Updated: October 28, 2024 |
Stack cookies provide protection against stack buffer overflow on stack-allocated variables, which prevents program misbehaviours.
They are enabled by any of the following compiler options:
By default, qcc implicitly uses the -fstack-protector-strong option. However, when you directly invoke either ntoaarch64-gcc or ntox86_64-gcc, -fstack-protector-strong is not implicitly used.
In addition, qcc does not implicitly use -fstack-protector-strong when you specify any of the following compiler or linker options:
Binaries built for QNX Neutrino are built with a non-executable stack by default. The stack’s executable state is found in a QNX-specific ELF note of type QNT_STACK.
The following example command checks the executable state of the less utility:
$ elfnote -t QNT_STACK -p less QNX specific note (name = QNX, type = 3) type : QNT_STACK stacksize : 0 stackalloc : 4096 executable : no hex : 000000000010000001000000
For more information on QNX Neutrino note types, see the elfnote entry in the Utilities Reference.
You can use the qchecksec utility to determine both whether stack cookies are enabled for a binary and a stack's executable state. See the qchecksec entry in the Utilities Reference.