[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #21514 [Applications/Tor Browser]: Deal with W^X backport bustage in upcoming ESR release



#21514: Deal with W^X backport bustage in upcoming ESR release
--------------------------------------+---------------------------------
 Reporter:  gk                        |          Owner:  arthuredelstein
     Type:  task                      |         Status:  needs_review
 Priority:  Very High                 |      Milestone:
Component:  Applications/Tor Browser  |        Version:
 Severity:  Critical                  |     Resolution:
 Keywords:  TorBrowserTeam201702      |  Actual Points:
Parent ID:                            |         Points:
 Reviewer:                            |        Sponsor:
--------------------------------------+---------------------------------
Changes (by arthuredelstein):

 * status:  accepted => needs_review


Comment:

 I believe I have finally got it working:

 https://github.com/arthuredelstein/tor-browser/commit/21514+4

 Thanks to Jan de Mooij for looking it over and helpful advice.

 So far I have tested on Linux, but this will need testing on Windows and
 Mac at least to show that it doesn't cause a crash. I am reasonably
 confident the code covers all three platforms.

 Jan also suggested we could examine the memory maps with and without the
 patch, using `gdb` or `/proc/pid/maps` on Linux and `VMMap` on Windows. He
 points out that without the patch we should hopefully observe multiple rwx
 regions.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/21514#comment:5>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs