Current-Users archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: Stack Smash Protection disabled (was HEADS-UP: Stack Smash Protection enabled by default for amd64 and i386)
In article <20091115164742.GA22265%colwyn.zhadum.org.uk@localhost>,
Matthias Scheler <tron%zhadum.org.uk@localhost> wrote:
>On Sun, Nov 15, 2009 at 05:34:03PM +0100, Rhialto wrote:
>> For instance, variable-size arrays on the stack are a C99 standard feature.
>> I expect to encounter it more and more.
>
>I on the other hand expect it to go away.
>
>> If the SSP implementation can't handle it, it is useless.
>
>The stack smash protection code in GCC doesn't break dynamic stack
>allocations. It just cannot protect functions that use them which
>will result in warning if "-Wstack-protector" is used. The resulting
>binary will however work without any problems.
It would be nice if there was an attribute to shut this up.
christos
Home |
Main Index |
Thread Index |
Old Index