From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id A1BE3C71159 for ; Fri, 18 Aug 2023 17:09:05 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 00A7694006A; Fri, 18 Aug 2023 13:09:05 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id F2399940012; Fri, 18 Aug 2023 13:09:04 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id DECA694006A; Fri, 18 Aug 2023 13:09:04 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0015.hostedemail.com [216.40.44.15]) by kanga.kvack.org (Postfix) with ESMTP id CD59B940012 for ; Fri, 18 Aug 2023 13:09:04 -0400 (EDT) Received: from smtpin05.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay01.hostedemail.com (Postfix) with ESMTP id A21341C8EE7 for ; Fri, 18 Aug 2023 17:09:04 +0000 (UTC) X-FDA: 81137860608.05.5C89D53 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by imf16.hostedemail.com (Postfix) with ESMTP id CF7E9180020 for ; Fri, 18 Aug 2023 17:09:02 +0000 (UTC) Authentication-Results: imf16.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=UeDGkINQ; spf=pass (imf16.hostedemail.com: domain of broonie@kernel.org designates 139.178.84.217 as permitted sender) smtp.mailfrom=broonie@kernel.org; dmarc=pass (policy=none) header.from=kernel.org ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1692378542; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=1JiWSPRDzlcQkonHOTJfOlbVQmRCyzrqNmv6BEdoPCA=; b=66tcTqwpl196hLaWvdcxA574vMkmT/j1kpq1mFETqD54Oxzzw72BIglWR1N68H3kza5prO uWBkxbeSIrdBtoqgl0MYiz0972boqXV5VX+5HY6/HKQ8HglxwJkC3EKhP2L6Wlywpzmmaz fO3cgR1RVxi3Hu78vOoyuS1Gltc8XYg= ARC-Authentication-Results: i=1; imf16.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=UeDGkINQ; spf=pass (imf16.hostedemail.com: domain of broonie@kernel.org designates 139.178.84.217 as permitted sender) smtp.mailfrom=broonie@kernel.org; dmarc=pass (policy=none) header.from=kernel.org ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1692378542; a=rsa-sha256; cv=none; b=FxwluAxVjHkW9r0Ie0VAvMdEELQBR233qGouRXiz/7FRIvDub8rchSLfyTRIL3ZCyJZ/hX okj+NS47WkvX+21CadO9XmWX8luQwXhit7Z+VlxP8nh8S5CiHJfB/6CNK4VJS28oflJilc Qq2Hn3Afmzm2pL8gRyuBHFisIchqVKs= Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id E0AC962BD3; Fri, 18 Aug 2023 17:09:01 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 610E8C433C7; Fri, 18 Aug 2023 17:08:55 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1692378541; bh=1JiWSPRDzlcQkonHOTJfOlbVQmRCyzrqNmv6BEdoPCA=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=UeDGkINQMUZMOv0CaERFn8GmpN/lFFhAiO84OP7u1x7AFZUtfVsRfzTEFzC+ygpsR Y9xpRo/IlegEekeP1Dut+AJzPtf3KaySn86syYV9hvhBj7tYI7hwm7WVjGwkVpEbKQ ZjgkorrFmrhhByHlHzjOB7PJonhx3wFLnve5nNkSRvFS4Qnnbvl/LHsJGsoNKavGlh wQaSzUFSZnBSxJIIJQqmSVEnLqSDKMGJQhsBsfKCrvRcquTSr/kacVzGcONadDoykq GZMPrwKnsKvdT1EyR550F0bV2J9QMoG16RUnCOQNCw1zWjT6j+ubsWMcE8yFgXt2oD