From 7e6d23b1719191f83af7d3e7b134a90889b5c1ef Mon Sep 17 00:00:00 2001 From: Corinne Dashjr Date: Tue, 28 Apr 2015 14:48:28 +0000 Subject: Bugfix: Grammar fixes --- doc/build-unix.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) (limited to 'doc/build-unix.md') diff --git a/doc/build-unix.md b/doc/build-unix.md index 0984f689a8..f70bf7f1fe 100644 --- a/doc/build-unix.md +++ b/doc/build-unix.md @@ -195,12 +195,12 @@ Hardening enables the following features: * Position Independent Executable Build position independent code to take advantage of Address Space Layout Randomization - offered by some kernels. An attacker who is able to cause execution of code at an arbitrary - memory location is thwarted if he or she doesn't know where anything useful is located. + offered by some kernels. Attackers who can cause execution of code at an arbitrary memory + location are thwarted if they don't know where anything useful is located. The stack and heap are randomly located by default but this allows the code section to be randomly located as well. - On an Amd64 processor where a library was not compiled with -fPIC, this will cause an error + On an AMD64 processor where a library was not compiled with -fPIC, this will cause an error such as: "relocation R_X86_64_32 against `......' can not be used when making a shared object;" To test that you have built PIE executable, install scanelf, part of paxutils, and use: -- cgit v1.2.3