On 04/03/2013 05:41 AM, Daniel P. Berrange wrote: > From: "Daniel P. Berrange" <berrange@xxxxxxxxxx> > > PIE (position independent executable) adds security to executables > by composing them entirely of position-independent code (PIC. The > .so libraries already build with -fPIC. This adds -fPIE which is > the equivalent to -fPIC, but for executables. This for allows Exec > Shield to use address space layout randomization to prevent attackers > from knowing where existing executable code is during a security > attack using exploits that rely on knowing the offset of the > executable code in the binary, such as return-to-libc attacks. > > Signed-off-by: Daniel P. Berrange <berrange@xxxxxxxxxx> > --- > +++ b/m4/virt-compile-pie.m4 > @@ -0,0 +1,13 @@ > +dnl > +dnl Check for support for position independent executables This new file is currently small enough to get away with no copyright notice, but adding one now would be easier than scratching our heads during a later audit on whether it is needed. ACK, whether or not you add a copyright blurb to the new .m4 file. -- Eric Blake eblake redhat com +1-919-301-3266 Libvirt virtualization library http://libvirt.org
Attachment:
signature.asc
Description: OpenPGP digital signature
-- libvir-list mailing list libvir-list@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/libvir-list