Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 1 Nov 2019 23:36:05 +0100
From: Miguel Ojeda <>
To: Sami Tolvanen <>
Cc: Will Deacon <>, Catalin Marinas <>, 
	Steven Rostedt <>, Masami Hiramatsu <>, 
	Ard Biesheuvel <>, Dave Martin <>, 
	Kees Cook <>, Laura Abbott <>, 
	Mark Rutland <>, Marc Zyngier <>, 
	Nick Desaulniers <>, Jann Horn <>, 
	Masahiro Yamada <>, 
	clang-built-linux <>, 
	Kernel Hardening <>, 
	Linux ARM <>, 
	linux-kernel <>
Subject: Re: [PATCH v4 05/17] add support for Clang's Shadow Call Stack (SCS)

On Fri, Nov 1, 2019 at 11:12 PM Sami Tolvanen <> wrote:
> This change adds generic support for Clang's Shadow Call Stack,
> which uses a shadow stack to protect return addresses from being
> overwritten by an attacker. Details are available here:
> Note that security guarantees in the kernel differ from the
> ones documented for user space. The kernel must store addresses
> of shadow stacks used by other tasks and interrupt handlers in
> memory, which means an attacker capable reading and writing
> arbitrary memory may be able to locate them and hijack control
> flow by modifying shadow stacks that are not currently in use.
> Signed-off-by: Sami Tolvanen <>
> Reviewed-by: Kees Cook <>

Reviewed-by: Miguel Ojeda <>


Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.