Date: Wed, 29 Jan 2025 13:39:29 GMT From: Alexander Leidinger <netchild@FreeBSD.org> To: src-committers@FreeBSD.org, dev-commits-src-all@FreeBSD.org, dev-commits-src-main@FreeBSD.org Subject: git: e91117fa8ed2 - main - Improve the stack clash protection description. Message-ID: <202501291339.50TDdTqm066074@gitrepo.freebsd.org>
next in thread | raw e-mail | index | archive | help
The branch main has been updated by netchild: URL: https://cgit.FreeBSD.org/src/commit/?id=e91117fa8ed2d00ae520454d6fecfce8abae0664 commit e91117fa8ed2d00ae520454d6fecfce8abae0664 Author: Alexander Leidinger <netchild@FreeBSD.org> AuthorDate: 2025-01-29 08:32:00 +0000 Commit: Alexander Leidinger <netchild@FreeBSD.org> CommitDate: 2025-01-29 13:39:24 +0000 Improve the stack clash protection description. Despite not being mentioned in the docs of gcc and clang, the stack clash protection is architecture / implementation dependent. Reported by: jrtc27 --- share/man/man7/mitigations.7 | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/share/man/man7/mitigations.7 b/share/man/man7/mitigations.7 index 4db6589cdcf1..c3c6ab55c480 100644 --- a/share/man/man7/mitigations.7 +++ b/share/man/man7/mitigations.7 @@ -28,7 +28,7 @@ .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF .\" SUCH DAMAGE. .\" -.Dd January 25, 2025 +.Dd January 29, 2025 .Dt MITIGATIONS 7 .Os .Sh NAME @@ -244,8 +244,9 @@ and it is possible that some applications may not function correctly. .Fx supports stack overflow protection using the Stack Smashing Protector .Pq SSP -compiler feature, -and stack clash protection. +compiler feature. +Stack clash protection is also enabled, +if supported by the compiler for the given architecture. In userland, SSP adds a per-process randomized canary at the end of every stack frame which is checked for corruption upon return from the function, and stack probing in
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202501291339.50TDdTqm066074>