On 08/23/2017 10:39 AM, Richard Biener wrote:
> On August 23, 2017 6:36:32 PM GMT+02:00, Jeff Law wrote:
>> On 08/23/2017 03:07 AM, Richard Biener wrote:
>>
> Both -fstack-clash-protection and -fstack-check cannot be turned
> off per function. This means they would need
On August 23, 2017 6:36:32 PM GMT+02:00, Jeff Law wrote:
>On 08/23/2017 03:07 AM, Richard Biener wrote:
>
Both -fstack-clash-protection and -fstack-check cannot be turned
off per function. This means they would need merging in
>lto-wrapper.
The alternative is to
On Tue, Aug 22, 2017 at 5:52 PM, Jeff Law wrote:
> On 08/18/2017 08:01 AM, Richard Biener wrote:
>> On Mon, Jul 31, 2017 at 7:35 AM, Jeff Law wrote:
>>> This patch introduces the stack clash protection options
>>>
>>> Changes since V2:
>>>
>>> Adds two new
On 08/22/2017 10:26 AM, David Malcolm wrote:
>> Thanks. I settled on the %< %> style. None of the other warnings in
>> that area use either. Otherwise I would have just selected whatever
>> was
>> most commonly used in that code.
>
> A nit that don't seem to have been mentioned: the patch
On Tue, 2017-08-22 at 09:35 -0600, Jeff Law wrote:
> On 08/19/2017 12:22 PM, Martin Sebor wrote:
> > On 07/30/2017 11:35 PM, Jeff Law wrote:
> > > This patch introduces the stack clash protection options
> > >
> > > Changes since V2:
> > >
> > > Adds two new params. The first controls the size
On 08/18/2017 08:01 AM, Richard Biener wrote:
> On Mon, Jul 31, 2017 at 7:35 AM, Jeff Law wrote:
>> This patch introduces the stack clash protection options
>>
>> Changes since V2:
>>
>> Adds two new params. The first controls the size of the guard area.
>> This controls the
On 08/19/2017 12:22 PM, Martin Sebor wrote:
> On 07/30/2017 11:35 PM, Jeff Law wrote:
>> This patch introduces the stack clash protection options
>>
>> Changes since V2:
>>
>> Adds two new params. The first controls the size of the guard area.
>> This controls the threshold for when a function
On 07/30/2017 11:35 PM, Jeff Law wrote:
This patch introduces the stack clash protection options
Changes since V2:
Adds two new params. The first controls the size of the guard area.
This controls the threshold for when a function prologue requires
probes. The second controls the probing
On Mon, Jul 31, 2017 at 7:35 AM, Jeff Law wrote:
> This patch introduces the stack clash protection options
>
> Changes since V2:
>
> Adds two new params. The first controls the size of the guard area.
> This controls the threshold for when a function prologue requires
> probes.
This patch introduces the stack clash protection options
Changes since V2:
Adds two new params. The first controls the size of the guard area.
This controls the threshold for when a function prologue requires
probes. The second controls the probing interval -- ie, once probes are
needed, how
On 07/24/2017 02:57 AM, Segher Boessenkool wrote:
>> Sadly, there's no way short of listing them and keeping that list
>> up-to-date over time by hand. If we want to do that, I would suggest
>> we note the processors with full support as well as those with partial
>> support using the
On Fri, Jul 21, 2017 at 11:36:05AM -0600, Jeff Law wrote:
> On 07/20/2017 07:23 AM, Segher Boessenkool wrote:
> > On Tue, Jul 18, 2017 at 11:17:19PM -0600, Jeff Law wrote:
> > I think the documentation for the new option should say this only
> > provides partial protection on targets that do not
On 07/20/2017 07:23 AM, Segher Boessenkool wrote:
> Hi Jeff,
>
> On Tue, Jul 18, 2017 at 11:17:19PM -0600, Jeff Law wrote:
>>
>> The biggest change in this update to patch 01/08 is moving of stack
>> clash protection out of -fstack-check= and into its own option,
>> -fstack-clash-protection. I
Hi Jeff,
On Tue, Jul 18, 2017 at 11:17:19PM -0600, Jeff Law wrote:
>
> The biggest change in this update to patch 01/08 is moving of stack
> clash protection out of -fstack-check= and into its own option,
> -fstack-clash-protection. I believe other issues raised by reviewers
> have been
The biggest change in this update to patch 01/08 is moving of stack
clash protection out of -fstack-check= and into its own option,
-fstack-clash-protection. I believe other issues raised by reviewers
have been addressed as well.
