Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 1 May 2015 13:42:59 -0400
From: Rich Felker <dalias@...c.org>
To: musl@...ts.openwall.com
Subject: Re: Pending patches & other changes

On Mon, Apr 27, 2015 at 11:48:20PM -0400, Rich Felker wrote:
> Here is a list of patches I'm aware of that have been sent to the list
> that I haven't yet applied or rejected:
> 
> [PATCH] generate debug_frame info for __syscall_cp_asm (i386) so gdb can get backtrace
> [PATCH] fmtmsg: verify that label is in the correct format.
> [PATCH] replace 'hlt' by 'ud2' in i386/x32/x86_64 a_crash implementations
> [PATCH] conforming strverscmp() implementation
> 
> There are also a few patches from nsz on the radar:
> 
> http://port70.net/~nsz/musl/0001-add-IPTOS_CLASS_-macros-to-netinet-ip.h.patch
> http://port70.net/~nsz/musl/0001-complex-fix-ctanh-0-i-nan-and-ctanh-0-i-inf.patch

I applied these two.

> http://port70.net/~nsz/musl/0001-inet_pton-clean-up.patch

I suspect this should be done but I want to review it well and haven't
gotten around to that yet. Let's look again after release.

> and the BRE extensions that are still under discussion, and possibly

Since adding these now would be a big committment to keep them I think
we should hold off until/unless there's evidence that they're widely
needed. I'd prefer getting apps fixed but if it's a recurring headache
for users maybe we should just add them.

> some cleanup of some always-false null checks in the failure path of
> regcomp.

This is just cleanup and I want to be sure it's correct before doing
it, so let's look again after release.

Rich

Powered by blists - more mailing lists

Your e-mail address:

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.