TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Bringing Stack Clash Protection to Clang / x86

45 pointsby fcambusover 4 years ago

3 comments

saagarjhaover 4 years ago
This is a surprisingly deep look at what went into a fairly simple feature.
codefloover 4 years ago
&gt; Support for this flag landed in Clang in 2020 only for X86, SystemZ and PowerPC.<p>How relevant is x86 code in terms of security? Genuine question. I thought Firefox defaults to x86_64 now even Windows. And in open source land, wouldn’t any OS components that could be compiled with Clang be x86_64 as well?
评论 #25979061 未加载
jdsullyover 4 years ago
MSVC had this for as long as I can remember. I was a little surprised the major Linux compilers didn&#x27;t have code to trigger guard pages on large allocations. It&#x27;s not totally unreasonable to access a large buffer from the top down.