From: Mathias Krause <minipli@grsecurity.net>
To: "Edgecombe, Rick P" <rick.p.edgecombe@intel.com>,
"Hansen, Dave" <dave.hansen@intel.com>,
"x86@kernel.org" <x86@kernel.org>,
"dave.hansen@linux.intel.com" <dave.hansen@linux.intel.com>,
"peterz@infradead.org" <peterz@infradead.org>,
"bp@alien8.de" <bp@alien8.de>,
"mingo@redhat.com" <mingo@redhat.com>,
"tglx@kernel.org" <tglx@kernel.org>
Cc: "linux-kernel@vger.kernel.org" <linux-kernel@vger.kernel.org>,
"Gao, Chao" <chao.gao@intel.com>,
Paolo Bonzini <pbonzini@redhat.com>
Subject: Re: [PATCH v2] x86/shstk: Provide kernel command line knob to disable
Date: Wed, 13 May 2026 22:51:37 +0200 [thread overview]
Message-ID: <ffd85a09-5db8-4e5c-b0c2-8bf2664464a1@grsecurity.net> (raw)
In-Reply-To: <f1350b1d06d42978b2f9194259585ca16631e55c.camel@intel.com>
On 08.05.26 18:35, Edgecombe, Rick P wrote:
> On Fri, 2026-05-08 at 09:23 +0200, Mathias Krause wrote:
>>> Now that KVM uses this this feature independently of X86_FEATURE_USER_SHSTK,
>>> it might be good to have the plain HW shstk feature exposed for just normal
>>> runtime user use. (+Chao, for KVM CET)
>>
>> But that sounds more like having the need for an official chicken bit,
>> like I was proposing, no? Using 'clearcpuid=shstk' as a workaround for
>> whatever KVM bugs, similar in spirit to 'nousershstk', but without the
>> kernel taint?
>
> For users to turn off shadow stack for guests? You can do this via the KVM API
> in the normal way you customize guests.
https://git.kernel.org/linus/2d5d3fc593c9b7e41bee86175d7b9e11f470072e
Oh, well....
next prev parent reply other threads:[~2026-05-13 20:51 UTC|newest]
Thread overview: 11+ messages / expand[flat|nested] mbox.gz Atom feed top
[not found] <20260402173606.1096172-1-minipli@grsecurity.net>
[not found] ` <3d7c8d26-558d-40ef-9ad9-3a5100eed9e5@grsecurity.net>
2026-05-06 19:03 ` [PATCH v2] x86/shstk: Provide kernel command line knob to disable Dave Hansen
2026-05-06 22:45 ` Edgecombe, Rick P
2026-05-07 13:39 ` Mathias Krause
2026-05-07 19:53 ` Edgecombe, Rick P
2026-05-08 7:23 ` Mathias Krause
2026-05-08 16:34 ` Dave Hansen
2026-05-11 5:04 ` Mathias Krause
2026-05-08 16:35 ` Edgecombe, Rick P
2026-05-13 20:51 ` Mathias Krause [this message]
2026-05-14 0:31 ` Edgecombe, Rick P
2026-05-14 16:14 ` Mathias Krause
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=ffd85a09-5db8-4e5c-b0c2-8bf2664464a1@grsecurity.net \
--to=minipli@grsecurity.net \
--cc=bp@alien8.de \
--cc=chao.gao@intel.com \
--cc=dave.hansen@intel.com \
--cc=dave.hansen@linux.intel.com \
--cc=linux-kernel@vger.kernel.org \
--cc=mingo@redhat.com \
--cc=pbonzini@redhat.com \
--cc=peterz@infradead.org \
--cc=rick.p.edgecombe@intel.com \
--cc=tglx@kernel.org \
--cc=x86@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox