Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <b37444f8-38ed-4c33-00e6-396b736152ed@intel.com>
Date: Fri, 28 Oct 2016 12:48:48 -0700
From: "LeMay, Michael" <michael.lemay@...el.com>
To: "musl@...ts.openwall.com" <musl@...ts.openwall.com>
Subject: [RFC PATCH v2 0/4] SafeStack support

I refactored my patches into two series.  This is the first series, 
which provides architecture-independent support for SafeStack.  The 
second series adds support for segmentation-hardened SafeStack.

Michael LeMay (4):
   disable check for buggy brk implementations when SafeStack is enabled
   support SafeStack in init and threading
   support dynamic linking with SafeStack
   add SafeStack build support

  Makefile                    |  42 ++++++++++++++++-
  configure                   |  10 ++++
  ldso/dynlink.c              |  16 +++++++
  src/env/__libc_start_main.c |  16 +++++++
  src/internal/pthread_impl.h |  13 ++++++
  src/internal/safe_stack.c   | 109 
++++++++++++++++++++++++++++++++++++++++++++
  src/malloc/expand_heap.c    |   2 +
  src/thread/pthread_create.c |  16 ++++++-
  8 files changed, 222 insertions(+), 2 deletions(-)
  create mode 100644 src/internal/safe_stack.c

-- 
2.7.4

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.