forked from OSchip/llvm-project
21b25a1fb3
Control-flow Enforcement Technology (CET), published by Intel, introduces shadow stack feature aiming to ensure a return from a function is directed to where the function was called. In a CET enabled system, each function call will push return address into normal stack and shadow stack, when the function returns, the address stored in shadow stack will be popped and compared with the return address, program will fail if the 2 addresses don't match. In exception handling, the control flow may skip some stack frames and we must adjust shadow stack to avoid violating CET restriction. In order to achieve this, we count the number of stack frames skipped and adjust shadow stack by this number before jumping to landing pad. Reviewed By: hjl.tools, compnerd, MaskRay Differential Revision: https://reviews.llvm.org/D105968 Signed-off-by: gejin <ge.jin@intel.com> |
||
---|---|---|
.. | ||
libunwind | ||
CMakeLists.txt | ||
alignment.compile.pass.cpp | ||
forceunwind.pass.cpp | ||
frameheadercache_test.pass.cpp | ||
libunwind_01.pass.cpp | ||
libunwind_02.pass.cpp | ||
lit.cfg.py | ||
lit.site.cfg.in | ||
remember_state_leak.pass.sh.s | ||
signal_frame.pass.cpp | ||
signal_unwind.pass.cpp | ||
unw_getcontext.pass.cpp | ||
unwind_leaffunction.pass.cpp |