lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 6 Dec 2021 11:22:30 +0800 From: Dan Li <ashimida@...ux.alibaba.com> To: gcc-patches@....gnu.org Cc: linux-hardening@...r.kernel.org, hp@....gnu.org, Nick Desaulniers <ndesaulniers@...gle.com>, nsz@....gnu.org, pageexec@...il.com, qinzhao@....gnu.org Subject: Re: [PATCH] [PATCH,v2,1/1,AARCH64][PR102768] aarch64: Add compiler support for Shadow Call Stack On 12/6/21 10:41 AM, Dan Li wrote: > Shadow Call Stack can be used to protect the return address of a > function at runtime, and clang already supports this feature[1]. > > To enable SCS in user mode, in addition to compiler, other support > is also required (as discussed in [2]). This patch only adds basic > support for SCS from the compiler side, and provides convenience > for users to enable SCS. > > For linux kernel, only the support of the compiler is required. > > [1] https://clang.llvm.org/docs/ShadowCallStack.html > [2] https://gcc.gnu.org/bugzilla/show_bug.cgi?id=102768 > > Signed-off-by: Dan Li <ashimida@...ux.alibaba.com> > Add more reviewers :)
Powered by blists - more mailing lists