From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on archive.lwn.net X-Spam-Level: X-Spam-Status: No, score=-5.4 required=5.0 tests=DKIM_ADSP_CUSTOM_MED, DKIM_SIGNED,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,RCVD_IN_DNSWL_HI, T_DKIM_INVALID autolearn=ham autolearn_force=no version=3.4.1 Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by archive.lwn.net (Postfix) with ESMTP id 4304D7D072 for ; Tue, 12 Jun 2018 10:57:22 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933279AbeFLK4z (ORCPT ); Tue, 12 Jun 2018 06:56:55 -0400 Received: from mail-pl0-f68.google.com ([209.85.160.68]:47051 "EHLO mail-pl0-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932556AbeFLK4x (ORCPT ); Tue, 12 Jun 2018 06:56:53 -0400 Received: by mail-pl0-f68.google.com with SMTP id 30-v6so14135378pld.13; Tue, 12 Jun 2018 03:56:53 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:references:from:message-id:date:user-agent:mime-version :in-reply-to:content-language:content-transfer-encoding; bh=bAQmhiG0d/rA242iDtDBG3ksrc7d9+O2dlTHEQiuaJs=; b=jLfoVfovpk0mKFMtvaEYc2nNPgyC/i9xM9U7ZZlDJ7OwOSqv4YSc6ot8hsz5+ZOHjO iJw3j3BMDt1djoBmhM2HQYLW2Ef1DpXR1svrSlVhQM/eY1cfbuwFQR1FrvS4e6CXT+WH +xDr1Pj+PywQzX2HhXENoUnf4cMWV1oPcHWwEpFOk4+5sVmze3bAanL4SgSdvLcRvicB uCLk8CouCDycIql4jS4nMGjNR2BXbIE6KABbzyPYiYlO2V0G5pGHmvbNEUHyiBAaWM2r 21tFUs8ca9T1hOoRmyw+fItgSRnVgXrvJ1+9h4lpFTRZMa+1x6X2dOie8p4qxzxmNxm0 AuKg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=bAQmhiG0d/rA242iDtDBG3ksrc7d9+O2dlTHEQiuaJs=; b=H//ESv8xoe/8SZgFGyF2zFDU9cUkCLPP1G0+NlnCM9++TwRqg1H4mkTB8Dlkn564yg VaMWIY1aBTToueQY3Tvn1jjR1uxiHRdoPrk07nkOB+XuwM7O4z2gVM4Hlce3hGMoFPja Jp7ByfzHMhIYkAigXsHdeKQ5kcvOkXpOUGa4uWTcWmqvw12hHd8UW3axfaCJD1pEd8ED DbnBajmQby2F95OxpkA4NnEnIAfi0fSPl9NzVjN6C4bu39Pl7yb65WBmktzABjxcx3W6 o9oAY+Pa+wp/r5vFuItQt2MdMMY4/TLHfgQDaFSn54/goQ5HmOnVKmaGH0eByUCjFt1P Zgew== X-Gm-Message-State: APt69E2pPN/Qgf5VXEkbIOPzrvEoQ3OXIGx5GR068sLW7AIPcTtWzLC9 vt3nDZ+zD1F9RnmJ9c1jjZU= X-Google-Smtp-Source: ADUXVKIsoP7pe/v/LuLKBO/LWOx9/x3R+oH4JuPu1SoR+AS+xe2Wuh1yjXZdNbBKjFKJHLMDht22PQ== X-Received: by 2002:a17:902:3081:: with SMTP id v1-v6mr3626488plb.266.1528801012619; Tue, 12 Jun 2018 03:56:52 -0700 (PDT) Received: from [192.168.1.11] (14-202-194-140.static.tpgi.com.au. [14.202.194.140]) by smtp.gmail.com with ESMTPSA id e68-v6sm3170674pfl.65.2018.06.12.03.56.43 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 12 Jun 2018 03:56:51 -0700 (PDT) Subject: Re: [PATCH 00/10] Control Flow Enforcement - Part (3) To: Yu-cheng Yu , linux-kernel@vger.kernel.org, linux-doc@vger.kernel.org, linux-mm@kvack.org, linux-arch@vger.kernel.org, x86@kernel.org, "H. Peter Anvin" , Thomas Gleixner , Ingo Molnar , "H.J. Lu" , Vedvyas Shanbhogue , "Ravi V. Shankar" , Dave Hansen , Andy Lutomirski , Jonathan Corbet , Oleg Nesterov , Arnd Bergmann , Mike Kravetz References: <20180607143807.3611-1-yu-cheng.yu@intel.com> From: Balbir Singh Message-ID: Date: Tue, 12 Jun 2018 20:56:30 +1000 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.8.0 MIME-Version: 1.0 In-Reply-To: <20180607143807.3611-1-yu-cheng.yu@intel.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-doc-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-doc@vger.kernel.org On 08/06/18 00:37, Yu-cheng Yu wrote: > This series introduces CET - Shadow stack > > At the high level, shadow stack is: > > Allocated from a task's address space with vm_flags VM_SHSTK; > Its PTEs must be read-only and dirty; > Fixed sized, but the default size can be changed by sys admin. > > For a forked child, the shadow stack is duplicated when the next > shadow stack access takes place. > > For a pthread child, a new shadow stack is allocated. > > The signal handler uses the same shadow stack as the main program. > Even with sigaltstack()? Balbir Singh. -- To unsubscribe from this list: send the line "unsubscribe linux-doc" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html