On Tue, Sep 14, 2021 at 01:33:02AM +0000, Edgecombe, Rick P wrote: > The original prctl solution prevents this case since the kernel did the > allocation and restore token setup, but of course it had other issues. > The other ideas discussed previously were a new syscall, or some sort > of new madvise() operation that could be involved in setting up shadow > stack, such that it is never writable in userspace. If I had to choose - and this is only my 2¢ anyway - I'd opt for this until there's a really good reason for allowing shstk programs to fiddle with their own shstk. Maybe there is but allowing them to do that sounds to me like: "ew, why do we go to all this trouble to have shadow stacks if programs would be allowed to fumble with it themselves? Might as well not do shadow stacks at all." And if/when there is a good reason, the API should be defined and discussed properly at first, before we expose it to luserspace, ofc. Thx. -- Regards/Gruss, Boris. https://people.kernel.org/tglx/notes-about-netiquette