|
Message-ID: <2440e731-89e5-e674-9390-0de98533e744@intel.com> Date: Tue, 27 Sep 2016 15:33:03 -0700 From: "LeMay, Michael" <michael.lemay@...el.com> To: "musl@...ts.openwall.com" <musl@...ts.openwall.com> Subject: [RFC PATCH 0/7] Segmentation-hardened SafeStack support Here is the current revision of my patches for providing segmentation-hardened SafeStack support. See http://lists.llvm.org/pipermail/llvm-dev/2016-May/100346.html for information on the corresponding compiler patches. Comments appreciated. Michael LeMay (7): add --enable-safe-stack configuration option avoid invoking the vDSO when SafeStack is enabled disable check for buggy brk implementations when SafeStack is enabled add stack segment override prefix to i386 __clone support SafeStack in init and threading support dynamic linking with segmentation-hardened SafeStack add compiler flags to enable SafeStack Makefile | 8 ++ arch/i386/syscall_arch.h | 13 +++ configure | 5 + ldso/dlstart.c | 23 ++++- ldso/dynlink.c | 44 ++++++-- src/env/__libc_start_main.c | 19 ++++ src/env/__safestack.c | 241 ++++++++++++++++++++++++++++++++++++++++++++ src/internal/pthread_impl.h | 4 + src/malloc/expand_heap.c | 2 + src/thread/i386/clone.s | 2 +- src/thread/pthread_create.c | 72 ++++++++++++- 11 files changed, 420 insertions(+), 13 deletions(-) create mode 100644 src/env/__safestack.c -- 2.7.4
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.