Vulnerability Development mailing list archives

Re: stackguard-like embedded protection


From: "Bluefish (P.Magnusson)" <11a () GMX NET>
Date: Wed, 13 Sep 2000 22:21:29 +0200

I tested GCC aix, xlC aix, and Microsoft Visual C++. They don't place the
'volatile' variable next to the RET.  Could someone test the following program
in the other compilers. I am very interested in such information.

From the look of it, things are entirely allright with standard gcc &
linux i386. I'm wondering why the usage of "int". Perhaps it's good enough
for academic papers... But... Better to make things right from the start.

[bluefish@blue bluefish]$ cat > volatile.c
#include <stdio.h>
int main()
{
   volatile int x=0;
   char buf[20];
   printf("%s!! x:%x buf:%x\n", ((char*)&x>buf)?"ok":"no", &x, buf);
}
[bluefish@blue bluefish]$ gcc -o volatile volatile.c
[bluefish@blue bluefish]$ ./volatile
ok!! x:bffffce4 buf:bffffcd0

..:::::::::::::::::::::::::::::::::::::::::::::::::..
     http://www.11a.nu || http://bluefish.11a.nu
    eleventh alliance development & security team


Current thread: