Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20101108193332.GA4394@albatros>
Date: Mon, 8 Nov 2010 22:33:32 +0300
From: Vasiliy Kulikov <segoon@...nwall.com>
To: oss-security@...ts.openwall.com
Subject: Re: Linux kernel proactive security hardening

Solar,

On Mon, Nov 08, 2010 at 08:48 +0300, Solar Designer wrote:
> 2. We could turn all function-local non-static definitions of:
> 
> struct x y;
> 
> into:
> 
> struct x y = {};
> 
> We could do this by pre-processing the source files

With coccinelle it is trivial:

@@
identifier T, x, f;
@@

f(...)
{
 ...
 struct T x
+ = {}
 ;
 ...
}

However, I don't think that all linux maintainers would be happy with
this.

> or with a patch to
> gcc (introduce a command-line option to assume empty initializers for
> all on-stack structs).

IMO much better solution - instead of many MB trivial patch have small
gcc patch.


Thanks,

-- 
Vasiliy

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.