On Wed, Feb 21, 2024 at 04:47:11PM -0800, Deepak Gupta wrote:
> On Tue, Feb 06, 2024 at 04:01:28PM +, Mark Brown wrote:
> > > +#define SHADOW_STACK_SET_TOKEN (1ULL << 0) /* Set up a restore token
> > > in the shadow stack */
> > For arm64 I also added a SHADOW_STACK_SET_MARKER for adding
On Fri, Feb 09, 2024 at 08:44:53PM +, Edgecombe, Rick P wrote:
On Wed, 2024-01-24 at 22:21 -0800, de...@rivosinc.com wrote:
From: Deepak Gupta
As discussed extensively in the changelog for the addition of this
syscall on x86 ("x86/shstk: Introduce map_shadow_stack syscall") the
existing mm
On Tue, Feb 06, 2024 at 04:01:28PM +, Mark Brown wrote:
On Wed, Jan 24, 2024 at 10:21:40PM -0800, de...@rivosinc.com wrote:
As discussed extensively in the changelog for the addition of this
syscall on x86 ("x86/shstk: Introduce map_shadow_stack syscall") the
existing mmap() and madvise() s
On Wed, 2024-01-24 at 22:21 -0800, de...@rivosinc.com wrote:
> From: Deepak Gupta
>
> As discussed extensively in the changelog for the addition of this
> syscall on x86 ("x86/shstk: Introduce map_shadow_stack syscall") the
> existing mmap() and madvise() syscalls do not map entirely well onto
>
On Wed, Jan 24, 2024 at 10:21:40PM -0800, de...@rivosinc.com wrote:
> As discussed extensively in the changelog for the addition of this
> syscall on x86 ("x86/shstk: Introduce map_shadow_stack syscall") the
> existing mmap() and madvise() syscalls do not map entirely well onto the
> security requ
On Thu, Jan 25, 2024 at 01:24:16PM -0800, Charlie Jenkins wrote:
On Wed, Jan 24, 2024 at 10:21:40PM -0800, de...@rivosinc.com wrote:
From: Deepak Gupta
As discussed extensively in the changelog for the addition of this
syscall on x86 ("x86/shstk: Introduce map_shadow_stack syscall") the
existi
On Wed, Jan 24, 2024 at 10:21:40PM -0800, de...@rivosinc.com wrote:
> From: Deepak Gupta
>
> As discussed extensively in the changelog for the addition of this
> syscall on x86 ("x86/shstk: Introduce map_shadow_stack syscall") the
> existing mmap() and madvise() syscalls do not map entirely well
From: Deepak Gupta
As discussed extensively in the changelog for the addition of this
syscall on x86 ("x86/shstk: Introduce map_shadow_stack syscall") the
existing mmap() and madvise() syscalls do not map entirely well onto the
security requirements for guarded control stacks since they lead to
w