On 2015-04-17 21:16, Matthew Dillon wrote:
It applies to a randomization of the initial stack pointer for all
user programs exec()'d after you adjust the sysctl.  So it includes
ports binaries, applications, anything you compile yourself... pretty
much everything that is exec'd.

-Matt

On Fri, Apr 17, 2015 at 8:37 AM, Jeremiah Ford <[email protected]>
wrote:

Hello everyone,

I am trying to understand kernels a little bit better, and am
trying to learn about randomization.

My question is: Does kern.stackgap_random apply to all ports for
Dragonfly, or is this only the kernel? Or is it decided at compile
time? ... Or is my understanding way off?

Thanks

-JF

Thank you very much.

This also answered some follow up questions I would have had. I have had an introduction into security measures via OpenBSD, but I do not yet fully understand them. I guess I tend to ask too many questions.

-JF

Reply via email to