Date: Mon, 18 Nov 2019 19:09:00 +0000 From: Patrick Schleizer <adrelanos@...eup.net> To: lkrg-users@...ts.openwall.com Subject: LKRG compilation hardening flags Could you please kindly have a look and let me know if something needs fixing? (This is what happened building LKRG using DKMS. Shouldn't make a difference though, since it is using the usual upstream makefile.) checksec -f /lib/modules/4.19.0-6-amd64/updates/dkms/p_lkrg.ko RELRO STACK CANARY NX PIE RPATH RUNPATH Symbols FORTIFY Fortified Fortifiable FILE No RELRO Canary found NX disabled Not an ELF file No RPATH No RUNPATH 866 Symbols Yes 0 2 /lib/modules/4.19.0-6-amd64/updates/dkms/p_lkrg.ko hardening-check /lib/modules/4.19.0-6-amd64/updates/dkms/p_lkrg.ko /lib/modules/4.19.0-6-amd64/updates/dkms/p_lkrg.ko: Position Independent Executable: not a known ELF type!? () Stack protected: yes Fortify Source functions: no, only unprotected functions found! Read-only relocations: no, non-ELF (ignored) Immediate binding: no, non-ELF (ignored) I guess, should something need fixing, it's a task for the upstream makefile? Kind regards, Patrick
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.