<div style="line-height:1.7;color:#000000;font-size:14px;font-family:arial"><div>Hello</div><div><br></div><div>em, this can protect the stack, so what about the memory buffer allocated through the kmalloc or vmalloc ?</div><div><br></div><div>Thanks,</div><div>HeChuan</div><div><div><pre><br>At&nbsp;2014-05-29&nbsp;12:01:10,Valdis.Kletnieks@vt.edu&nbsp;wrote:
&gt;On&nbsp;Thu,&nbsp;29&nbsp;May&nbsp;2014&nbsp;11:13:09&nbsp;+0800,&nbsp;RS&nbsp;said:
&gt;&gt;&nbsp;How&nbsp;to&nbsp;detect&nbsp;the&nbsp;kernel&nbsp;memory&nbsp;overflow&nbsp;errors?
&gt;
&gt;With&nbsp;a&nbsp;sufficiently&nbsp;recent&nbsp;gcc,&nbsp;you&nbsp;can&nbsp;build&nbsp;the&nbsp;kernel
&gt;with&nbsp;CONFIG_CC_STACKPROTECTOR=y&nbsp;which&nbsp;will&nbsp;put&nbsp;a&nbsp;canary
&gt;value&nbsp;on&nbsp;the&nbsp;stack&nbsp;and&nbsp;check&nbsp;it&nbsp;for&nbsp;corruption.
</pre></div></div></div>