new ssp kernel patch - testers needed

Robert Connolly robert at
Thu Jan 6 14:26:08 PST 2005

It does nothing :(
-fstack-protector-all in the kernel has no effect. I added this to init.c:

void trigger_overflow() {
       char buf0[10];
       char buf1[] = "012345678901234567890";
#if 1
       printk("Triggering an overflow by copying [%d] of data into [%d] of 
               sizeof(buf1), sizeof(buf0));
       strcpy(buf0, buf1);

The kernel panicked, but not because of ssp. Looks like there's no reason to 
use the kernel ssp patch.


More information about the hlfs-dev mailing list