1 |
-----BEGIN PGP SIGNED MESSAGE----- |
2 |
Hash: SHA1 |
3 |
|
4 |
Ciaran McCreesh wrote: |
5 |
|
6 |
> Personally, I would be *very* wary about giving our x86 users a 5% |
7 |
> performance hit just to enable a hack which might protect you if your |
8 |
> app happens to be badly coded in a particular way... The option's there |
9 |
> for anyone that wants it, but turning it on by default probably isn't |
10 |
> wise... |
11 |
> |
12 |
|
13 |
5% ?? |
14 |
|
15 |
I have to ask what you're talking about. Please read the IBM papers, |
16 |
specifically, |
17 |
|
18 |
http://www.research.ibm.com/trl/projects/security/ssp/node5.html#SECTION00051000000000000000 |
19 |
|
20 |
Please read the entire evaluation and not just the overhead on function |
21 |
calls. That example is not based on real computing, the bottom example's |
22 |
however, are. |
23 |
|
24 |
SSP really is a good thing, and it really is nearly free. In fact, due |
25 |
to compiler requirements, the -O2 may actually yield faster code under |
26 |
many situations. This is a real world solution to a real world |
27 |
problem. The idea here is that we should be convincing people to |
28 |
*adopt* these things, not move away from them based on false judgments. |
29 |
Even Microsoft has realized the value of guard injection. |
30 |
|
31 |
Cheers, |
32 |
- -Dave |
33 |
|
34 |
- -- |
35 |
| Dave Monnier - dmonnier@××.edu - http://php.indiana.edu/~dmonnier/ | |
36 |
| Lead Security Engineer, Information Technology Security Office | |
37 |
| Office of the VP for Information Technology, Indiana University | |
38 |
-----BEGIN PGP SIGNATURE----- |
39 |
Version: GnuPG v1.2.4 (GNU/Linux) |
40 |
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org |
41 |
|
42 |
iD8DBQFBUitrBIf6jlONJjIRApo7AJ93fFfeRN18qHgcpdyKIuXuMD1t8wCgx2iG |
43 |
tUjlZuWcOnL03ONa02XzJl0= |
44 |
=KFzD |
45 |
-----END PGP SIGNATURE----- |
46 |
|
47 |
-- |
48 |
gentoo-dev@g.o mailing list |