From mboxrd@z Thu Jan 1 00:00:00 1970 X-Msuck: nntp://news.gmane.org/gmane.linux.lib.musl.general/10510 Path: news.gmane.org!.POSTED!not-for-mail From: Szabolcs Nagy Newsgroups: gmane.linux.lib.musl.general Subject: Re: [RFC] Support for segmentation-hardened SafeStack Date: Fri, 23 Sep 2016 12:22:02 +0200 Message-ID: <20160923102202.GB1280@port70.net> References: <390CE752059EB848A71F4F676EBAB76D3AC0B184@ORSMSX114.amr.corp.intel.com> Reply-To: musl@lists.openwall.com NNTP-Posting-Host: blaine.gmane.org Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-Trace: blaine.gmane.org 1474626141 9181 195.159.176.226 (23 Sep 2016 10:22:21 GMT) X-Complaints-To: usenet@blaine.gmane.org NNTP-Posting-Date: Fri, 23 Sep 2016 10:22:21 +0000 (UTC) User-Agent: Mutt/1.6.0 (2016-04-01) Cc: LeMay@port70.net, Michael To: musl@lists.openwall.com Original-X-From: musl-return-10523-gllmg-musl=m.gmane.org@lists.openwall.com Fri Sep 23 12:22:17 2016 Return-path: Envelope-to: gllmg-musl@m.gmane.org Original-Received: from mother.openwall.net ([195.42.179.200]) by blaine.gmane.org with smtp (Exim 4.84_2) (envelope-from ) id 1bnNcW-0001hu-CX for gllmg-musl@m.gmane.org; Fri, 23 Sep 2016 12:22:16 +0200 Original-Received: (qmail 18224 invoked by uid 550); 23 Sep 2016 10:22:15 -0000 Mailing-List: contact musl-help@lists.openwall.com; run by ezmlm Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-ID: Original-Received: (qmail 18206 invoked from network); 23 Sep 2016 10:22:14 -0000 Mail-Followup-To: musl@lists.openwall.com, LeMay@port70.net, Michael Content-Disposition: inline In-Reply-To: <390CE752059EB848A71F4F676EBAB76D3AC0B184@ORSMSX114.amr.corp.intel.com> Xref: news.gmane.org gmane.linux.lib.musl.general:10510 Archived-At: * LeMay, Michael [2016-09-22 23:00:45 +0000]: > I submitted several patches to LLVM and Clang to harden SafeStack using segmentation on x86-32 [1]. See [2] for general background on SafeStack. ... > [1] http://lists.llvm.org/pipermail/llvm-dev/2016-May/100346.html > [2] http://clang.llvm.org/docs/SafeStack.html is all runtime support in the libc with your patches? (i.e. no static linked interposition code from compiler-rt) can you call into non-instrumented code? (as Rich noted this looks like a new abi on i386) i assume the segmented variant breaks abi while the non-segmented one does not. what is the unsafe stack size of the main thread? how much is the resource usage overhead? what happens if unsafe stack allocation fails? how does the stack get deallocated at thread exit? i assume they are consistent with normal stack handling if this is done in musl.. except for the main thread. can signal handlers work with sigaltstack?