lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Wed, 2 Dec 2020 16:01:20 -0800
From:   Nick Desaulniers <>
To:     Sami Tolvanen <>
Cc:     Masahiro Yamada <>,
        Steven Rostedt <>,
        Will Deacon <>,
        Josh Poimboeuf <>,
        Peter Zijlstra <>,
        Greg Kroah-Hartman <>,
        "Paul E. McKenney" <>,
        Kees Cook <>,
        clang-built-linux <>,
        Kernel Hardening <>,
        linux-arch <>,
        Linux ARM <>,
        Linux Kbuild mailing list <>,
        LKML <>,
        PCI <>
Subject: Re: [PATCH v8 00/16] Add support for Clang LTO

On Tue, Dec 1, 2020 at 1:37 PM Sami Tolvanen <> wrote:
> This patch series adds support for building the kernel with Clang's
> Link Time Optimization (LTO). In addition to performance, the primary
> motivation for LTO is to allow Clang's Control-Flow Integrity (CFI)
> to be used in the kernel. Google has shipped millions of Pixel
> devices running three major kernel versions with LTO+CFI since 2018.
> Most of the patches are build system changes for handling LLVM
> bitcode, which Clang produces with LTO instead of ELF object files,
> postponing ELF processing until a later stage, and ensuring initcall
> ordering.
> Note that arm64 support depends on Will's memory ordering patches
> [1]. I will post x86_64 patches separately after we have fixed the
> remaining objtool warnings [2][3].
> [1]
> [2]
> [3]
> You can also pull this series from
> lto-v8
> ---
> Changes in v8:
>   - Cleaned up the LTO Kconfig options based on suggestions from
>     Nick and Kees.

Thanks Sami, for the series:

Tested-by: Nick Desaulniers <>

(build and boot tested under emulation with
additionally rebased on top).

As with v7, if the series changes drastically for v9, please consider
dropping my tested by tag for the individual patches that change and I
will help re-test them.
~Nick Desaulniers

Powered by blists - more mailing lists