Skip to content

Commit 9346389

Browse files
ismaildscho
authored andcommitted
Enable DEP and ASLR
Enable DEP (Data Execution Prevention) and ASLR (Address Space Layout Randomization) support. This applies to both 32bit and 64bit builds and makes it substantially harder to exploit security holes in Git by offering a much more unpredictable attack surface. ASLR interferes with GDB's ability to set breakpoints. A similar issue holds true when compiling with -O2 (in which case single-stepping is messed up because GDB cannot map the code back to the original source code properly). Therefore we simply enable ASLR only when an optimization flag is present in the CFLAGS, using it as an indicator that the developer does not want to debug in GDB anyway. Signed-off-by: İsmail Dönmez <[email protected]> Signed-off-by: Johannes Schindelin <[email protected]>
1 parent 39a716d commit 9346389

File tree

1 file changed

+6
-0
lines changed

1 file changed

+6
-0
lines changed

config.mak.uname

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -548,6 +548,12 @@ else
548548
ifeq ($(shell expr "$(uname_R)" : '2\.'),2)
549549
# MSys2
550550
prefix = /usr/
551+
# Enable DEP
552+
BASIC_LDFLAGS += -Wl,--nxcompat
553+
# Enable ASLR (unless debugging)
554+
ifneq (,$(findstring -O,$(CFLAGS)))
555+
BASIC_LDFLAGS += -Wl,--dynamicbase
556+
endif
551557
ifeq (MINGW32,$(MSYSTEM))
552558
prefix = /mingw32
553559
BASIC_LDFLAGS += -Wl,--pic-executable,-e,_mainCRTStartup

0 commit comments

Comments
 (0)