You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
George and I started working on this independently before I had bugzilla access and my patch ended up for review first, so we are working on that one now instead - D30886.
Extended Description
Currently, LLD leaves padding between executable sections as-is, so they are 0. That is not desirable for a few reasons.
Disassemblers would interpret the sequences of 0 bytes at end of each function as machine instructions and print out bogus disassembly.
Leaving executable 0 bytes could potentially make some attack easier.
We want to fill gaps with trap instructions. On x86 and x86-64, that is 0xcc, for example.
The text was updated successfully, but these errors were encountered: