...../.config/alire/cache/dependencies/gnat_native_12.2.1_11f3b811/bin/../lib/gcc/x86_64-pc-linux-gnu/12.2.0/../../../../x86_64-pc-linux-gnu/bin/ld:
warning: kobio0.o: requires executable stack (because the
.note.GNU-stack section is executable)
reinert <rei...@gmail.com> writes:
...../.config/alire/cache/dependencies/gnat_native_12.2.1_11f3b811/bin/../lib/gcc/x86_64-pc-linux-gnu/12.2.0/../../../../x86_64-pc-linux-gnu/bin/ld:Creating executable code on the stack is one way of getting malicious
warning: kobio0.o: requires executable stack (because the
.note.GNU-stack section is executable)
code past virus checkers. Modern OSs will prevent this approach.
So far as I know, GNAT will only do this to implement "trampolines", but see here: https://docs.adacore.com/live/wave/gnat_rm/html/gnat_rm/gnat_rm/standard_and_implementation_defined_restrictions.html#no-implicit-dynamic-code
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 379 |
Nodes: | 16 (2 / 14) |
Uptime: | 44:35:51 |
Calls: | 8,141 |
Calls today: | 4 |
Files: | 13,085 |
Messages: | 5,858,054 |