Navigation: Linux Kernel Driver DataBase - web LKDDB: Main index - C index
The Linux kernel configuration item CONFIG_CC_STACKPROTECTOR
has multiple definitions:
arch/Kconfig
The configuration item CONFIG_CC_STACKPROTECTOR:
(none)
Set when a stack-protector mode is enabled, so that the build can enable kernel-side support for the GCC feature.
arch/sh/Kconfig
The configuration item CONFIG_CC_STACKPROTECTOR:
CONFIG_SUPERH32
This option turns on the -fstack-protector GCC feature. This feature puts, at the beginning of functions, a canary value on the stack just before the return address, and validates the value just before actually returning. Stack based buffer overflows (that need to overwrite this return address) now also overwrite the canary, which gets detected and the attack is then neutralized via a kernel panic.
This feature requires gcc version 4.2 or above.
arch/mips/Kconfig
The configuration item CONFIG_CC_STACKPROTECTOR:
(none)
This option turns on the -fstack-protector GCC feature. This feature puts, at the beginning of functions, a canary value on the stack just before the return address, and validates the value just before actually returning. Stack based buffer overflows (that need to overwrite this return address) now also overwrite the canary, which gets detected and the attack is then neutralized via a kernel panic.
This feature requires gcc version 4.2 or above.
arch/arm/Kconfig
The configuration item CONFIG_CC_STACKPROTECTOR:
(none)
This option turns on the -fstack-protector GCC feature. This feature puts, at the beginning of functions, a canary value on the stack just before the return address, and validates the value just before actually returning. Stack based buffer overflows (that need to overwrite this return address) now also overwrite the canary, which gets detected and the attack is then neutralized via a kernel panic. This feature requires gcc version 4.2 or above.
arch/x86/Kconfig
The configuration item CONFIG_CC_STACKPROTECTOR:
(none)
This option turns on the -fstack-protector GCC feature. This feature puts, at the beginning of functions, a canary value on the stack just before the return address, and validates the value just before actually returning. Stack based buffer overflows (that need to overwrite this return address) now also overwrite the canary, which gets detected and the attack is then neutralized via a kernel panic.
This feature requires gcc version 4.2 or above, or a distribution gcc with the feature backported. Older versions are automatically detected and for those versions, this configuration option is ignored. (and a warning is printed during bootup)
arch/x86/Kconfig
The configuration item CONFIG_CC_STACKPROTECTOR:
(none)
This option turns on the -fstack-protector GCC feature. This feature puts, at the beginning of functions, a canary value on the stack just before the return address, and validates the value just before actually returning. Stack based buffer overflows (that need to overwrite this return address) now also overwrite the canary, which gets detected and the attack is then neutralized via a kernel panic.
This feature requires gcc version 4.2 or above, or a distribution gcc with the feature backported. Older versions are automatically detected and for those versions, this configuration option is ignored. (and a warning is printed during bootup)
arch/x86_64/Kconfig
The configuration item CONFIG_CC_STACKPROTECTOR:
CONFIG_EXPERIMENTAL
This option turns on the -fstack-protector GCC feature. This feature puts, at the beginning of critical functions, a canary value on the stack just before the return address, and validates the value just before actually returning. Stack based buffer overflows (that need to overwrite this return address) now also overwrite the canary, which gets detected and the attack is then neutralized via a kernel panic.
This feature requires gcc version 4.2 or above, or a distribution gcc with the feature backported. Older versions are automatically detected and for those versions, this configuration option is ignored.
arch/x86_64/Kconfig
The configuration item CONFIG_CC_STACKPROTECTOR:
CONFIG_EXPERIMENTAL
This option turns on the -fstack-protector GCC feature. This feature puts, at the beginning of critical functions, a canary value on the stack just before the return address, and validates the value just before actually returning. Stack based buffer overflows (that need to overwrite this return address) now also overwrite the canary, which gets detected and the attack is then neutralized via a kernel panic.
This feature requires gcc version 4.2 or above, or a distribution gcc with the feature backported. Older versions are automatically detected and for those versions, this configuration option is ignored.
Raw data from LKDDb:
(none)
This page is automaticly generated with free (libre, open) software lkddb(see lkddb-sources).
The data is retrived from:
Popular queries:
Navigation: Linux Kernel Driver DataBase - web LKDDB: main index - C index
Automatically generated (in year 2025). See also LKDDb sources on GitLab