https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87875

--- Comment #5 from Jakub Jelinek <jakub at gcc dot gnu.org> ---
(In reply to Martin Liška from comment #4)
> Created attachment 44956 [details]
> Patch candidate
> 
> @Jakub: What do you think about the suggested patch? May I attempt to
> mainline it?

No, see above, that is not a good idea from security POV.
You want to do that only if the real stack is executable.
Dunno whether one should e.g. parse /proc/self/maps and find the stack in
there, check the protection flags.

Reply via email to