You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The -fcf-protection=[full|branch|return|none|check] enables the instrumentation of control-flow transfers to ensure that target addresses of indirect control-flow transfer instructions (such as indirect function calls, function returns, and indirect jumps) are within a statically or dynamically determined set of possible targets. This is intended to protect against threats as Return-oriented Programming (ROP), and similarly call/jmp-oriented programming (COP/JOP).
Brought up during the C/C++ Compiler BP Call 2023-09.27.
The
-fcf-protection=[full|branch|return|none|check]
enables the instrumentation of control-flow transfers to ensure that target addresses of indirect control-flow transfer instructions (such as indirect function calls, function returns, and indirect jumps) are within a statically or dynamically determined set of possible targets. This is intended to protect against threats as Return-oriented Programming (ROP), and similarly call/jmp-oriented programming (COP/JOP).This flag is supported since GCC 8.0 and Clang 7.0.0.
Considerations and references
The text was updated successfully, but these errors were encountered: