This is the mail archive of the
libc-alpha@sourceware.org
mailing list for the glibc project.
Re: [PATCH] Bug 20662: checking whether x86_64-pc-linux-gnu-gcc implicitly enables -fstack-protector no (32bit gcc 6.2.0 pie and ssp enable)
- From: Magnus Granberg <zorry at gentoo dot org>
- To: libc-alpha at sourceware dot org
- Date: Sat, 22 Oct 2016 15:02:52 +0200
- Subject: Re: [PATCH] Bug 20662: checking whether x86_64-pc-linux-gnu-gcc implicitly enables -fstack-protector no (32bit gcc 6.2.0 pie and ssp enable)
- Authentication-results: sourceware.org; auth=none
- References: <1784772.eOhSpX4WhJ@laptop1.gw.ume.nu> <5809D8A0.7030906@arm.com>
fredag 21 oktober 2016 kl. 09:58:08 CEST skrev Szabolcs Nagy:
> On 20/10/16 21:01, Magnus Granberg wrote:
> > When glibc get compile with gcc 6.2 that have been configured with
> >
> > --enable-default-pie and --enable-default-ssp. The check that check if
> > the
> >
> > compiler use -fstack-protector as default fail on the 32bit part.
>
> i'm not against this patch, just note that any reasonable ssp
> implementation would not make a call in case of failure, but
> crash the application immediately, i hope gcc will have an
> option in the future to do that, which means this check will
> not work (the test would have to look for canary access, which
> is target specific).
Thanks