Thanks for the comments! I've addressed them in the updated patch.

================
Comment at: docs/SafeStack.rst:107
@@ +106,3 @@
+breaking the probabilistic security guarantees through information leaks, may
+be not complete yet. System library functions such as ``setjmp``, exception
+handling mechanisms, intrinsics such as ``__buildin_frame_address``, or
----------------
jfb wrote:
> "may be not complete yet" is pretty awkward phrasing.
I've rephrased this and the previous paragraphs to make it sound less awkward.

================
Comment at: docs/SafeStack.rst:111
@@ +110,3 @@
+such safe stack pointer leaks could be detected by a static binary analysis or
+a dynamic binary instrumentation based tools.
+
----------------
jfb wrote:
> I'd strengthen this last statement: at the moment safe stack assumes that the 
> compiler's implementation is correct. This has not been verified except 
> through code inspection, and could always regress in the future. It's 
> therefore desirable to have a separate static or dynamic binary analysis / 
> checker.
Great point! I think it applies to the entire SafeStack instrumentation, not 
just the hiding aspect, hence I added this note at the end of the Security 
Limitations section.

http://reviews.llvm.org/D10598

EMAIL PREFERENCES
  http://reviews.llvm.org/settings/panel/emailpreferences/



_______________________________________________
cfe-commits mailing list
cfe-commits@cs.uiuc.edu
http://lists.cs.uiuc.edu/mailman/listinfo/cfe-commits

Reply via email to