On 04/03/2013 05:41 AM, Daniel P. Berrange wrote:
> From: "Daniel P. Berrange" <berra...@redhat.com>
> 
> PIE (position independent executable) adds security to executables
> by composing them entirely of position-independent code (PIC. The
> .so libraries already build with -fPIC. This adds -fPIE which is
> the equivalent to -fPIC, but for executables. This for allows Exec
> Shield to use address space layout randomization to prevent attackers
> from knowing where existing executable code is during a security
> attack using exploits that rely on knowing the offset of the
> executable code in the binary, such as return-to-libc attacks.
> 
> Signed-off-by: Daniel P. Berrange <berra...@redhat.com>
> ---

> +++ b/m4/virt-compile-pie.m4
> @@ -0,0 +1,13 @@
> +dnl
> +dnl Check for support for position independent executables

This new file is currently small enough to get away with no copyright
notice, but adding one now would be easier than scratching our heads
during a later audit on whether it is needed.

ACK, whether or not you add a copyright blurb to the new .m4 file.

-- 
Eric Blake   eblake redhat com    +1-919-301-3266
Libvirt virtualization library http://libvirt.org

Attachment: signature.asc
Description: OpenPGP digital signature

--
libvir-list mailing list
libvir-list@redhat.com
https://www.redhat.com/mailman/listinfo/libvir-list

Reply via email to