diff options
| -rw-r--r-- | arch/x86_64/Kconfig | 24 |
1 files changed, 24 insertions, 0 deletions
diff --git a/arch/x86_64/Kconfig b/arch/x86_64/Kconfig index 927b392a4aa0..0c61d0019dd7 100644 --- a/arch/x86_64/Kconfig +++ b/arch/x86_64/Kconfig | |||
| @@ -533,6 +533,30 @@ config SECCOMP | |||
| 533 | 533 | ||
| 534 | If unsure, say Y. Only embedded should say N here. | 534 | If unsure, say Y. Only embedded should say N here. |
| 535 | 535 | ||
| 536 | config CC_STACKPROTECTOR | ||
| 537 | bool "Enable -fstack-protector buffer overflow detection (EXPRIMENTAL)" | ||
| 538 | depends on EXPERIMENTAL | ||
| 539 | help | ||
| 540 | This option turns on the -fstack-protector GCC feature. This | ||
| 541 | feature puts, at the beginning of critical functions, a canary | ||
| 542 | value on the stack just before the return address, and validates | ||
| 543 | the value just before actually returning. Stack based buffer | ||
| 544 | overflows (that need to overwrite this return address) now also | ||
| 545 | overwrite the canary, which gets detected and the attack is then | ||
| 546 | neutralized via a kernel panic. | ||
| 547 | |||
| 548 | This feature requires gcc version 4.2 or above, or a distribution | ||
| 549 | gcc with the feature backported. Older versions are automatically | ||
| 550 | detected and for those versions, this configuration option is ignored. | ||
| 551 | |||
| 552 | config CC_STACKPROTECTOR_ALL | ||
| 553 | bool "Use stack-protector for all functions" | ||
| 554 | depends on CC_STACKPROTECTOR | ||
| 555 | help | ||
| 556 | Normally, GCC only inserts the canary value protection for | ||
| 557 | functions that use large-ish on-stack buffers. By enabling | ||
| 558 | this option, GCC will be asked to do this for ALL functions. | ||
| 559 | |||
| 536 | source kernel/Kconfig.hz | 560 | source kernel/Kconfig.hz |
| 537 | 561 | ||
| 538 | config REORDER | 562 | config REORDER |
