From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3378FCF0453 for ; Wed, 9 Oct 2024 11:06:05 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id A11556B00D3; Wed, 9 Oct 2024 07:06:04 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 9C0116B00D4; Wed, 9 Oct 2024 07:06:04 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 887456B00D5; Wed, 9 Oct 2024 07:06:04 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0013.hostedemail.com [216.40.44.13]) by kanga.kvack.org (Postfix) with ESMTP id 6A8496B00D3 for ; Wed, 9 Oct 2024 07:06:04 -0400 (EDT) Received: from smtpin21.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay05.hostedemail.com (Postfix) with ESMTP id 4762B4128E for ; Wed, 9 Oct 2024 11:06:02 +0000 (UTC) X-FDA: 82653784248.21.8ABAB17 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by imf01.hostedemail.com (Postfix) with ESMTP id 4B9F140009 for ; Wed, 9 Oct 2024 11:06:02 +0000 (UTC) Authentication-Results: imf01.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b="ZQ/b9j93"; dmarc=pass (policy=quarantine) header.from=kernel.org; spf=pass (imf01.hostedemail.com: domain of broonie@kernel.org designates 139.178.84.217 as permitted sender) smtp.mailfrom=broonie@kernel.org ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1728471918; a=rsa-sha256; cv=none; b=UXiU13zRxsa3FCvCG7dF7oIfvy8bWiJYGYt330bpR/UAwDN1NVyfa08EJEHUZsAqVU/k/+ IIfen/BrIa3B5K4KU1iLIeocrYOU9gRxS/8FuzHzt7lKdIGPG5AOFje+FEv9UEuftMJEo6 x/F/M4GhjcvvsRFYZVf/1DNGKeaP/Qw= ARC-Authentication-Results: i=1; imf01.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b="ZQ/b9j93"; dmarc=pass (policy=quarantine) header.from=kernel.org; spf=pass (imf01.hostedemail.com: domain of broonie@kernel.org designates 139.178.84.217 as permitted sender) smtp.mailfrom=broonie@kernel.org ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1728471918; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=xD6YYB0Xd7jrHmt4XARb0026+NiYtH7BYjQfJv1OmvI=; b=53UNgrvocGIAuXGMiCHC0TWk3cNjEyNeu329gH50jVPJpuKQu+MOgA3dzWLy4Rd88xgoWQ TnX63de0E/CLWEA3vUwt6OAh6BBOcb3qY0DE+VmKmu6ReiU2Le7HboXAN5eC3ULnG23sms M76oZ2PfZAL9WPhiqHEgoEx2N+17Jv0= Received: from smtp.kernel.org (transwarp.subspace.kernel.org [100.75.92.58]) by dfw.source.kernel.org (Postfix) with ESMTP id EAFCF5C54C9; Wed, 9 Oct 2024 11:05:56 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id EFB2BC4CEC5; Wed, 9 Oct 2024 11:05:59 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1728471960; bh=q/ht5rusQH29reCgQKkQ7cxAxVD7sSLy4Jo1uGfHo0c=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=ZQ/b9j93K6RqAqgOUVMgfWoJsX5As1kolPBoc1Y73PNguggklUUrUm2Ap+8EzcnQL q1m6g5FdIty689UhD2b5AzShUkate3A6XOljtsoMwAwmAWIgjx4jayaN+AWF8F4T9S z26oFKbiOTGuQS86JgZwc2gC9p4KnFCD7dLoSUKSS5Nf2TtSABKSG1CslKD55avTD6 nudWnFJtEZ2i5CHu60HDNsExl6LyE2587gf6cMM3mS/fC9mra+T0Wa4nFpqjpsXVQ4 aagGb/fIscXPvjhoTdQGNYv8iQLBq4HwXneOlsq96NIQAJtqmEm24eqebhSI6o2bfj 1JnC7rG+hfcLg== Date: Wed, 9 Oct 2024 12:05:57 +0100 From: Mark Brown To: Deepak Gupta Cc: Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , x86@kernel.org, "H. Peter Anvin" , Andrew Morton , "Liam R. Howlett" , Vlastimil Babka , Lorenzo Stoakes , Paul