OXIESEC PANEL
- Current Dir:
/
/
usr
/
share
/
doc
/
gcc-7-base
Server IP: 139.59.38.164
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
11/10/2024 09:42:49 AM
rwxr-xr-x
📁
C++
-
01/31/2023 12:38:16 PM
rwxr-xr-x
📄
NEWS.gz
14.35 KB
12/04/2019 02:25:41 PM
rw-r--r--
📄
NEWS.html
54.73 KB
12/04/2019 02:25:41 PM
rw-r--r--
📄
README.Bugs
10.89 KB
12/04/2019 02:25:41 PM
rw-r--r--
📄
README.Debian.amd64.gz
4.29 KB
12/04/2019 02:25:41 PM
rw-r--r--
📄
README.ssp
1.14 KB
12/04/2019 02:25:41 PM
rw-r--r--
📄
TODO.Debian
1.61 KB
12/04/2019 02:25:41 PM
rw-r--r--
📄
changelog.Debian.gz
737 bytes
12/04/2019 02:25:41 PM
rw-r--r--
📄
changelog.gz
151.65 KB
11/14/2019 07:40:39 AM
rw-r--r--
📁
cilkrts
-
01/31/2023 12:30:36 PM
rwxr-xr-x
📄
copyright
62.58 KB
12/04/2019 02:25:41 PM
rw-r--r--
📁
fortran
-
10/28/2024 06:50:10 AM
rwxr-xr-x
📁
gcc
-
01/31/2023 12:30:36 PM
rwxr-xr-x
📄
gcc.css
3.15 KB
12/04/2019 02:25:41 PM
rw-r--r--
📁
gomp
-
01/31/2023 12:30:36 PM
rwxr-xr-x
📁
itm
-
01/31/2023 12:30:36 PM
rwxr-xr-x
📁
mpx
-
01/31/2023 12:30:36 PM
rwxr-xr-x
📁
quadmath
-
01/31/2023 12:30:36 PM
rwxr-xr-x
📁
sanitizer
-
01/31/2023 12:30:36 PM
rwxr-xr-x
Editing: README.ssp
Close
Stack smashing protection is a feature of GCC that enables a program to detect buffer overflows and immediately terminate execution, rather than continuing execution with corrupt internal data structures. It uses "canaries" and local variable reordering to reduce the likelihood of stack corruption through buffer overflows. Options that affect stack smashing protection: -fstack-protector Enables protection for functions that are vulnerable to stack smashing, such as those that call alloca() or use pointers. -fstack-protector-all Enables protection for all functions. -Wstack-protector Warns about functions that will not be protected. Only active when -fstack-protector has been used. Applications built with stack smashing protection should link with the ssp library by using the option "-lssp" for systems with glibc-2.3.x or older; glibc-2.4 and newer versions provide this functionality in libc. The Debian architectures alpha, hppa, ia64, m68k, mips, mipsel do not have support for stack smashing protection. More documentation can be found at the project's website: http://researchweb.watson.ibm.com/trl/projects/security/ssp/