From: Alejandro Colomar <alx.manpages@gmail.com>
To: Sam James <sam@gentoo.org>
Cc: Mingye Wang <arthur200126@gmail.com>, linux-man@vger.kernel.org
Subject: Re: [PATCHv2] feature_test_macros.7: document clang fortify support
Date: Wed, 5 Apr 2023 04:21:29 +0200 [thread overview]
Message-ID: <421345a1-06be-8364-99c8-9fe269db284f@gmail.com> (raw)
In-Reply-To: <87edozqekm.fsf@gentoo.org>
[-- Attachment #1.1: Type: text/plain, Size: 1501 bytes --]
Hi Sam, Mingye,
On 4/5/23 03:53, Sam James wrote:
>
> Alejandro Colomar <alx.manpages@gmail.com> writes:
>
>> [[PGP Signed Part:Undecided]]
>> Hi Mingye,
>>
>> On 4/3/23 18:24, Mingye Wang wrote:
>>> Hi Alex,
>>>
>>> On Sat, Apr 1, 2023 at 5:56 AM Alejandro Colomar wrote:
>>>> If it's just a reference to the software, that is fine. If it's a
>>>> reference to the version, then I want it to be greppable.
>>>>
>>>
>>> Is my patch attached to the last message all good, or is there
>>> anything more to do?
>>
>> Sorry about the delay; I'm a bit overloaded. Did you check Sam's
>> objection?
>
> I'm happy now after a clarification was made (libssp does more than I thought
> it did).
Thanks! I applied the patch, with Acked-by: Sam James <sam@gentoo.org>.
Cheers,
Alex
>
>>
>> On 3/23/23 06:38, Sam James wrote:
>>> The patch looks OK to me in terms of the content, apart from the libssp
>>> mention. libssp and stack smashing protection overall is distinct from
>>> fortification.
>>>
>>> SSP is where stack canaries are emitted and their value is checked
>>> later on to see if they're intact. Fortification is where certain
>>> functions are replaced with variants that check the size of their
>>> arguments e.g. dst & src and ensure they're big enough. They're distinct.
>>
>> Thanks,
>> Alex
>>
>>>
>>> Thanks,
>>> Mingye
>
--
<http://www.alejandro-colomar.es/>
GPG key fingerprint: A9348594CE31283A826FBDD8D57633D441E25BB5
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 833 bytes --]
next prev parent reply other threads:[~2023-04-05 2:21 UTC|newest]
Thread overview: 11+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-03-20 8:15 Request to update feature_test_macros(7) wrt FORTIFY_SOURCE Mingye Wang
2023-03-20 8:47 ` Alejandro Colomar
2023-03-22 8:39 ` [PATCH] feature_test_macros.7: document clang fortify support Mingye Wang
2023-03-22 17:19 ` Alejandro Colomar
2023-03-24 6:07 ` [PATCHv2] " Mingye Wang
2023-03-31 21:56 ` Alejandro Colomar
2023-04-03 16:24 ` Mingye Wang
2023-04-05 1:32 ` Alejandro Colomar
2023-04-05 1:53 ` Sam James
2023-04-05 2:21 ` Alejandro Colomar [this message]
2023-03-23 5:38 ` [PATCH] " Sam James
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=421345a1-06be-8364-99c8-9fe269db284f@gmail.com \
--to=alx.manpages@gmail.com \
--cc=arthur200126@gmail.com \
--cc=linux-man@vger.kernel.org \
--cc=sam@gentoo.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox