Skip to content

Commit 2400c2e

Browse files
ismaildscho
authored andcommitted
Enable DEP and ASLR
Enable DEP (Data Execution Prevention) and ASLR (Address Space Layout Randomization) support. This applies to both 32bit and 64bit builds and makes it substantially harder to exploit security holes in Git by offering a much more unpredictable attack surface. ASLR interferes with GDB's ability to set breakpoints. A similar issue holds true when compiling with -O2 (in which case single-stepping is messed up because GDB cannot map the code back to the original source code properly). Therefore we simply enable ASLR only when an optimization flag is present in the CFLAGS, using it as an indicator that the developer does not want to debug in GDB anyway. Signed-off-by: İsmail Dönmez <[email protected]> Signed-off-by: Johannes Schindelin <[email protected]>
1 parent 397aa63 commit 2400c2e

File tree

1 file changed

+6
-0
lines changed

1 file changed

+6
-0
lines changed

config.mak.uname

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -576,6 +576,12 @@ else
576576
ifneq ($(shell expr "$(uname_R)" : '1\.'),2)
577577
# MSys2
578578
prefix = /usr/
579+
# Enable DEP
580+
BASIC_LDFLAGS += -Wl,--nxcompat
581+
# Enable ASLR (unless debugging)
582+
ifneq (,$(findstring -O,$(CFLAGS)))
583+
BASIC_LDFLAGS += -Wl,--dynamicbase
584+
endif
579585
ifeq (MINGW32,$(MSYSTEM))
580586
prefix = /mingw32
581587
HOST_CPU = i686

0 commit comments

Comments
 (0)