Skip to content

Commit 00547ef

Browse files
committed
mm/mmap: Add shadow stack pages to memory accounting
The x86 Control-flow Enforcement Technology (CET) feature includes a new type of memory called shadow stack. This shadow stack memory has some unusual properties, which requires some core mm changes to function properly. Co-developed-by: Yu-cheng Yu <[email protected]> Signed-off-by: Yu-cheng Yu <[email protected]> Signed-off-by: Rick Edgecombe <[email protected]> Signed-off-by: Dave Hansen <[email protected]> Reviewed-by: Borislav Petkov (AMD) <[email protected]> Reviewed-by: Kees Cook <[email protected]> Acked-by: Mike Rapoport (IBM) <[email protected]> Acked-by: David Hildenbrand <[email protected]> Tested-by: Pengfei Xu <[email protected]> Tested-by: John Allen <[email protected]> Tested-by: Kees Cook <[email protected]> Link: https://lore.kernel.org/all/20230613001108.3040476-20-rick.p.edgecombe%40intel.com
1 parent ae1f05a commit 00547ef

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

mm/internal.h

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -538,14 +538,14 @@ static inline bool is_exec_mapping(vm_flags_t flags)
538538
}
539539

540540
/*
541-
* Stack area - automatically grows in one direction
541+
* Stack area (including shadow stacks)
542542
*
543543
* VM_GROWSUP / VM_GROWSDOWN VMAs are always private anonymous:
544544
* do_mmap() forbids all other combinations.
545545
*/
546546
static inline bool is_stack_mapping(vm_flags_t flags)
547547
{
548-
return (flags & VM_STACK) == VM_STACK;
548+
return ((flags & VM_STACK) == VM_STACK) || (flags & VM_SHADOW_STACK);
549549
}
550550

551551
/*

0 commit comments

Comments
 (0)