GCC 4.8.3+ Does anybody aware of Stack Smashing Protection ? (original) (raw)
Kim Barrett kim.barrett at oracle.com
Sat Jun 6 00:28:34 UTC 2015
- Previous message: GCC 4.8.3+ Does anybody aware of Stack Smashing Protection ?
- Next message: GCC 4.8.3+ Does anybody aware of Stack Smashing Protection ?
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
On Jun 5, 2015, at 3:31 PM, Dmitry Samersoff <dmitry.samersoff at oracle.com> wrote:
Hi Everybody, I'm not sure it affects hotspot but should we care about it? FYI: Beginning with GCC 4.8.3, Stack Smashing Protection (SSP) will be enabled by default. The 4.8 series will enable -fstack-protector while 4.9 and later enable -fstack-protector-strong.
I think -fstack-protector (at least) has been the default configuration for Ubuntu’s gcc for some time. I recall this helping me track down a highly intermittent bug a couple years ago at my previous job. When we upgraded Ubuntu versions, suddenly the bug became quite apparent - a fixed sized stack allocated buffer in a third-party library was being overrun.
- Previous message: GCC 4.8.3+ Does anybody aware of Stack Smashing Protection ?
- Next message: GCC 4.8.3+ Does anybody aware of Stack Smashing Protection ?
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]