[PATCH 02/35] prctl: Add flag for shadow stack writeability and push/pop
Mark Brown
broonie at kernel.org
Tue Jul 18 12:10:35 PDT 2023
On Tue, Jul 18, 2023 at 05:47:32PM +0000, Edgecombe, Rick P wrote:
> On Sun, 2023-07-16 at 22:50 +0100, Mark Brown wrote:
> > On arm64 the kernel can separately control if userspace is able to
> > pop
> > and push values directly onto the shadow stack via GCS push and pop
> > instructions, supporting many scenarios where userspace needs to
> > write
> > to the stack with less security exposure than full write access. Add
> > a
> > flag to allow this to be selected when changing the shadow stack
> > status.
> Is this correct? I thought Szabolcs was saying pop was always
> supported, but push was optional.
It's not, I wrote this right after looking at hypervisor controls which
do control push and pop.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 488 bytes
Desc: not available
URL: <http://lists.infradead.org/pipermail/linux-riscv/attachments/20230718/84568089/attachment.sig>
More information about the linux-riscv
mailing list