From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id D33B3FA375A for ; Fri, 13 Sep 2024 15:26:42 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 45C656B00C7; Fri, 13 Sep 2024 11:26:42 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 40C846B00D0; Fri, 13 Sep 2024 11:26:42 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 2870C6B00D1; Fri, 13 Sep 2024 11:26:42 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0016.hostedemail.com [216.40.44.16]) by kanga.kvack.org (Postfix) with ESMTP id 066DF6B00C7 for ; Fri, 13 Sep 2024 11:26:41 -0400 (EDT) Received: from smtpin08.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay06.hostedemail.com (Postfix) with ESMTP id A8FE6A9945 for ; Fri, 13 Sep 2024 15:26:41 +0000 (UTC) X-FDA: 82560092202.08.A10EF0A Received: from nyc.source.kernel.org (nyc.source.kernel.org [147.75.193.91]) by imf18.hostedemail.com (Postfix) with ESMTP id 09CED1C0002 for ; Fri, 13 Sep 2024 15:26:39 +0000 (UTC) Authentication-Results: imf18.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=KYIsiGg6; dmarc=pass (policy=quarantine) header.from=kernel.org; spf=pass (imf18.hostedemail.com: domain of broonie@kernel.org designates 147.75.193.91 as permitted sender) smtp.mailfrom=broonie@kernel.org ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1726241082; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=4fZ3kzPrVEU8aaiCKKoSgpiwHIFEOaJuQl2DIgTPjw0=; b=vwrDHEdp+LnVPcM3ZHrc44N+7/23yeDzWeSoY6pB5O4SvZD6dJ66aX0HF0+zCb7emFtqew WgX5sEe5gd7PjddRKXiQFbktBmHAN1QL1B6MkFyxEbYMpMoI6cEcJ1yjwuaVlVMtUhhIyT tWGmvVzW/sOktqXtr7v6kSKtBi6J+jE= ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1726241082; a=rsa-sha256; cv=none; b=Y3zZLFFJGxmXpL6KqmAwR+FiY5+5jtlJTAif7Q5oUVRG1wV5ARtTH59WtRdVCN/phmCisx PPrAkjet7eAVYGgNFGzDUp96NabdtKslc40658Xyx/kCIz41xobGgVxcjuLeiffL3TRfNR we7d2KCTSlGQwwOGQJqIZO1IpEe/SpU= ARC-Authentication-Results: i=1; imf18.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=KYIsiGg6; dmarc=pass (policy=quarantine) header.from=kernel.org; spf=pass (imf18.hostedemail.com: domain of broonie@kernel.org designates 147.75.193.91 as permitted sender) smtp.mailfrom=broonie@kernel.org Received: from smtp.kernel.org (transwarp.subspace.kernel.org [100.75.92.58]) by nyc.source.kernel.org (Postfix) with ESMTP id 17A55A4519D; Fri, 13 Sep 2024 15:26:31 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 15DC8C4CEC0; Fri, 13 Sep 2024 15:26:22 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1726241198; bh=ztIFbvcKHrPQ+NfdDu5k6kNg3CZWEYi5RfxBXDsqDZI=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=KYIsiGg67ZSEYjI+/JpS8X4W0kcxPK+UzDAXAdG1PyIFs3rv2bEQPuAySqIBGc5Xv p5zQiVmUqbRLyMQhk8u2Bg3NCQSYyiwpzHo8fnQoBM34PTLUJC0Gx6Sy5Z2hzqm9tj