- Timestamp:
- 09/10/2022 10:30:11 PM (2 years ago)
- Branches:
- multilib, xry111/multilib
- Children:
- c49c1fb
- Parents:
- 3c20ad9 (diff), 8d3b254 (diff)
Note: this is a merge changeset, the changes displayed below correspond to the merge itself.
Use the(diff)
links above to see all the changes relative to each parent. - File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
chapter08/gcc.xml
r3c20ad9 r530771a 125 125 </variablelist> 126 126 127 <note id="pie-ssp-info" xreflabel="note on PIE and SSP"> 128 <para> 129 PIE (position independent executable) is a technique to produce 130 binary programs that can be loaded anywhere in memory. Together 131 with a feature named ASLR (Address Space Layout Randomization), 132 this allows programs to never have the same memory layout, 133 thus defeating attacks based on reproducible memory patterns. 134 </para> 135 <para> 136 SSP (Stack Smashing Protection) is a technique to ensure 137 that the parameter stack is not corrupted. Stack corruption can 138 for example alter the return address of a subroutine, 139 which would allow transferring control to an attacker program instead 140 of the original one. 141 </para> 142 </note> 143 127 144 <para>Compile the package:</para> 128 145 … … 157 174 url="&test-results;"/> and 158 175 <ulink url="https://gcc.gnu.org/ml/gcc-testresults/"/>.</para> 176 177 <para>In gcc, eleven tests, in the i386 test suite are known to FAIL. 178 It's because the test files do not account for the 179 <parameter>--enable-default-pie</parameter> option.</para> 159 180 160 181 <para>In g++, four tests related to PR100400 are known to be reported
Note:
See TracChangeset
for help on using the changeset viewer.