Re: F28 System Wide Change: Hardening Flags Updates for Fedora 28

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 01/05/2018 12:41 PM, Mark Wielaard wrote:
On Thu, Jan 04, 2018 at 09:36:27PM -0800, John Reiser wrote:
2) The explicit write by the stack probe can mask a memcheck(valgrind)
    violation, at least until memcheck groks the probe.

That should not be true. The probe is done after the stack pointer is
lowered, so memcheck/valgrind knows that memory is used. If the probe
is done below the actual stack pointer that would be a bug in the gcc
-fstack-protector implementation. Please do report such issues when you
encounter them. There were indeed such bugs in the past on some
architectures (especially in combination with no-return functions),
but I believe they have all been fixed now.

The generic -fstack-clash-protection in GCC has this problem, which is why we can't use it and have to disable it on architectures where there is no support, which currently includes armhfp. (For aarch64, we still carry our own patch, and may have to continue doing that even after switching to GCC 8.)

Thanks,
Florian
_______________________________________________
devel mailing list -- devel@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to devel-leave@xxxxxxxxxxxxxxxxxxxxxxx




[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]
  Powered by Linux