Walmsley , Palmer Dabbelt , Albert Ou , Conor Dooley , Rob Herring , Krzysztof Kozlowski , Arnd Bergmann , Christian Brauner , Peter Zijlstra , Oleg Nesterov , Eric Biederman , Kees Cook , Jonathan Corbet , Shuah Khan , linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-mm@kvack.org, linux-riscv@lists.infradead.org, devicetree@vger.kernel.org, linux-arch@vger.kernel.org, linux-doc@vger.kernel.org, linux-kselftest@vger.kernel.org, alistair.francis@wdc.com, richard.henderson@linaro.org, jim.shu@sifive.com, andybnac@gmail.com, kito.cheng@sifive.com, charlie@rivosinc.com, atishp@rivosinc.com, evan@rivosinc.com, cleger@rivosinc.com, alexghiti@rivosinc.com, samitolvanen@google.com, rick.p.edgecombe@intel.com, David Hildenbrand , Carlos Bilbao , Samuel Holland , Andrew Jones , Conor Dooley , Andy Chiu Subject: Re: [PATCH v6 00/33] riscv control-flow integrity for usermode Message-ID: References: <20241008-v5_user_cfi_series-v6-0-60d9fe073f37@rivosinc.com> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="7oPJV4nwhqMkz2xI" Content-Disposition: inline In-Reply-To: <20241008-v5_user_cfi_series-v6-0-60d9fe073f37@rivosinc.com> X-Cookie: Editing is a rewording activity. X-Rspam-User: X-Rspamd-Queue-Id: 4B9F140009 X-Rspamd-Server: rspam01 X-Stat-Signature: 5cifqkeyahfr9ecpb1jfwu3mbumryr58 X-HE-Tag: 1728471962-121235 X-HE-Meta: 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 F5kzAU2f 4HiY/iCRbVmKCgL7BrJSiLZzndRVgagVH97rSLLNqgHAw2HVCADmfQ9wF0HHfkTQIqHXJW10Yj9dGAjeiaaCL2Jk2NMraduhPDt0rhEucg6p/2uZe71bVgROC3PcTNjC6vGd2A+W3YKFvBg9vJk4pwKa6j7wKkTOLkXJJw68RfGG4h3mKQo6kilpJ9qdsHN/TLEcIwzkBQ8oDtdd89Uy+3vWX1cor3SDzrPW8cyVeNhyBn+xir508S4wbt+qM9gculcCzD1/Qy1zKDTwB2ev9fCg4xln3Kjbq6m1MsodU/0e8zjVwPnDoOJ99i4u3QkYLPEAgXJiq8K1Edc6FTSW+rAxWI/TdvAPVNd9v1mZkTqJllqpSgnqZZoDXSbxPFvVQdcFa X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: --7oPJV4nwhqMkz2xI Content-Type: text/plain; charset=us-ascii Content-Disposition: inline On Tue, Oct 08, 2024 at 03:36:42PM -0700, Deepak Gupta wrote: > Equivalent to landing pad (zicfilp) on x86 is `ENDBRANCH` instruction in Intel > CET [3] and branch target identification (BTI) [4] on arm. > Similarly x86's Intel CET has shadow stack [5] and arm64 has guarded control > stack (GCS) [6] which are very similar to risc-v's zicfiss shadow stack. > x86 already supports shadow stack for user mode and arm64 support for GCS in > usermode [7] is ongoing. FWIW the arm64 support is now in -next, including these: > Mark Brown (2): > mm: Introduce ARCH_HAS_USER_SHADOW_STACK > prctl: arch-agnostic prctl for shadow stack shared changes to generic code. --7oPJV4nwhqMkz2xI Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQEzBAABCgAdFiEEreZoqmdXGLWf4p/qJNaLcl1Uh9AFAmcGY5QACgkQJNaLcl1U h9DuYgf/Yx/hYhzwGnR6YPAWZpgt5JjVuDPJa1JE1Ei8ieKYodc7o6QkOA5hSrTm WYjjS9qnSLJMACL3DYu4mSJA8xQotPF5iqQaMppk1O/o2e3oTwawz7s0nV/YrWro AqVenIjySprRKZMNLMT7px8D0NFUlqICKS05NO3+KlS3J/tdxEnW5ugscd0abE6V UuEUA6JnHqtwrdff5T2I3hZqDw1W+3uMDoCYjB5hsmRbZQsdR31IbaAqJIiV30Xn e2tXbl+/62YIiebxZzUJGexuc7CbwdMnNC6aRjMTFEZ1R4YF1DJZMu9TcIBP/W2b q6AR4EUd7yJlirhYQIzbhTVozmqMlA== =L1c6 -----END PGP SIGNATURE----- --7oPJV4nwhqMkz2xI--