Bug#724320: gmp: x32: sizeof(mp_limb_t)!=sizeof(void*) is not supported by GAP and PARI
Mike Frysinger
vapier at gentoo.org
Fri Oct 4 07:45:35 CEST 2013
On Wednesday 02 October 2013 17:03:44 Vincent Lefevre wrote:
> On 2013-10-02 09:16:10 -0700, Daniel Schepler wrote:
> > Is your kernel built with x32 support? (Check for CONFIG_X86_X32=y in
> > /boot/config-*.)
>
> It doesn't, and there's actually a RFE:
>
> http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=708070
>
> but it's not enabled for "security" reasons (I won't discuss that).
x32 doesn't increase the attack surface if you already have x86 ABI compat
enabled. it merely does a merge of x86 & x86_64 syscalls where it makes
sense.
-mike
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 836 bytes
Desc: This is a digitally signed message part.
URL: <http://gmplib.org/list-archives/gmp-discuss/attachments/20131004/63b939f0/attachment.bin>
More information about the gmp-discuss
mailing list