|
@@ -125,6 +125,7 @@ config X86
|
|
select RTC_LIB
|
|
select RTC_LIB
|
|
select HAVE_DEBUG_STACKOVERFLOW
|
|
select HAVE_DEBUG_STACKOVERFLOW
|
|
select HAVE_IRQ_EXIT_ON_IRQ_STACK if X86_64
|
|
select HAVE_IRQ_EXIT_ON_IRQ_STACK if X86_64
|
|
|
|
+ select HAVE_CC_STACKPROTECTOR
|
|
|
|
|
|
config INSTRUCTION_DECODER
|
|
config INSTRUCTION_DECODER
|
|
def_bool y
|
|
def_bool y
|
|
@@ -1617,22 +1618,6 @@ config SECCOMP
|
|
|
|
|
|
If unsure, say Y. Only embedded should say N here.
|
|
If unsure, say Y. Only embedded should say N here.
|
|
|
|
|
|
-config CC_STACKPROTECTOR
|
|
|
|
- bool "Enable -fstack-protector buffer overflow detection"
|
|
|
|
- ---help---
|
|
|
|
- This option turns on the -fstack-protector GCC feature. This
|
|
|
|
- feature puts, at the beginning of functions, a canary value on
|
|
|
|
- the stack just before the return address, and validates
|
|
|
|
- the value just before actually returning. Stack based buffer
|
|
|
|
- overflows (that need to overwrite this return address) now also
|
|
|
|
- overwrite the canary, which gets detected and the attack is then
|
|
|
|
- neutralized via a kernel panic.
|
|
|
|
-
|
|
|
|
- This feature requires gcc version 4.2 or above, or a distribution
|
|
|
|
- gcc with the feature backported. Older versions are automatically
|
|
|
|
- detected and for those versions, this configuration option is
|
|
|
|
- ignored. (and a warning is printed during bootup)
|
|
|
|
-
|
|
|
|
source kernel/Kconfig.hz
|
|
source kernel/Kconfig.hz
|
|
|
|
|
|
config KEXEC
|
|
config KEXEC
|