Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 1 Nov 2019 09:28:21 -0700
From: Sami Tolvanen <>
To: Kees Cook <>
Cc: Will Deacon <>, Catalin Marinas <>, 
	Steven Rostedt <>, Masami Hiramatsu <>, 
	Ard Biesheuvel <>, Dave Martin <>, 
	Laura Abbott <>, Mark Rutland <>, 
	Nick Desaulniers <>, Jann Horn <>, 
	Miguel Ojeda <>, 
	Masahiro Yamada <>, 
	clang-built-linux <>, 
	Kernel Hardening <>, 
	linux-arm-kernel <>, LKML <>
Subject: Re: [PATCH v3 05/17] add support for Clang's Shadow Call Stack (SCS)

On Thu, Oct 31, 2019 at 8:51 PM Kees Cook <> wrote:
> > +/* A random number to mark the end of the shadow stack. */
> > +#define SCS_END_MAGIC        0xaf0194819b1635f6UL
> Is 0xaf.... non-canonical for arm64? While "random", it should also
> likely be an "impossible" value to find on the call stack.

Agreed, and yes, this is non-canonical for arm64 and AFAIK all 64-bit
architectures the kernel supports. I'll add a note about it.


Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.