Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20160923102202.GB1280@port70.net>
Date: Fri, 23 Sep 2016 12:22:02 +0200
From: Szabolcs Nagy <nsz@...t70.net>
To: musl@...ts.openwall.com
Cc: LeMay@...t70.net, Michael <michael.lemay@...el.com>
Subject: Re: [RFC] Support for segmentation-hardened SafeStack

* LeMay, Michael <michael.lemay@...el.com> [2016-09-22 23:00:45 +0000]:
> I submitted several patches to LLVM and Clang to harden SafeStack using segmentation on x86-32 [1].  See [2] for general background on SafeStack.
...
> [1] http://lists.llvm.org/pipermail/llvm-dev/2016-May/100346.html
> [2] http://clang.llvm.org/docs/SafeStack.html

is all runtime support in the libc with your patches?
(i.e. no static linked interposition code from compiler-rt)

can you call into non-instrumented code?
(as Rich noted this looks like a new abi on i386)
i assume the segmented variant breaks abi while the
non-segmented one does not.

what is the unsafe stack size of the main thread?
how much is the resource usage overhead?

what happens if unsafe stack allocation fails?
how does the stack get deallocated at thread exit?
i assume they are consistent with normal stack
handling if this is done in musl.. except for the
main thread.

can signal handlers work with sigaltstack?

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.