Navigation: Linux Kernel Driver DataBase - web LKDDB: Main index - C index         

CONFIG_CC_STACKPROTECTOR: Enable -fstack-protector buffer overflow detection

General informations

The Linux kernel configuration item CONFIG_CC_STACKPROTECTOR has multiple definitions:

found in arch/Kconfig

The configuration item CONFIG_CC_STACKPROTECTOR:

Help text

Set when a stack-protector mode is enabled, so that the build can enable kernel-side support for the GCC feature.

Enable -fstack-protector buffer overflow detection (EXPERIMENTAL) found in arch/arm/Kconfig

The configuration item CONFIG_CC_STACKPROTECTOR:

Help text

This option turns on the -fstack-protector GCC feature. This feature puts, at the beginning of functions, a canary value on the stack just before the return address, and validates the value just before actually returning. Stack based buffer overflows (that need to overwrite this return address) now also overwrite the canary, which gets detected and the attack is then neutralized via a kernel panic. This feature requires gcc version 4.2 or above.

Enable -fstack-protector buffer overflow detection (EXPERIMENTAL) found in arch/mips/Kconfig

The configuration item CONFIG_CC_STACKPROTECTOR:

Help text

This option turns on the -fstack-protector GCC feature. This feature puts, at the beginning of functions, a canary value on the stack just before the return address, and validates the value just before actually returning. Stack based buffer overflows (that need to overwrite this return address) now also overwrite the canary, which gets detected and the attack is then neutralized via a kernel panic.

This feature requires gcc version 4.2 or above.

Enable -fstack-protector buffer overflow detection (EXPERIMENTAL) found in arch/sh/Kconfig

The configuration item CONFIG_CC_STACKPROTECTOR:

Help text

This option turns on the -fstack-protector GCC feature. This feature puts, at the beginning of functions, a canary value on the stack just before the return address, and validates the value just before actually returning. Stack based buffer overflows (that need to overwrite this return address) now also overwrite the canary, which gets detected and the attack is then neutralized via a kernel panic.

This feature requires gcc version 4.2 or above.

Enable -fstack-protector buffer overflow detection (EXPERIMENTAL) found in arch/x86/Kconfig

The configuration item CONFIG_CC_STACKPROTECTOR:

Help text

This option turns on the -fstack-protector GCC feature. This feature puts, at the beginning of functions, a canary value on the stack just before the return address, and validates the value just before actually returning. Stack based buffer overflows (that need to overwrite this return address) now also overwrite the canary, which gets detected and the attack is then neutralized via a kernel panic.

This feature requires gcc version 4.2 or above, or a distribution gcc with the feature backported. Older versions are automatically detected and for those versions, this configuration option is ignored. (and a warning is printed during bootup)

Enable -fstack-protector buffer overflow detection (EXPERIMENTAL) found in arch/x86_64/Kconfig

The configuration item CONFIG_CC_STACKPROTECTOR:

Help text

This option turns on the -fstack-protector GCC feature. This feature puts, at the beginning of critical functions, a canary value on the stack just before the return address, and validates the value just before actually returning. Stack based buffer overflows (that need to overwrite this return address) now also overwrite the canary, which gets detected and the attack is then neutralized via a kernel panic.

This feature requires gcc version 4.2 or above, or a distribution gcc with the feature backported. Older versions are automatically detected and for those versions, this configuration option is ignored.

Enable -fstack-protector buffer overflow detection (EXPRIMENTAL) found in arch/x86_64/Kconfig

The configuration item CONFIG_CC_STACKPROTECTOR:

Help text

This option turns on the -fstack-protector GCC feature. This feature puts, at the beginning of critical functions, a canary value on the stack just before the return address, and validates the value just before actually returning. Stack based buffer overflows (that need to overwrite this return address) now also overwrite the canary, which gets detected and the attack is then neutralized via a kernel panic.

This feature requires gcc version 4.2 or above, or a distribution gcc with the feature backported. Older versions are automatically detected and for those versions, this configuration option is ignored.

Enable -fstack-protector buffer overflow detection found in arch/x86/Kconfig

The configuration item CONFIG_CC_STACKPROTECTOR:

Help text

This option turns on the -fstack-protector GCC feature. This feature puts, at the beginning of functions, a canary value on the stack just before the return address, and validates the value just before actually returning. Stack based buffer overflows (that need to overwrite this return address) now also overwrite the canary, which gets detected and the attack is then neutralized via a kernel panic.

This feature requires gcc version 4.2 or above, or a distribution gcc with the feature backported. Older versions are automatically detected and for those versions, this configuration option is ignored. (and a warning is printed during bootup)

Hardware

LKDDb

Raw data from LKDDb:

Sources

This page is automaticly generated with free (libre, open) software lkddb(see lkddb-sources).

The data is retrived from:

Automatic links from google (and ads)

Custom Search

Popular queries:

Navigation: Linux Kernel Driver DataBase - web LKDDB: main index - C index

Automatically generated (in year 2014) with gen-web-lkddb.py in lkddb-sources.