[RFC PATCH v2 3/3] arm64: implement dynamic shadow call stack for Clang

Kees Cook keescook at chromium.org
Thu May 5 17:00:05 PDT 2022


On Thu, May 05, 2022 at 06:10:11PM +0200, Ard Biesheuvel wrote:
> [...]
> +	/*
> +	 * We only enable the shadow call stack dynamically if we are running
> +	 * on a system that does not implement PAC or BTI. PAC and SCS roughly
> +	 * provide the same level of protection, and BTI relies on the PACIASP
> +	 * instructions serving as landing pads, preventing us from patching
> +	 * those instructions into something else.
> +	 */

If BTI relies on PAC, then we only need to check for PAC, yes? I.e.
there isn't going to be a device with BTI but without PAC.

-- 
Kees Cook



More information about the linux-arm-kernel mailing list