"Strong" stack protection for GCC
"Strong" stack protection for GCC
Posted Feb 16, 2014 1:46 UTC (Sun) by mathstuf (subscriber, #69389)In reply to: "Strong" stack protection for GCC by kleptog
Parent article: "Strong" stack protection for GCC
The problem with a C abstraction is that on CPU models without instructions or flags for it, your simple addition is now how many instructions even in release and -Os builds.
And this is what Mill offers you…sane behavior with zero code change. If the compiler detects custom overflow detection or whatever, just change the flavor of 'add' to use. There's nothing against such optimizations (and other targets could implement it too, but if you now have to stall the pipeline to fetch a flag, it might not really be worth it overall). *Detecting* them might be hard to Turing-complete, but that never stopped us from parsing Perl or C++, has it ;) .