--
This patch introduces a new option -fstack-clash-protection
On 07/14/2017 10:34 AM, Segher Boessenkool wrote:
> On Thu, Jul 13, 2017 at 10:35:55PM -0600, Jeff Law wrote:
There's -fstack-check and -fstack-clash-protection. I think with the
direction we're going they are fundamentally incompatible because
neither the compiler nor kernel do
On Thu, Jul 13, 2017 at 10:35:55PM -0600, Jeff Law wrote:
> >> There's -fstack-check and -fstack-clash-protection. I think with the
> >> direction we're going they are fundamentally incompatible because
> >> neither the compiler nor kernel do anything to guarantee enough stack is
> >> available
On 07/14/2017 01:40 AM, Jakub Jelinek wrote:
> On Thu, Jul 13, 2017 at 04:32:02PM -0500, Segher Boessenkool wrote:
>> I don't think it should be inside -fstack-check at all. Sure, the
>> mechanisms implementing it overlap a bit (more on some targets, less
>> on others), but how will a user ask
On Thu, Jul 13, 2017 at 04:32:02PM -0500, Segher Boessenkool wrote:
> I don't think it should be inside -fstack-check at all. Sure, the
> mechanisms implementing it overlap a bit (more on some targets, less
> on others), but how will a user ask for clash protection _and_ for
> stack checking?
On 07/13/2017 06:37 PM, David Malcolm wrote:
> On Tue, 2017-07-11 at 15:19 -0600, Jeff Law wrote:
>
> [...]
>
>> diff --git a/gcc/opts.c b/gcc/opts.c
>> index 7460c2b..61f5bb0 100644
>> --- a/gcc/opts.c
>> +++ b/gcc/opts.c
>> @@ -2243,6 +2243,19 @@ common_handle_option (struct gcc_options
>>
On 07/13/2017 05:37 PM, Segher Boessenkool wrote:
> On Thu, Jul 13, 2017 at 04:38:00PM -0600, Jeff Law wrote:
>> On 07/13/2017 03:32 PM, Segher Boessenkool wrote:
> -fstack-check=clash is itself not such a super name either. It's not
> checking stack, and it isn't clashing: it just does a
On Tue, 2017-07-11 at 15:19 -0600, Jeff Law wrote:
[...]
> diff --git a/gcc/opts.c b/gcc/opts.c
> index 7460c2b..61f5bb0 100644
> --- a/gcc/opts.c
> +++ b/gcc/opts.c
> @@ -2243,6 +2243,19 @@ common_handle_option (struct gcc_options
> *opts,
> opts->x_flag_stack_check =
On Thu, Jul 13, 2017 at 04:38:00PM -0600, Jeff Law wrote:
> On 07/13/2017 03:32 PM, Segher Boessenkool wrote:
> >>> -fstack-check=clash is itself not such a super name either. It's not
> >>> checking stack, and it isn't clashing: it just does a store to every
> >>> page the stack will touch
On 07/13/2017 03:32 PM, Segher Boessenkool wrote:
> Hi again,
>
> On Wed, Jul 12, 2017 at 09:56:09PM -0600, Jeff Law wrote:
FWIW -fstack-check=specific is dreadfully named. I haven't tried to
address that.
>>>
>>> -fstack-check=clash is itself not such a super name either. It's not
Hi again,
On Wed, Jul 12, 2017 at 09:56:09PM -0600, Jeff Law wrote:
> >> FWIW -fstack-check=specific is dreadfully named. I haven't tried to
> >> address that.
> >
> > -fstack-check=clash is itself not such a super name either. It's not
> > checking stack, and it isn't clashing: it just does a
On 07/12/2017 06:31 PM, Segher Boessenkool wrote:
> Hi!
>
> On Tue, Jul 11, 2017 at 03:19:57PM -0600, Jeff Law wrote:
>> It introduces a new style of stack probing -fstack-check=clash,
>> including documentation of the new option, how it differs from
>> -fstack-check=specific, etc.
>>
>> FWIW
Hi!
On Tue, Jul 11, 2017 at 03:19:57PM -0600, Jeff Law wrote:
> It introduces a new style of stack probing -fstack-check=clash,
> including documentation of the new option, how it differs from
> -fstack-check=specific, etc.
>
> FWIW -fstack-check=specific is dreadfully named. I haven't tried to
This is the first patch in the stack-clash mitigation patches.
It introduces a new style of stack probing -fstack-check=clash,
including documentation of the new option, how it differs from
-fstack-check=specific, etc.
FWIW -fstack-check=specific is dreadfully named. I haven't tried to
address
28 matches
Mail list logo