mtaDQp5RlwIFg== Date: Fri, 18 Aug 2023 18:08:52 +0100 From: Mark Brown To: Catalin Marinas Cc: Will Deacon , Jonathan Corbet , Andrew Morton , Marc Zyngier , Oliver Upton , James Morse , Suzuki K Poulose , Arnd Bergmann , Oleg Nesterov , Eric Biederman , Kees Cook , Shuah Khan , "Rick P. Edgecombe" , Deepak Gupta , Ard Biesheuvel , Szabolcs Nagy , "H.J. Lu" , Paul Walmsley , Palmer Dabbelt , Albert Ou , linux-arm-kernel@lists.infradead.org, linux-doc@vger.kernel.org, kvmarm@lists.linux.dev, linux-fsdevel@vger.kernel.org, linux-arch@vger.kernel.org, linux-mm@kvack.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, linux-riscv@lists.infradead.org Subject: Re: [PATCH v4 21/36] arm64/mm: Implement map_shadow_stack() Message-ID: <9c722954-8f30-425e-a0a4-6edad463620f@sirena.org.uk> References: <20230807-arm64-gcs-v4-0-68cfa37f9069@kernel.org> <20230807-arm64-gcs-v4-21-68cfa37f9069@kernel.org> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="t6HZ5j30fo2L27Lx" Content-Disposition: inline In-Reply-To: X-Cookie: Your aim is high and to the right. X-Rspamd-Queue-Id: CF7E9180020 X-Rspam-User: X-Stat-Signature: rip4mkjz4a4bkzzdmx6ag3st9b961zkp X-Rspamd-Server: rspam01 X-HE-Tag: 1692378542-577835 X-HE-Meta: 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 N8wwlD5+ mrsjk+6vhkD7KqPaTjqdYWm8los5K2Ogy2azLKWw1Fh2VsVmJhhjELIeQW7b47SgEnuJH1jixHLwoE/R/9I1djntMQ5P8maM/pMI/UhfqMd0sspe9Z+M3jmYH6huB7xYWgB3N99jdiKWH/od9nUnZ3JMOe36tQTf5PNJMwCuQ9RE8kGJn9xKo4bGEopsPwyhl8j/Vf82bFpidHH0iTJc9akHaeDQtjK+FH7mtHs0RusIlkfz/AiJG3sjCPtZeERVPDem8Z8FeROGxtDcUw7R7VeZvNnAqVTWcWgxWOlC9MvqWHx1IVYSDXa3wKBEZBLu+vqYyS0VoQBPZ4NOingNp+h+0AsLDA64rhbFSAuuz/KszsCMODGK8Scn8vRqgEJiNswbrUwHbtOkiJlBXrO+ly4HMsc93uAZ0m0TqhmdpLyy4zr6gjOZ+fgcaZhbkovwlWSjomMdz35BPnybUq1lbJFCobQ== X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: --t6HZ5j30fo2L27Lx Content-Type: text/plain; charset=us-ascii Content-Disposition: inline On Fri, Aug 11, 2023 at 05:38:24PM +0100, Catalin Marinas wrote: > Given that we won't have an mmap(PROT_SHADOW_STACK), are we going to > have restrictions on mprotect()? E.g. it would be useful to reject a > PROT_EXEC on the shadow stack. mprotect() uses arch_validate_flags() which we're already having cover this so it's already covered. --t6HZ5j30fo2L27Lx Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQEzBAABCgAdFiEEreZoqmdXGLWf4p/qJNaLcl1Uh9AFAmTfpaMACgkQJNaLcl1U h9CmuAf/Y7ANc4Kk+mnfQwnFeS/EQ5r5NF8oVlV+xJ9aNN/eMcDpeaYBvln2GA6v ki7svYKRiiuRDNr3/h0fyHapLK3tsJpZxS76iqNbYh6EFBbZ5vX5njXBuLHneFL2 Kc18LKu7USgVA0WGmDvkClBhnSmeoOFrZjnrBJyJZFHNjTwRNM+tVnOCBeKTS/Ur zPyUEIEB9wq1bs+NTA1CgvI82vIVrO3nLu00IP/35zQpX665RocIKw3craz+6Efl 8NH22NdfYjWPNSv9WI5pf2WG+CX2AOQ3v1IMF+S3jrN6NVdf5oOrpAYiejOjtf50 5MKlsT1RWl3PNInSnsIkRNYXCDmr7A== =lwGM -----END PGP SIGNATURE----- --t6HZ5j30fo2L27Lx--