|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] RE: [PATCH v2 for-4.14] x86/livepatch: Make livepatching compatible with CET Shadow Stacks
> -----Original Message-----
> From: Jan Beulich <jbeulich@xxxxxxxx>
> Sent: 26 June 2020 14:15
> To: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
> Cc: Xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>; Wei Liu <wl@xxxxxxx>; Roger
> Pau Monné
> <roger.pau@xxxxxxxxxx>; Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>; Ross
> Lagerwall
> <ross.lagerwall@xxxxxxxxxx>; Pawel Wieczorkiewicz <wipawel@xxxxxxxxx>; Paul
> Durrant <paul@xxxxxxx>
> Subject: Re: [PATCH v2 for-4.14] x86/livepatch: Make livepatching compatible
> with CET Shadow Stacks
>
> On 26.06.2020 14:24, Andrew Cooper wrote:
> > Just like the alternatives infrastructure, the livepatch infrastructure
> > disables CR0.WP to perform patching, which is not permitted with CET active.
> >
> > Modify arch_livepatch_{quiesce,revive}() to disable CET before disabling WP,
> > and reset the dirty bits on all virtual regions before re-enabling CET.
> >
> > One complication is that arch_livepatch_revive() has to fix up the top of
> > the
> > shadow stack. This depends on the functions not being inlined, even under
> > LTO. Another limitation is that reset_virtual_region_perms() may shatter
> > the
> > final superpage of .text depending on alignment.
> >
> > This logic, and its downsides, are temporary until the patching
> > infrastructure
> > can be adjusted to not use CR0.WP.
>
> In particular on this basis ...
>
> > Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
>
> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>
Release-acked-by: Paul Durrant <paul@xxxxxxx>
>
> Jan
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |