At 23:38 +0100 29/12/10, Vinzenz Hersche wrote:
Glenn, i like to try this for a kernel..  it should need just be a patched
kernel (so need to recompile) and a loaded kernel or what do you think?
i don't know so much about cross-compile, but i like to learn it.. if also
someone else like to join the try or so, you're welcome :)

Timo, you'r right about X.. that's a big hole.. how is it on qtmoko, because
of no x-server?
-----------------------------------------------
Timo schrieb am Mittwoch 29 Dezember 2010:
...

More:

http://pax.grsecurity.net/docs/index.html

PaX performance impact:
http://www.pjvenda.net/linux/doc/pax-performance/
Quote: "...
Overall Conclusion

It is my opinion that PaX is a very good patchset, being an important step towards improved operating system and therefore services' security. The memory protection plays an important role but the effectiveness of the patchset is maximized in conjunction with the other mechanisms supplied. grsecurity includes PaX and presents a very complete approach for improved linux security.

Some applications that were badly written, aggressively optimized or derived from very old and thus crippled code may not work with this kind of security patches. There is no hope for those applications other than two solutions:

* Selectively disable PaX features with useland tool on misbehaving binaries, thus lowering the security level (not possible on all setups without some serious changes)

* Change or have someone change the application to run in protected memory and randomized mapping environments
..."


_______________________________________________
Openmoko community mailing list
community@lists.openmoko.org
http://lists.openmoko.org/mailman/listinfo/community

Reply via email to