Re: PING[STAGE 1][PATCH][x86][1/3]: Add -mzero-caller-saved-regs=[skip|used-gpr|all-gpr|used|all]

2020-05-04 Thread Kees Cook via Gcc-patches
will send in next two emails. I look forward to seeing these! I'd really like to have the feature available as another defense in depth for the Linux kernel. -Kees -- Kees Cook

Re: [PATCH] [RFC] rs6000: -mreadonly-in-sdata (PR82411)

2018-02-28 Thread Kees Cook via gcc-patches
On Wed, Feb 28, 2018 at 4:39 PM, Segher Boessenkool <seg...@kernel.crashing.org> wrote: > On Wed, Feb 28, 2018 at 04:15:23PM -0800, Kees Cook wrote: >> On Wed, Feb 28, 2018 at 3:23 PM, Segher Boessenkool >> <seg...@kernel.crashing.org> wrote: >> > I'm tryin

Re: [PATCH] [RFC] rs6000: -mreadonly-in-sdata (PR82411)

2018-02-28 Thread Kees Cook via gcc-patches
On Wed, Feb 28, 2018 at 3:23 PM, Segher Boessenkool <seg...@kernel.crashing.org> wrote: > On Wed, Feb 28, 2018 at 01:46:33PM -0800, Kees Cook wrote: >> On Tue, Feb 27, 2018 at 2:01 PM, Segher Boessenkool >> <seg...@kernel.crashing.org> wrote: >> > This a

Re: [PATCH] [RFC] rs6000: -mreadonly-in-sdata (PR82411)

2018-02-28 Thread Kees Cook via gcc-patches
le to build a ppc kernel and remove the "static" from mm/rodata_test_data.c's rodata_test_data and see the rodata_test_data variable not in .sdata, that should be sufficient. The case reported was here: https://lkml.org/lkml/2017/9/21/156 I'll continue trying to solve my cross build issue

status of -fstack-protector-strong?

2012-09-07 Thread Kees Cook
Hi, I'm curious about the status of this patch: http://gcc.gnu.org/ml/gcc-patches/2012-06/msg00974.html Chrome OS uses this, and the Ubuntu Security Team has expressed interest in it as well. What's needed to land this in gcc? Thanks! -Kees -- Kees Cook Chrome OS Security

<    1   2