new ssp kernel patch - testers needed

Robert Connolly robert at linuxfromscratch.org
Thu Jan 6 14:26:08 PST 2005


It does nothing :(
-fstack-protector-all in the kernel has no effect. I added this to init.c:

void trigger_overflow() {
       char buf0[10];
       char buf1[] = "012345678901234567890";
#if 1
       printk("Triggering an overflow by copying [%d] of data into [%d] of 
space\n",
               sizeof(buf1), sizeof(buf0));
       strcpy(buf0, buf1);
#endif
}
...
trigger_overflow();

The kernel panicked, but not because of ssp. Looks like there's no reason to 
use the kernel ssp patch.

robert



More information about the hlfs-dev mailing list