Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 11 Nov 2015 14:32:31 +0100
From: Paolo Bonzini <>
To:, Kees Cook <>
Cc: PaX Team <>, Brad Spengler <>,
 Greg KH <>, Theodore Tso <>,
 Josh Triplett <>
Subject: Re: Proposal for kernel self protection features

On 07/11/2015 22:34, Emese Revfy wrote:
>>>        * gcc intentional overflow: gcc computes some expressions by overflow
>>>           when it optimizes. Sadly it is doing this in the front end where
>>>           there is no plugin support. Most of these false positives I handle
>>>           from the plugin or sometimes I patch the kernel source code.
>>>           There are some unsolved issues.
>> Has there been any discussion with gcc folks about this problem?
> I never tried it. PaXTeam has some open tickets
> (e.g., for a long time so
> because of it I haven't any courage.

I'm not sure I still count as a gcc guy, having averaged at most 1 patch
a year for some time now.  However, I surely would like to know more
about it, and perhaps can look into fixing some of the easier issues.
Do open tickets and CC me (I'm on the GCC tracker).


Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.