Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp2063414pxb; Fri, 29 Jan 2021 12:05:28 -0800 (PST) X-Google-Smtp-Source: ABdhPJzLH6rWbMdXTgdewdwG90SuMHr7kZQtrB3VnHOEKmCvYz3rOYE7sLJbQAP8wV09k/4QIqZX X-Received: by 2002:a05:6402:1549:: with SMTP id p9mr7188455edx.387.1611950728316; Fri, 29 Jan 2021 12:05:28 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1611950728; cv=none; d=google.com; s=arc-20160816; b=pxprz4SR8XtKwU9G4BzLJkJJ5hiL4gmPj0Pii6wdNQ9lJO5JkEKNkCIKDv2Lshc8Cy IVPQCCieZQbGCWGq2C2Ob8feCP7wt2lllLxTgV96klt/CMSUUQD8f4Vekx6R/Znger5b Tz2WGdKU1dKYS78bstAfVWe7TeGV8fJqj5hNVaPOLmz4vchEw92Il6KItTTSj6brn2xj CJD4DjNqTNm0h5Bx0itwk/S7bQ8LBd+5JGy3IhARdifnhFWn9JHTpNd/8h7G7MFJeKfi ngAVZCjsp1zbAGzry5B0ZHbDf8CKOKyCyFZs9yW3iAAcND9dU3UDrYSfBZJcl6ijRPq+ PWUA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :to:subject:ironport-sdr:ironport-sdr; bh=DuegbcFO0y4z92+u5RC0zj88RMJPatybKRu58CgAC+o=; b=iq5EEhFwmtgzxctYISzVO9fmCw6X+z5wzEy8YlMhHIvJkOjI6xKl+E79GWb/qZ1ngd V85zebOlthz/MV0rFUXj59tqwzruSOpPD+goBI9jXmSuTSpNuM8VlMKEX9jkzTrNL3GG avaejnJL3uuMOW+5pqLHb8Xjm1TnjXlMbSGKdV/XOMMgBX0lis9GBghwOEi1GEFl+is4 Ae70xiG0Ost/+crqfX30zg0QVFxTmrAOJ/KU65SFrKyiVn0W+cCL1JcR00ajqIvHckzd AwmiwEVlczzvAhBfqv1NT530iiR/Iqz+y+Zwfba3fQjPtNtqAavRYCfppOXJOTCX/8Hz tSjA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id gw2si5602157ejb.264.2021.01.29.12.05.03; Fri, 29 Jan 2021 12:05:28 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233132AbhA2UDN (ORCPT + 99 others); Fri, 29 Jan 2021 15:03:13 -0500 Received: from mga04.intel.com ([192.55.52.120]:19665 "EHLO mga04.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233182AbhA2UCB (ORCPT ); Fri, 29 Jan 2021 15:02:01 -0500 IronPort-SDR: nl1VEiwq3vgV+9YCdwMvy2DbTvzqgHTJaJEIDJkKVoXm270/sc3/92M+OHuiA3LrnHYnOKPOX7 PvrD7Xxryp6w== X-IronPort-AV: E=McAfee;i="6000,8403,9879"; a="177914146" X-IronPort-AV: E=Sophos;i="5.79,386,1602572400"; d="scan'208";a="177914146" Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by fmsmga104.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 29 Jan 2021 12:00:47 -0800 IronPort-SDR: c7w6gyxKcP32QMKgbQ7rCeCI3Gb7MxoZ3Mm5vf3g4Ta9XgJrcK7IZMEbWhNDXUP1fAoMRpPJG/ 9+qDpl84HO3Q== X-IronPort-AV: E=Sophos;i="5.79,386,1602572400"; d="scan'208";a="410850563" Received: from yyu32-mobl1.amr.corp.intel.com (HELO [10.212.73.214]) ([10.212.73.214]) by fmsmga002-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 29 Jan 2021 12:00:46 -0800 Subject: Re: [PATCH v18 02/25] x86/cet/shstk: Add Kconfig option for user-mode control-flow protection To: Dave Hansen , x86@kernel.org, "H. Peter Anvin" , Thomas Gleixner , Ingo Molnar , linux-kernel@vger.kernel.org, linux-doc@vger.kernel.org, linux-mm@kvack.org, linux-arch@vger.kernel.org, linux-api@vger.kernel.org, Arnd Bergmann , Andy Lutomirski , Balbir Singh , Borislav Petkov , Cyrill Gorcunov , Dave Hansen , Eugene Syromiatnikov , Florian Weimer , "H.J. Lu" , Jann Horn , Jonathan Corbet , Kees Cook , Mike Kravetz , Nadav Amit , Oleg Nesterov , Pavel Machek , Peter Zijlstra , Randy Dunlap , "Ravi V. Shankar" , Vedvyas Shanbhogue , Dave Martin , Weijiang Yang , Pengfei Xu References: <20210127212524.10188-1-yu-cheng.yu@intel.com> <20210127212524.10188-3-yu-cheng.yu@intel.com> <40a5a9b5-9c83-473d-5f62-a16ecde50f2a@intel.com> From: "Yu, Yu-cheng" Message-ID: <636174be-d49a-55bc-b996-79c7df9d5f1d@intel.com> Date: Fri, 29 Jan 2021 12:00:46 -0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101 Thunderbird/78.7.0 MIME-Version: 1.0 In-Reply-To: <40a5a9b5-9c83-473d-5f62-a16ecde50f2a@intel.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 1/29/2021 11:42 AM, Dave Hansen wrote: > On 1/27/21 1:25 PM, Yu-cheng Yu wrote: >> + help >> + Control-flow protection is a hardware security hardening feature >> + that detects function-return address or jump target changes by >> + malicious code. > > It's not really one feature. I also think it's not worth talking about > shadow stacks or indirect branch tracking in *here*. Leave that for > Documentation/. > > Just say: > > Control-flow protection is a set of hardware features which > place additional restrictions on indirect branches. These help > mitigate ROP attacks. > > ... and add more in the IBT patches. > >> Applications must be enabled to use it, and old >> + userspace does not get protection "for free". >> + Support for this feature is present on processors released in >> + 2020 or later. Enabling this feature increases kernel text size >> + by 3.7 KB. > > Did any CPUs ever get released that have this? If so, name them. If > not, time to change this to 2021, I think. > Ok. I will update this. Yu-cheng