Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp2648788imm; Tue, 4 Sep 2018 07:54:10 -0700 (PDT) X-Google-Smtp-Source: ANB0VdYxsIJGTOWFPGXmb6UGSTuxhVIjNSm92N2GVsZsUfriLSuN9ohA+shFTgWYQxF0qUQmBQBU X-Received: by 2002:a62:1544:: with SMTP id 65-v6mr34987066pfv.178.1536072850064; Tue, 04 Sep 2018 07:54:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1536072850; cv=none; d=google.com; s=arc-20160816; b=SqzPbJ//UaWOXcuycSeU9T3t3/2Udgg223YQRkpQda7PLHjLmkolYAI3VyM4O6EJoo pEG1oN1MKmtHaYOrdxdpVjlGBiFd+N8dymAIVevIL1hlxNwQo4ujBnsl12pFUAEFgPwL 3ukuk105yBDH5XNs62SZsquqgTeVnbw/dyzZkt/UsUCHHEtU9iBHKkz+aIPSu6G7Xq51 tqy2i4hJgRdEsUtB0if9tnw3e4j17pAE/IE0UyO5e4xlMODMJemcGg8L8rlyR8v5kJyc 119ldystLJx1d7a0NxhwIPz8VcoWa+l300X1Tbob9waKEDHLKF8O1ZgmC6F5Fs1mfWfH cVJw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:date:cc:to:from:subject:message-id :arc-authentication-results; bh=P+AjF4VIUCIetc1KIl0QP1/lLjAi94xb1UP6f/TUqSk=; b=O6Hpp/C4+h06FJstBSGqlRzlTEY8qorjfzgRzpv0YAdoNn/lurzJt1BhQDewxjUoKd kyN3gyLJCG99/Dv1QTbIsaiX+Sqw9FQbdHm4pEIt6W4Nvsr88Bs7wY5FQU1ZL1ZB86NN cuqtoSIjrhMmOvoAKeMy++RZ1qRU+YvikUXGgiAUb0Eo+p0t9Lb5rHzAaoNgfpU+C7oR b8cyGyNB40qGCpw/4t01DBMTUc6UUDob4LLfrhAir2GnffiY0717bi+a4sBoKBjXqGDl ef0V+1QSr4xcoybroLcUvqErLvNcznOuZy2lyPIZQwWlU+HvcTBq5OkjJozNb8sjbVh0 kttQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y2-v6si20466545pli.100.2018.09.04.07.53.54; Tue, 04 Sep 2018 07:54:09 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727429AbeIDTRr (ORCPT + 99 others); Tue, 4 Sep 2018 15:17:47 -0400 Received: from mga14.intel.com ([192.55.52.115]:41307 "EHLO mga14.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726304AbeIDTRq (ORCPT ); Tue, 4 Sep 2018 15:17:46 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by fmsmga103.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 04 Sep 2018 07:52:21 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.53,329,1531810800"; d="scan'208";a="77873416" Received: from unknown (HELO [143.183.136.146]) ([143.183.136.146]) by FMSMGA003.fm.intel.com with ESMTP; 04 Sep 2018 07:52:21 -0700 Message-ID: <1536072478.12366.2.camel@intel.com> Subject: Re: [RFC PATCH v3 00/24] Control Flow Enforcement: Shadow Stack From: Yu-cheng Yu To: Balbir Singh Cc: x86@kernel.org, "H. Peter Anvin" , Thomas Gleixner , Ingo Molnar , linux-kernel@vger.kernel.org, linux-doc@vger.kernel.org, linux-mm@kvack.org, linux-arch@vger.kernel.org, linux-api@vger.kernel.org, Arnd Bergmann , Andy Lutomirski , Cyrill Gorcunov , Dave Hansen , Florian Weimer , "H.J. Lu" , Jann Horn , Jonathan Corbet , Kees Cook , Mike Kravetz , Nadav Amit , Oleg Nesterov , Pavel Machek , Peter Zijlstra , "Ravi V. Shankar" , Vedvyas Shanbhogue Date: Tue, 04 Sep 2018 07:47:58 -0700 In-Reply-To: <20180902081350.GF28695@350D> References: <20180830143904.3168-1-yu-cheng.yu@intel.com> <20180902081350.GF28695@350D> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.18.5.2-0ubuntu3.2 Mime-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, 2018-09-02 at 18:13 +1000, Balbir Singh wrote: > On Thu, Aug 30, 2018 at 07:38:40AM -0700, Yu-cheng Yu wrote: > > > > The previous version of CET patches can be found in the following > > link. > > > >   https://lkml.org/lkml/2018/7/10/1031 > > > > Summary of changes from v2: > > > >   Move Shadow Stack page fault handling logic to arch/x86. > >   Update can_follow_write_pte/pmd; move logic to arch/x86. > >   Fix problems in WRUSS in-line assembly. > >   Fix issues in ELF parser. > >   Split out IBT/PTRACE patches to a second set. > >   Other small fixes. > > > Quick question -- is there a simulator or some other way you've > been testing this? Just curious, if it's possible to run these > patches or just a review and internal hardware/simulator where > they are run and posted > > Balbir Singh. Currently only for review. Yu-cheng