|
Message-ID: <390CE752059EB848A71F4F676EBAB76D3AC2987A@ORSMSX114.amr.corp.intel.com> Date: Fri, 4 Nov 2016 20:31:57 +0000 From: "LeMay, Michael" <michael.lemay@...el.com> To: "musl@...ts.openwall.com" <musl@...ts.openwall.com> Subject: [RFC PATCH v3 0/2] SafeStack support This first patchset adds architecture-independent support for SafeStack. A separate patch adds support for segmentation-based SafeStack hardening. v2 -> v3: - Further coalesced patches as they have become smaller and simpler. - Reduced the use of ifdefs. - Used musl-controlled macro in pthread_impl.h. - Revised definition of preinit_us. - Added __safestack_pthread_exit. - Fixed invalid preprocessor expression in traverses_stack_p. - Passed updated stack pointer to __clone during thread creation. - Updated __stack_base in __safestack_init_thread. - Simplified __sep_stack_seg_init and subroutines by requiring that LDT is empty prior to initialization. Michael LeMay (2): support SafeStack add SafeStack build support Makefile | 51 +++++++++++++++++- configure | 10 ++++ ldso/dynlink.c | 13 +++++ src/env/__libc_start_main.c | 5 ++ src/internal/pthread_impl.h | 13 +++++ src/internal/safe_stack.c | 128 ++++++++++++++++++++++++++++++++++++++++++++ src/malloc/expand_heap.c | 2 + src/thread/pthread_create.c | 14 ++++- 8 files changed, 234 insertions(+), 2 deletions(-) create mode 100644 src/internal/safe_stack.c -- 2.7.4
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.