Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 4 Nov 2016 20:31:57 +0000
From: "LeMay, Michael" <michael.lemay@...el.com>
To: "musl@...ts.openwall.com" <musl@...ts.openwall.com>
Subject: [RFC PATCH v3 0/2] SafeStack support

This first patchset adds architecture-independent support for SafeStack.  A separate patch adds support for segmentation-based SafeStack hardening.

v2 -> v3:
 - Further coalesced patches as they have become smaller and simpler.
 - Reduced the use of ifdefs.
 - Used musl-controlled macro in pthread_impl.h.
 - Revised definition of preinit_us.
 - Added __safestack_pthread_exit.
 - Fixed invalid preprocessor expression in traverses_stack_p.
 - Passed updated stack pointer to __clone during thread creation.
 - Updated __stack_base in __safestack_init_thread.
 - Simplified __sep_stack_seg_init and subroutines by requiring that LDT is empty prior to initialization.

Michael LeMay (2):
  support SafeStack
  add SafeStack build support

 Makefile                    |  51 +++++++++++++++++-
 configure                   |  10 ++++
 ldso/dynlink.c              |  13 +++++
 src/env/__libc_start_main.c |   5 ++
 src/internal/pthread_impl.h |  13 +++++
 src/internal/safe_stack.c   | 128 ++++++++++++++++++++++++++++++++++++++++++++
 src/malloc/expand_heap.c    |   2 +
 src/thread/pthread_create.c |  14 ++++-
 8 files changed, 234 insertions(+), 2 deletions(-)
 create mode 100644 src/internal/safe_stack.c

-- 
2.7.4

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.