search for: controlflowintegrity

Displaying 10 results from an estimated 10 matches for "controlflowintegrity".

2015 Sep 02
3
llvm cfi
Ask a simple question : I svn checkout compiler-rt in llvm/project. And I compile llvm through cmake. How can I make for all those testing files? make test? - mudongliang 2015-09-02 0:58 GMT+08:00 Kostya Serebryany <kcc at google.com>: > Take a look at > > clang.llvm.org/docs/ControlFlowIntegrityDesign.html > clang.llvm.org/docs/ControlFlowIntegrity.html > > And the tests: > https://github.com/llvm-mirror/compiler-rt/tree/master/test/cfi > > On Mon, Aug 31, 2015 at 7:43 PM, 慕冬亮 via llvm-dev <llvm-dev at lists.llvm.org > > wrote: > >> I want to create an e...
2017 Jan 16
2
Redefining optnone to help LTO
...ddresses the “I want LTO for optimization”, which seems contradictory to use `-flto -O0`, and could even advocate for forbidding (or warning). However LTO has other uses than optimizations: for instance instrumentations that needs full program access. One of them is CFI: http://clang.llvm.org/docs/ControlFlowIntegrity.html <http://clang.llvm.org/docs/ControlFlowIntegrity.html> If you want to debug and rebuild only part of the program, CFI still requires to use LTO, IIUC. — Mehdi > > -- Sean Silva > > On Wed, Jan 11, 2017 at 8:34 AM, Robinson, Paul via llvm-dev <llvm-dev at lists.llvm....
2017 Feb 17
6
Intel MPX support (instrumentation pass similar to gcc's Pointer Checker)
...about Pointer Checker and SoftBound. />//>/Hardening is an entirely different subject, although there is a bit of />/intersection, />/e.g. I know that parts of UBSan (-fsanitize=signed-integer-overflow) are />/used for hardening. />/In LLVM, also have a look at clang.llvm.org/docs/ControlFlowIntegrity.html />/and />/http://clang.llvm.org/docs/SafeStack.html />//>>//>>/Anyway, before putting the techreport online, I will send the draft to />>/everyone who took part in this conversation, just to be on the safe />>/side and correct any bugs/wrong conclusions. />&...
2015 Sep 01
5
llvm cfi
I want to create an experiment to show the effectiveness of cfi : For example , I first need a program with vulnerability so that we can hijack its control flow; then I enforce cfi of llvm and we can't hijack its control flow. Do you have any advice for me? - mudongliang -------------- next part -------------- An HTML attachment was scrubbed... URL:
2017 May 16
2
[RFC] CFI for indirect calls with ThinLTO
...s works with !type metadata in the same format as described above. It would need to either recreate the metadata from the summary, or deal with different input formats. I don’t see any advantages to this encoding. Could it be more compact than the metadata approach? [1] https://clang.llvm.org/docs/ControlFlowIntegrity.html#indirect-function-call-checking
2015 Aug 12
2
Proposal/patch: simple parallel LTO code generation
...with 4 partitions and 7m27s with 8 partitions. I've attached a patch with an initial implementation of this idea for the gold plugin. If this idea seems reasonable, I'll proceed to clean up the patch and send it for review on llvm-commits. Thanks, -- Peter [1] http://clang.llvm.org/docs/ControlFlowIntegrity.html -------------- next part -------------- A non-text attachment was scrubbed... Name: module-splitter.diff Type: text/x-diff Size: 14039 bytes Desc: not available URL: <http://lists.llvm.org/pipermail/llvm-dev/attachments/20150812/cba67d21/attachment.diff>
2017 May 16
2
[RFC] CFI for indirect calls with ThinLTO
...cribed above. It would need to either recreate the >> metadata from the summary, or deal with different input formats. >> I don’t see any advantages to this encoding. Could it be more compact >> than the metadata approach? >> >> [1] >> https://clang.llvm.org/docs/ControlFlowIntegrity.html#indirect-function-call-checking >> _______________________________________________ >> LLVM Developers mailing list >> llvm-dev at lists.llvm.org >> http://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-dev > > > > > -- > -- > Peter
2017 May 24
2
[RFC] CFI for indirect calls with ThinLTO
...; >>> metadata from the summary, or deal with different input formats. > >>> I don’t see any advantages to this encoding. Could it be more compact > >>> than the metadata approach? > >>> > >>> [1] > >>> https://clang.llvm.org/docs/ControlFlowIntegrity.html# > indirect-function-call-checking > >>> _______________________________________________ > >>> LLVM Developers mailing list > >>> llvm-dev at lists.llvm.org > >>> http://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-dev > >> > >&...
2016 Feb 09
2
Intel MPX support (instrumentation pass similar to gcc's Pointer Checker)
Dmitrii, all, Please note, that GCC 5.3 had a significant update to the MPX code quality - please, use this version as reference. Regards, Sergos On Tue, Feb 9, 2016 at 12:49 AM, Kostya Serebryany via llvm-dev < llvm-dev at lists.llvm.org> wrote: > > > On Thu, Feb 4, 2016 at 10:40 AM, Kostya Serebryany <kcc at google.com> wrote: > >> >> >> On Thu, Feb
2017 Jan 11
9
Redefining optnone to help LTO
In D28404, Mehdi wanted to use the 'optnone' attribute as a way to record "I was compiled with -O0" in the IR, because it seems like a good idea to remember that fact in an LTO compilation and there is no way to remember that fact currently. A couple of people felt it might be better to have this idea discussed on the dev list, where it might get better exposure, so I'm