Re: [PATCH v10 00/26] Control-flow Enforcement: Shadow Stack

2020-07-23 Thread Sean Christopherson
On Thu, Jul 23, 2020 at 11:41:55AM -0700, Dave Hansen wrote: > On 7/23/20 9:56 AM, Sean Christopherson wrote: > > On Thu, Jul 23, 2020 at 09:41:37AM -0700, Dave Hansen wrote: > >> On 7/23/20 9:25 AM, Sean Christopherson wrote: > >>> How would people feel about taking the above two patches (02 and 0

Re: [PATCH v10 00/26] Control-flow Enforcement: Shadow Stack

2020-07-23 Thread Sean Christopherson
On Thu, Jul 23, 2020 at 08:40:33PM -0700, Yu-cheng Yu wrote: > On Thu, 2020-07-23 at 11:41 -0700, Dave Hansen wrote: > > On 7/23/20 9:56 AM, Sean Christopherson wrote: > > > On Thu, Jul 23, 2020 at 09:41:37AM -0700, Dave Hansen wrote: > > > > On 7/23/20 9:25 AM, Sean Christopherson wrote: > > > > >

Re: [PATCH v10 00/26] Control-flow Enforcement: Shadow Stack

2020-07-23 Thread Yu-cheng Yu
On Thu, 2020-07-23 at 11:41 -0700, Dave Hansen wrote: > On 7/23/20 9:56 AM, Sean Christopherson wrote: > > On Thu, Jul 23, 2020 at 09:41:37AM -0700, Dave Hansen wrote: > > > On 7/23/20 9:25 AM, Sean Christopherson wrote: > > > > How would people feel about taking the above two patches (02 and 03 in

Re: [PATCH v10 00/26] Control-flow Enforcement: Shadow Stack

2020-07-23 Thread Dave Hansen
On 7/23/20 9:56 AM, Sean Christopherson wrote: > On Thu, Jul 23, 2020 at 09:41:37AM -0700, Dave Hansen wrote: >> On 7/23/20 9:25 AM, Sean Christopherson wrote: >>> How would people feel about taking the above two patches (02 and 03 in the >>> series) through the KVM tree to enable KVM virtualizatio

Re: [PATCH v10 00/26] Control-flow Enforcement: Shadow Stack

2020-07-23 Thread Sean Christopherson
On Thu, Jul 23, 2020 at 09:41:37AM -0700, Dave Hansen wrote: > On 7/23/20 9:25 AM, Sean Christopherson wrote: > > How would people feel about taking the above two patches (02 and 03 in the > > series) through the KVM tree to enable KVM virtualization of CET before the > > kernel itself gains CET su

Re: [PATCH v10 00/26] Control-flow Enforcement: Shadow Stack

2020-07-23 Thread Dave Hansen
On 7/23/20 9:25 AM, Sean Christopherson wrote: > How would people feel about taking the above two patches (02 and 03 in the > series) through the KVM tree to enable KVM virtualization of CET before the > kernel itself gains CET support? I.e. add the MSR and feature bits, along > with the XSAVES co

Re: [PATCH v10 00/26] Control-flow Enforcement: Shadow Stack

2020-07-23 Thread Sean Christopherson
On Wed, Apr 29, 2020 at 03:07:06PM -0700, Yu-cheng Yu wrote: > Control-flow Enforcement (CET) is a new Intel processor feature that blocks > return/jump-oriented programming attacks. Details can be found in "Intel > 64 and IA-32 Architectures Software Developer's Manual" [1]. > > This series depe

Re: [PATCH v10 00/26] Control-flow Enforcement: Shadow Stack

2020-05-21 Thread Yu-cheng Yu
On Thu, 2020-05-21 at 13:50 -0500, Josh Poimboeuf wrote: [...] > > Thanks. FYI, I got the following warning on an AMD system. > > [ 18.936979] get of unsupported state > [ 18.936989] WARNING: CPU: 251 PID: 1794 at > arch/x86/kernel/fpu/xstate.c:919 get_xsave_addr+0x83/0x90 > [ 18.949676]

Re: [PATCH v10 00/26] Control-flow Enforcement: Shadow Stack

2020-05-21 Thread Josh Poimboeuf
On Thu, May 21, 2020 at 08:57:57AM -0700, Yu-cheng Yu wrote: > On Thu, 2020-05-21 at 10:15 -0500, Josh Poimboeuf wrote: > > On Wed, Apr 29, 2020 at 03:07:06PM -0700, Yu-cheng Yu wrote: > > > Control-flow Enforcement (CET) is a new Intel processor feature that > > > blocks > > > return/jump-oriente

Re: [PATCH v10 00/26] Control-flow Enforcement: Shadow Stack

2020-05-21 Thread Yu-cheng Yu
On Thu, 2020-05-21 at 10:15 -0500, Josh Poimboeuf wrote: > On Wed, Apr 29, 2020 at 03:07:06PM -0700, Yu-cheng Yu wrote: > > Control-flow Enforcement (CET) is a new Intel processor feature that blocks > > return/jump-oriented programming attacks. Details can be found in "Intel > > 64 and IA-32 Arch

Re: [PATCH v10 00/26] Control-flow Enforcement: Shadow Stack

2020-05-21 Thread Josh Poimboeuf
On Wed, Apr 29, 2020 at 03:07:06PM -0700, Yu-cheng Yu wrote: > Control-flow Enforcement (CET) is a new Intel processor feature that blocks > return/jump-oriented programming attacks. Details can be found in "Intel > 64 and IA-32 Architectures Software Developer's Manual" [1]. > > This series depe