Re: [PATCH v23 14/28] x86/mm: Shadow Stack page fault error checking

2021-03-22 Thread Yu, Yu-cheng
On 3/22/2021 3:38 AM, Kirill A. Shutemov wrote: On Tue, Mar 16, 2021 at 08:10:40AM -0700, Yu-cheng Yu wrote: [...] diff --git a/arch/x86/mm/fault.c b/arch/x86/mm/fault.c index a73347e2cdfc..4316732a18c6 100644 --- a/arch/x86/mm/fault.c +++ b/arch/x86/mm/fault.c @@ -1100,6 +1100,17 @@ access_

Re: [PATCH v23 14/28] x86/mm: Shadow Stack page fault error checking

2021-03-22 Thread Kirill A. Shutemov
On Tue, Mar 16, 2021 at 08:10:40AM -0700, Yu-cheng Yu wrote: > Shadow stack accesses are those that are performed by the CPU where it > expects to encounter a shadow stack mapping. These accesses are performed > implicitly by CALL/RET at the site of the shadow stack pointer. These > accesses are

[PATCH v23 14/28] x86/mm: Shadow Stack page fault error checking

2021-03-16 Thread Yu-cheng Yu
Shadow stack accesses are those that are performed by the CPU where it expects to encounter a shadow stack mapping. These accesses are performed implicitly by CALL/RET at the site of the shadow stack pointer. These accesses are made explicitly by shadow stack management instructions like WRUSSQ.