Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2440e731-89e5-e674-9390-0de98533e744@intel.com>
Date: Tue, 27 Sep 2016 15:33:03 -0700
From: "LeMay, Michael" <michael.lemay@...el.com>
To: "musl@...ts.openwall.com" <musl@...ts.openwall.com>
Subject: [RFC PATCH 0/7] Segmentation-hardened SafeStack support

Here is the current revision of my patches for providing 
segmentation-hardened SafeStack support.

See http://lists.llvm.org/pipermail/llvm-dev/2016-May/100346.html for 
information on the corresponding compiler patches.

Comments appreciated.

Michael LeMay (7):
   add --enable-safe-stack configuration option
   avoid invoking the vDSO when SafeStack is enabled
   disable check for buggy brk implementations when SafeStack is enabled
   add stack segment override prefix to i386 __clone
   support SafeStack in init and threading
   support dynamic linking with segmentation-hardened SafeStack
   add compiler flags to enable SafeStack

  Makefile                    |   8 ++
  arch/i386/syscall_arch.h    |  13 +++
  configure                   |   5 +
  ldso/dlstart.c              |  23 ++++-
  ldso/dynlink.c              |  44 ++++++--
  src/env/__libc_start_main.c |  19 ++++
  src/env/__safestack.c       | 241 
++++++++++++++++++++++++++++++++++++++++++++
  src/internal/pthread_impl.h |   4 +
  src/malloc/expand_heap.c    |   2 +
  src/thread/i386/clone.s     |   2 +-
  src/thread/pthread_create.c |  72 ++++++++++++-
  11 files changed, 420 insertions(+), 13 deletions(-)
  create mode 100644 src/env/__safestack.c

-- 
2.7.4

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.