Hello,
It is possible to determine what hardening security option (eg. aslr, aslr_pie, wx, honor_sbrk, ...) causes core dump of a specific application?
$truss don't give details about it, and there is nothing at /var/crash.
The only way is disabling one by one and testing?
Second question, it is possible to avoid this restrictions only for specific application?
An example, Firefox don't like stackgap. But I dont want to set kern.elf64.aslr.stack_gap=0
I read something about elfctl to avoid these restrictions only for a certain applications.
But I dont found a good documentation about this feature.
Thanks,
Grether
It is possible to determine what hardening security option (eg. aslr, aslr_pie, wx, honor_sbrk, ...) causes core dump of a specific application?
$truss don't give details about it, and there is nothing at /var/crash.
The only way is disabling one by one and testing?
Second question, it is possible to avoid this restrictions only for specific application?
An example, Firefox don't like stackgap. But I dont want to set kern.elf64.aslr.stack_gap=0
I read something about elfctl to avoid these restrictions only for a certain applications.
But I dont found a good documentation about this feature.
Thanks,
Grether