From mboxrd@z Thu Jan 1 00:00:00 1970 From: Balbir Singh Subject: Re: [RFC PATCH v3 00/24] Control Flow Enforcement: Shadow Stack Date: Sun, 2 Sep 2018 18:13:50 +1000 Message-ID: <20180902081350.GF28695@350D> References: <20180830143904.3168-1-yu-cheng.yu@intel.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Return-path: Content-Disposition: inline In-Reply-To: <20180830143904.3168-1-yu-cheng.yu@intel.com> Sender: linux-kernel-owner@vger.kernel.org To: Yu-cheng Yu Cc: x86@kernel.org, "H. Peter Anvin" , Thomas Gleixner , Ingo Molnar , linux-kernel@vger.kernel.org, linux-doc@vger.kernel.org, linux-mm@kvack.org, linux-arch@vger.kernel.org, linux-api@vger.kernel.org, Arnd Bergmann , Andy Lutomirski , Cyrill Gorcunov , Dave Hansen , Florian Weimer , "H.J. Lu" , Jann Horn , Jonathan Corbet , Kees Cook , Mike Kravetz , Nadav Amit , Oleg Nesterov , Pavel Machek , Peter Zijlstra , Ravi V. Sha List-Id: linux-arch.vger.kernel.org On Thu, Aug 30, 2018 at 07:38:40AM -0700, Yu-cheng Yu wrote: > The previous version of CET patches can be found in the following > link. > > https://lkml.org/lkml/2018/7/10/1031 > > Summary of changes from v2: > > Move Shadow Stack page fault handling logic to arch/x86. > Update can_follow_write_pte/pmd; move logic to arch/x86. > Fix problems in WRUSS in-line assembly. > Fix issues in ELF parser. > Split out IBT/PTRACE patches to a second set. > Other small fixes. > Quick question -- is there a simulator or some other way you've been testing this? Just curious, if it's possible to run these patches or just a review and internal hardware/simulator where they are run and posted Balbir Singh. From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-pf1-f196.google.com ([209.85.210.196]:42240 "EHLO mail-pf1-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726003AbeIBM2t (ORCPT ); Sun, 2 Sep 2018 08:28:49 -0400 Date: Sun, 2 Sep 2018 18:13:50 +1000 From: Balbir Singh Subject: Re: [RFC PATCH v3 00/24] Control Flow Enforcement: Shadow Stack Message-ID: <20180902081350.GF28695@350D> References: <20180830143904.3168-1-yu-cheng.yu@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180830143904.3168-1-yu-cheng.yu@intel.com> Sender: linux-arch-owner@vger.kernel.org List-ID: To: Yu-cheng Yu Cc: x86@kernel.org, "H. Peter Anvin" , Thomas Gleixner , Ingo Molnar , linux-kernel@vger.kernel.org, linux-doc@vger.kernel.org, linux-mm@kvack.org, linux-arch@vger.kernel.org, linux-api@vger.kernel.org, Arnd Bergmann , Andy Lutomirski , Cyrill Gorcunov , Dave Hansen , Florian Weimer , "H.J. Lu" , Jann Horn , Jonathan Corbet , Kees Cook , Mike Kravetz , Nadav Amit , Oleg Nesterov , Pavel Machek , Peter Zijlstra , "Ravi V. Shankar" , Vedvyas Shanbhogue Message-ID: <20180902081350.NXi8JwlHwQ-5VBs4gr6qDzWGWQ4FvlSJLxsuqClbrd0@z> On Thu, Aug 30, 2018 at 07:38:40AM -0700, Yu-cheng Yu wrote: > The previous version of CET patches can be found in the following > link. > > https://lkml.org/lkml/2018/7/10/1031 > > Summary of changes from v2: > > Move Shadow Stack page fault handling logic to arch/x86. > Update can_follow_write_pte/pmd; move logic to arch/x86. > Fix problems in WRUSS in-line assembly. > Fix issues in ELF parser. > Split out IBT/PTRACE patches to a second set. > Other small fixes. > Quick question -- is there a simulator or some other way you've been testing this? Just curious, if it's possible to run these patches or just a review and internal hardware/simulator where they are run and posted Balbir Singh.