torsdag 09 januari 2014 22.57.09 skrev  Pacho Ramos:
> El jue, 09-01-2014 a las 21:58 +0100, Magnus Granberg escribió:
> > Hi
> > 
> > Some time ago we discussed that we should enable stack smashing
> > (-fstack-protector) by default.  So we opened a bug to track this [1].
> > The affected Gcc version will be 4.8.2 and newer. Only amd64, x86, mips,
> > ppc, ppc64 and arm will be affected by this change.
> > 
> > You can turn off ssp by using the nossp USE flag or by adding
> > -fno-stack-protector to the CFLAGS and/or CXXFLAGS. We are using the same
> > patch as Debian/Ubuntu but with some Gentoo fixes.
> > 
> > The patch will move the sed for the HARD_CFLAGS, ALLCFLAGS and
> > ALLCXXFLAGS from do_gcc_PIE_patches() to make_gcc_hard().  We will
> > make_gcc_hard() the default for all Gcc versions 4.8 and newer, and turn
> > it on or off with hardened_gcc_works() that will make some sanity checks.
> > 
> > /Magnus
> 
> What are the advantages of disabling SSP to deserve that "special"
> handling via USE flag or easily disabling it appending the flag?
> 
> Thanks a lot for the info :)

If you want Gcc not to build stuff with ssp as default you turn on the nossp 
flag and rebuild Gcc.

/Magnus


Reply via email to