...../.config/alire/cache/dependencies/gnat_native_12.2.1_11f3b811/bin/../lib/gcc/x86_64-pc-linux-gnu/12.2.0/../../../../x86_64-pc-linux-gnu/bin/ld:
warning: kobio0.o: requires executable stack (because the
.note.GNU-stack section is executable)
reinert <rei...@gmail.com> writes:
...../.config/alire/cache/dependencies/gnat_native_12.2.1_11f3b811/bin/../lib/gcc/x86_64-pc-linux-gnu/12.2.0/../../../../x86_64-pc-linux-gnu/bin/ld:Creating executable code on the stack is one way of getting malicious
warning: kobio0.o: requires executable stack (because the
.note.GNU-stack section is executable)
code past virus checkers. Modern OSs will prevent this approach.
So far as I know, GNAT will only do this to implement "trampolines", but see here: https://docs.adacore.com/live/wave/gnat_rm/html/gnat_rm/gnat_rm/standard_and_implementation_defined_restrictions.html#no-implicit-dynamic-code
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 546 |
Nodes: | 16 (2 / 14) |
Uptime: | 146:59:34 |
Calls: | 10,383 |
Calls today: | 8 |
Files: | 14,054 |
D/L today: |
2 files (1,861K bytes) |
Messages: | 6,417,722 |