Vulnerability Development mailing list archives

Re: stackguard-like embedded protection


From: antirez <antirez () linuxcare com>
Date: Wed, 13 Sep 2000 16:44:40 +0200

On Wed, Sep 13, 2000 at 08:20:41PM +0900, Hiroaki Etoh wrote:
I tested GCC aix, xlC aix, and Microsoft Visual C++. They don't place the
'volatile' variable next to the RET.  Could someone test the following program
in the other compilers. I am very interested in such information.

Can you describe how GCC aix behaves?
Maybe we can distinguish classes of compilers.

#include <stdio.h>
int main()
{
   volatile int x=0;
   char buf[20];
   printf("%s!! x:%x buf:%x\n", ((char*)&x>buf)?"ok":"no", &x, buf);
}

Performing this kind of tests it's important to try with and without
optimization. I hope that people will report both the output.

antirez

--
Salvatore Sanfilippo, Open Source Developer, Linuxcare Italia spa
+39.049.80 43 411 tel, +39.049.80 43 412 fax
antirez () linuxcare com, http://www.linuxcare.com/
Linuxcare. Support for the revolution.


Current thread: