Bug#724320: gmp: x32: sizeof(mp_limb_t)!=sizeof(void*) is not supported by GAP and PARI

Mike Frysinger vapier at gentoo.org
Fri Oct 4 07:45:35 CEST 2013


On Wednesday 02 October 2013 17:03:44 Vincent Lefevre wrote:
> On 2013-10-02 09:16:10 -0700, Daniel Schepler wrote:
> > Is your kernel built with x32 support?  (Check for CONFIG_X86_X32=y in
> > /boot/config-*.)
> 
> It doesn't, and there's actually a RFE:
> 
>   http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=708070
> 
> but it's not enabled for "security" reasons (I won't discuss that).

x32 doesn't increase the attack surface if you already have x86 ABI compat 
enabled.  it merely does a merge of x86 & x86_64 syscalls where it makes 
sense.
-mike
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 836 bytes
Desc: This is a digitally signed message part.
URL: <http://gmplib.org/list-archives/gmp-discuss/attachments/20131004/63b939f0/attachment.bin>


More information about the gmp-discuss mailing list