1msYJPgSSE 333A== X-Gm-Message-State: APt69E3Vc3Bjai6tjG0V52nP7DEoz+QXISq3edEz2SVqk2ewPzUsxHBT IftqzqBY6aW6m6YrF3vJd12xsabKuatexxmi0mrAZZ0S X-Received: by 2002:aca:5bd5:: with SMTP id p204-v6mr8848946oib.91.1529981180502; Mon, 25 Jun 2018 19:46:20 -0700 (PDT) MIME-Version: 1.0 References: <20180607143807.3611-1-yu-cheng.yu@intel.com> In-Reply-To: <20180607143807.3611-1-yu-cheng.yu@intel.com> From: Jann Horn Date: Tue, 26 Jun 2018 04:46:08 +0200 Message-ID: Subject: Re: [PATCH 00/10] Control Flow Enforcement - Part (3) To: yu-cheng.yu@intel.com Cc: kernel list , linux-doc@vger.kernel.org, Linux-MM , linux-arch , "the arch/x86 maintainers" , "H . Peter Anvin" , Thomas Gleixner , Ingo Molnar , hjl.tools@gmail.com, vedvyas.shanbhogue@intel.com, ravi.v.shankar@intel.com, Dave Hansen , Andy Lutomirski , Jonathan Corbet , Oleg Nesterov , Arnd Bergmann , Mike Kravetz Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Jun 26, 2018 at 4:45 AM Yu-cheng Yu wrote: > > This series introduces CET - Shadow stack > > At the high level, shadow stack is: > > Allocated from a task's address space with vm_flags VM_SHSTK; > Its PTEs must be read-only and dirty; > Fixed sized, but the default size can be changed by sys admin. > > For a forked child, the shadow stack is duplicated when the next > shadow stack access takes place. > > For a pthread child, a new shadow stack is allocated. > > The signal handler uses the same shadow stack as the main program. > > Yu-cheng Yu (10): > x86/cet: User-mode shadow stack support > x86/cet: Introduce WRUSS instruction > x86/cet: Signal handling for shadow stack > x86/cet: Handle thread shadow stack > x86/cet: ELF header parsing of Control Flow Enforcement > x86/cet: Add arch_prctl functions for shadow stack > mm: Prevent mprotect from changing shadow stack > mm: Prevent mremap of shadow stack > mm: Prevent madvise from changing shadow stack > mm: Prevent munmap and remap_file_pages of shadow stack Shouldn't patches like these be CC'ed to linux-api@vger.kernel.org?