Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20160927232424.GE1280@port70.net>
Date: Wed, 28 Sep 2016 01:24:25 +0200
From: Szabolcs Nagy <nsz@...t70.net>
To: musl@...ts.openwall.com
Cc: Michael LeMay <michael.lemay@...el.com>
Subject: Re: [RFC PATCH 1/7] add --enable-safe-stack configuration
 option

* LeMay, Michael <michael.lemay@...el.com> [2016-09-27 15:34:32 -0700]:
> program's level of resistance to various types of attacks.  This patch
> adds a configuration option to enable a segmentation-hardened form of
> the SafeStack sanitizer for 32-bit x86 Linux programs.  Subsequent

since it is a new abi it will need a new dynamic linker name
and possibly new triplet name for configuration.

(existing /lib/ld-musl-i386.so.1 cannot load safestack
instrumented binaries, and an instrumented libc cannot
load uninstrumented binaries)

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.