iD4M7OLvOn/wM9WR66B/vcjCLdmOKn/onYUTW5yrNFYeNUyw78v6GCFu1EYnoH3aJk te0ADuUj45E/VLOfSrJgqCuQPaiJ7sWZcMKLgMdfWGEqshfI7ZLMuockf6xIq9InNR H5RPCmR5HVOAo9q3mCoBMXa5xfX+NPl4SgRRlDcVr5OcbDKBHSWvotFUKFDpmMof6w To7i5QdUXP0qg== Date: Fri, 13 Sep 2024 16:26:20 +0100 From: Mark Brown To: Deepak Gupta Cc: paul.walmsley@sifive.com, palmer@sifive.com, conor@kernel.org, linux-doc@vger.kernel.org, linux-riscv@lists.infradead.org, linux-kernel@vger.kernel.org, devicetree@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-mm@kvack.org, linux-arch@vger.kernel.org, linux-kselftest@vger.kernel.org, corbet@lwn.net, palmer@dabbelt.com, aou@eecs.berkeley.edu, robh@kernel.org, krzk+dt@kernel.org, oleg@redhat.com, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, dave.hansen@linux.intel.com, x86@kernel.org, hpa@zytor.com, peterz@infradead.org, akpm@linux-foundation.org, arnd@arndb.de, ebiederm@xmission.com, kees@kernel.org, Liam.Howlett@oracle.com, vbabka@suse.cz, lorenzo.stoakes@oracle.com, shuah@kernel.org, brauner@kernel.org, samuel.holland@sifive.com, andy.chiu@sifive.com, jerry.shih@sifive.com, greentime.hu@sifive.com, charlie@rivosinc.com, evan@rivosinc.com, cleger@rivosinc.com, xiao.w.wang@intel.com, ajones@ventanamicro.com, anup@brainfault.org, mchitale@ventanamicro.com, atishp@rivosinc.com, sameo@rivosinc.com, bjorn@rivosinc.com, alexghiti@rivosinc.com, david@redhat.com, libang.li@antgroup.com, jszhang@kernel.org, leobras@redhat.com, guoren@kernel.org, samitolvanen@google.com, songshuaishuai@tinylab.org, costa.shul@redhat.com, bhe@redhat.com, zong.li@sifive.com, puranjay@kernel.org, namcaov@gmail.com, antonb@tenstorrent.com, sorear@fastmail.com, quic_bjorande@quicinc.com, ancientmodern4@gmail.com, ben.dooks@codethink.co.uk, quic_zhonhan@quicinc.com, cuiyunhui@bytedance.com, yang.lee@linux.alibaba.com, ke.zhao@shingroup.cn, sunilvl@ventanamicro.com, tanzhasanwork@gmail.com, schwab@suse.de, dawei.li@shingroup.cn, rppt@kernel.org, willy@infradead.org, usama.anjum@collabora.com, osalvador@suse.de, ryan.roberts@arm.com, andrii@kernel.org, alx@kernel.org, catalin.marinas@arm.com, revest@chromium.org, bgray@linux.ibm.com, deller@gmx.de, zev@bewilderbeest.net Subject: Re: [PATCH v4 15/30] riscv/mm: Implement map_shadow_stack() syscall Message-ID: <8904b159-7798-454e-a615-34566c088fda@sirena.org.uk> References: <20240912231650.3740732-1-debug@rivosinc.com> <20240912231650.3740732-16-debug@rivosinc.com> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="EXdCC84RfjoEE1iq" Content-Disposition: inline In-Reply-To: <20240912231650.3740732-16-debug@rivosinc.com> X-Cookie: In space, no one can hear you fart. X-Rspamd-Server: rspam07 X-Rspamd-Queue-Id: 09CED1C0002 X-Stat-Signature: kbcj9yu9njkuz7sbw5rc1qkhdqkpae6q X-Rspam-User: X-HE-Tag: 1726241199-456845 