[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20241010-shstk_converge-v1-0-631beca676e7@rivosinc.com>
Date: Thu, 10 Oct 2024 17:32:02 -0700
From: Deepak Gupta <debug@...osinc.com>
To: Thomas Gleixner <tglx@...utronix.de>, Ingo Molnar <mingo@...hat.com>,
Borislav Petkov <bp@...en8.de>, Dave Hansen <dave.hansen@...ux.intel.com>,
x86@...nel.org, "H. Peter Anvin" <hpa@...or.com>,
Andrew Morton <akpm@...ux-foundation.org>,
"Liam R. Howlett" <Liam.Howlett@...cle.com>,
Vlastimil Babka <vbabka@...e.cz>,
Lorenzo Stoakes <lorenzo.stoakes@...cle.com>, Arnd Bergmann <arnd@...db.de>
Cc: linux-kernel@...r.kernel.org, linux-fsdevel@...r.kernel.org,
linux-mm@...ck.org, linux-arch@...r.kernel.org,
Rick Edgecombe <rick.p.edgecombe@...el.com>,
Mark Brown <broonie@...nel.org>, Deepak Gupta <debug@...osinc.com>,
David Hildenbrand <david@...hat.com>,
Carlos Bilbao <carlos.bilbao.osdev@...il.com>
Subject: [PATCH RFC/RFT 0/3] Converge common flows for cpu assisted shadow
stack
x86, arm64 and risc-v support cpu assisted shadow stack. x86 was first
one and most of the shadow stack related code is in x86 arch directory.
arm64 guarded control stack (GCS) patches from Mark Brown are in -next.
There are significant flows which are quite common between all 3 arches:
- Enabling is via prctl.
- Managing virtual memory for shadow stack handled similarly.
- Virtual memory management of shadow stack on clone/fork is similar.
This led to obvious discussion many how to merge certain common flows in
generic code. Recent one being [1]. Goes without saying having generic
code helps with bug management as well (not having to fix same bug for 3
different arches).
In that attempt, Mark brown introduced `ARCH_HAS_SHADOW_STACK` as part
of arm64 gcs series [2]. This patchset uses same config to move as much
as possible common code in generic kernel. Additionaly this patchset
introduces wrapper abstractions where arch specific handling is required.
I looked at only x86 and risc-v while carving out common code and defining
these abstractions. Mark, please take a look at this and point out if arm64
would require something additional (or removal).
I've not tested this. Only compiled for x86 with shadow stack enable. Thus
this is a RFC and possible looking for some help to test as well on x86.
[1] - https://lore.kernel.org/all/20241008-v5_user_cfi_series-v6-0-60d9fe073f37@rivosinc.com/T/#m98d14237663150778a3f8df59a76a3fe6318624a
[2] - https://lore.kernel.org/linux-arm-kernel/20241001-arm64-gcs-v13-0-222b78d87eee@kernel.org/T/#m1ff65a49873b0e770e71de7af178f581c72be7ad
To: Thomas Gleixner <tglx@...utronix.de>
To: Ingo Molnar <mingo@...hat.com>
To: Borislav Petkov <bp@...en8.de>
To: Dave Hansen <dave.hansen@...ux.intel.com>
To: x86@...nel.org
To: H. Peter Anvin <hpa@...or.com>
To: Andrew Morton <akpm@...ux-foundation.org>
To: Liam R. Howlett <Liam.Howlett@...cle.com>
To: Vlastimil Babka <vbabka@...e.cz>
To: Lorenzo Stoakes <lorenzo.stoakes@...cle.com>
To: Arnd Bergmann <arnd@...db.de>
Cc: linux-kernel@...r.kernel.org
Cc: linux-fsdevel@...r.kernel.org
Cc: linux-mm@...ck.org
Cc: linux-arch@...r.kernel.org
Cc: Rick Edgecombe <rick.p.edgecombe@...el.com>
Cc: Mark Brown <broonie@...nel.org>
Signed-off-by: Deepak Gupta <debug@...osinc.com>
---
Deepak Gupta (2):
mm: helper `is_shadow_stack_vma` to check shadow stack vma
kernel: converge common shadow stack flow agnostic to arch
Mark Brown (1):
mm: Introduce ARCH_HAS_USER_SHADOW_STACK
arch/x86/Kconfig | 1 +
arch/x86/include/asm/shstk.h | 9 +
arch/x86/include/uapi/asm/mman.h | 3 -
arch/x86/kernel/shstk.c | 270 ++++++------------------------
fs/proc/task_mmu.c | 2 +-
include/linux/mm.h | 2 +-
include/linux/usershstk.h | 25 +++
include/uapi/asm-generic/mman-common.h | 3 +
kernel/Makefile | 2 +
kernel/usershstk.c | 289 +++++++++++++++++++++++++++++++++
mm/Kconfig | 6 +
mm/gup.c | 2 +-
mm/vma.h | 10 +-
13 files changed, 392 insertions(+), 232 deletions(-)
---
base-commit: 9852d85ec9d492ebef56dc5f229416c925758edc
change-id: 20241010-shstk_converge-aefbcbef5d71
--
- debug
Powered by blists - more mailing lists