From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-pg0-f70.google.com (mail-pg0-f70.google.com [74.125.83.70]) by kanga.kvack.org (Postfix) with ESMTP id 83D426B0008 for ; Thu, 7 Jun 2018 10:42:31 -0400 (EDT) Received: by mail-pg0-f70.google.com with SMTP id e11-v6so3593299pgt.19 for ; Thu, 07 Jun 2018 07:42:31 -0700 (PDT) Received: from mga03.intel.com (mga03.intel.com. [134.134.136.65]) by mx.google.com with ESMTPS id l22-v6si26243115pgu.353.2018.06.07.07.42.30 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 07 Jun 2018 07:42:30 -0700 (PDT) From: Yu-cheng Yu Subject: [PATCH 0/7] Control Flow Enforcement - Part (4) Date: Thu, 7 Jun 2018 07:38:48 -0700 Message-Id: <20180607143855.3681-1-yu-cheng.yu@intel.com> Sender: owner-linux-mm@kvack.org List-ID: To: linux-kernel@vger.kernel.org, linux-doc@vger.kernel.org, linux-mm@kvack.org, linux-arch@vger.kernel.org, x86@kernel.org, "H. Peter Anvin" , Thomas Gleixner , Ingo Molnar , "H.J. Lu" , Vedvyas Shanbhogue , "Ravi V. Shankar" , Dave Hansen , Andy Lutomirski , Jonathan Corbet , Oleg Nesterov , Arnd Bergmann , Mike Kravetz Cc: Yu-cheng Yu This series introduces CET - indirect branch tracking The major task of indirect branch tracking is for the compiler to insert the ENDBR instructions at all valid branch targets. The kernel provides: CPUID enumeration and feature setup; Legacy bitmap allocation; Some basic supporting routines. In this patch, there are also a CET command-line utility and PTRACE support. H.J. Lu (2): x86: Insert endbr32/endbr64 to vDSO tools: Add cetcmd Yu-cheng Yu (5): x86/cet: Add Kconfig option for user-mode Indirect Branch Tracking x86/cet: User-mode indirect branch tracking support mm/mmap: Add IBT bitmap size to address space limit check x86/cet: add arcp_prctl functions for indirect branch tracking x86/cet: Add PTRACE interface for CET arch/x86/Kconfig | 12 +++ arch/x86/entry/vdso/.gitignore | 4 + arch/x86/entry/vdso/Makefile | 34 +++++++ arch/x86/entry/vdso/endbr.sh | 32 ++++++ arch/x86/include/asm/cet.h | 9 ++ arch/x86/include/asm/disabled-features.h | 8 +- arch/x86/include/asm/fpu/regset.h | 7 +- arch/x86/include/uapi/asm/prctl.h | 1 + arch/x86/include/uapi/asm/resource.h | 5 + arch/x86/kernel/cet.c | 73 ++++++++++++++ arch/x86/kernel/cet_prctl.c | 54 +++++++++- arch/x86/kernel/cpu/common.c | 20 +++- arch/x86/kernel/elf.c | 19 +++- arch/x86/kernel/fpu/regset.c | 41 ++++++++ arch/x86/kernel/process.c | 2 + arch/x86/kernel/ptrace.c | 16 +++ include/uapi/asm-generic/resource.h | 3 + include/uapi/linux/elf.h | 1 + mm/mmap.c | 8 +- tools/Makefile | 13 +-- tools/arch/x86/include/uapi/asm/elf_property.h | 16 +++ tools/arch/x86/include/uapi/asm/prctl.h | 33 ++++++ tools/cet/.gitignore | 1 + tools/cet/Makefile | 11 ++ tools/cet/cetcmd.c | 134 +++++++++++++++++++++++++ tools/include/uapi/asm/elf_property.h | 4 + tools/include/uapi/asm/prctl.h | 4 + 27 files changed, 549 insertions(+), 16 deletions(-) create mode 100644 arch/x86/entry/vdso/endbr.sh create mode 100644 tools/arch/x86/include/uapi/asm/elf_property.h create mode 100644 tools/arch/x86/include/uapi/asm/prctl.h create mode 100644 tools/cet/.gitignore create mode 100644 tools/cet/Makefile create mode 100644 tools/cet/cetcmd.c create mode 100644 tools/include/uapi/asm/elf_property.h create mode 100644 tools/include/uapi/asm/prctl.h -- 2.15.1