X-HE-Meta: U2FsdGVkX19j3c24mIzt07aHzlBzHmKlO8KzHHEOZ0e1OmcEVLXQ+1j7jijOiGosfEy9md8eitkqghly+bKumAC7gh+dHFi2xdO/UFWOPwBDP0mE69JR6IKxIlhA/bZ7rcHZrAqtOZJouFC7ENzmkUG0UHOd+fgFFfZwl2vV0GHd2UAmIzlKSqwXoU1OphLsqZSHIvq6BgvGOa8nWNE9+mf/uQB4a57wWKS/71XWJFs7JhrowAv5Z3RW48j+91JuiNht5SwShipMZ0DX6rf02ZIaqZjPJpATkLkszvDTi1F5omcLQnYqAiTpwLlCLimD+j/BTgv/uyyyP6SLm/MbKCjtaq5yRm4fOoFVnvuPKAH1v01BnGKYIXYCOSRMUbgv7bC1yErU9QSF2ZU9u0HlybwBzimkTOI+l59LwOCqzOaZU9Bvq8fA202yx9v4bx+kmxBAFZwJpnq0kwTW/2x2gKuU601MmJw/6AqxmTOTxXyBdxAXRMIm36jXXq9k53cF1tZmFQ26MMBX0uDXJuA0gKPLt8jYoM3yhHqbDShjuRGbLduBtFC6q2XOA0T2W1Lf/X1eIMUNmoa4cKo6ld2IvBBa+V41oM5gXQeZHey0kUP1sukdDR4BE7U+XWj4fRHH68wAbwd3RD4k5KPs5tpxFzD03BkmPSrrr2YqLLkafWGH/SJyCyHRsdK6EV+Qo+tI5s7SSS1JAgt4BDuMSBlYB5OhljOXvzxeYQIwElylxyVBNHn415zUuZGpnQwGjbQyHLjJEuQ0tieO9O6XI3ikm8HkNYRYNMXnrwEG0ivuj0M9WAETnt3TjbOdYBaFHxTmegYjgAYMp3X1FLdIOt4If6qehi+y84JDgtF1lu5l619F1jL0g/8GITGdZvouHw1SRHNwbmm73l1Ri6aHo7RWuXBBnymXiEwu/VKL4BNmWkaGHf10LrBMSrOFqnYsp5wdwhmTGjxcPBETzCBFT0O 0tPcT5jc rLbBbSMkuH4XT9jnHch5DKpLYCQ9IgeU/gt4rnElewYPCWNGlnfmz82DeRzSpz19XqUVfg3YPTGLGS/IdUF3fYjycCRW/LqbBCRq9D1R4XxV6yAN69j63mTPkhmsKx1vebVATTeXBbQyMySUWm2rXWeZtYV8EPCuewAnMScb2XqUU39iewfy0U4bybn0+Ejeeh4cfwMzqYaQnTgqN+SIe+6GNf3ecBJEu4R8rAcp6zoaJO0usAZ+CbKPT2ym958Vfat+u8F4Ji93olubVulCckXHv16wF4tgDN8JdzXto5YXH7Poc85TnmiGSb2PJ9iL44aV5TenA1Ek7juSKXGbMm4QrnP9JyCKQ1P0A+ohfv8ZHRasWMw43u7luO5Lor3rYVlIXTW3QGjMWhZISxCohCwBN0ZN0z4VX9lErOI77nMckAeOYm8h6c87O6Q== X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: --EXdCC84RfjoEE1iq Content-Type: text/plain; charset=us-ascii Content-Disposition: inline On Thu, Sep 12, 2024 at 04:16:34PM -0700, Deepak Gupta wrote: > This patch implements this syscall for riscv. riscv doesn't require token > to be setup by kernel because user mode can do that by itself. However to > provide compatibility and portability with other architectues, user mode > can specify token set flag. The arm64 series also adds SHADOW_STACK_SET_MARKER for a top of stack marker, if this is only being done for compatibility it might be good to pick that up as well. I don't know what the thoughts are on using them for RISC-V. On arm64 the top of stack marker is just all bits 0. --EXdCC84RfjoEE1iq Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQEzBAABCgAdFiEEreZoqmdXGLWf4p/qJNaLcl1Uh9AFAmbkWZsACgkQJNaLcl1U h9BxgAf+PzUH92Qd8Gx84qFgdXuCpqKnDddOVzhJ/1HXiYtm3Yst508zBxwr03E0 oP3VhAC469mn8uOctrOJqdGHEFcC2/i3SXoyOMIp2gE+YkhdZxatybrRoCF+oNAT AW4y0dPMgjW0i9h1kbiw/MjiHQgVoxdgULs0eZOFLl2zr+QVAD6PYLIAh/3y/lzl e4xv7Bdh51DfKjKr7WwnKYJRGG12WjMxyOjHmy37b09h7THnjSTrg+Y/B7uQ6IpD xS8TYwFAAn9veTqu5LuGRrKm5zBfJ+xSs78Ee/F/MZ+JgzW4ZpDbmQxuBnk33TRe bsixBm+3DOUSeFsCCg21dGBeFYR0JQ== =Y+Cs -----END PGP SIGNATURE----- --EXdCC84RfjoEE1iq--