mirror of
git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
synced 2025-09-04 20:19:47 +08:00
configs/hardening: Enable CONFIG_KSTACK_ERASE
Since we can wipe the stack with both Clang and GCC plugins, enable this for the "hardening.config" for wider testing. Link: https://lore.kernel.org/r/20250717232519.2984886-12-kees@kernel.org Signed-off-by: Kees Cook <kees@kernel.org>
This commit is contained in:
parent
76261fc7d1
commit
4c56d9f7e7
@ -63,6 +63,9 @@ CONFIG_INIT_ON_ALLOC_DEFAULT_ON=y
|
|||||||
# Initialize all stack variables to zero on function entry.
|
# Initialize all stack variables to zero on function entry.
|
||||||
CONFIG_INIT_STACK_ALL_ZERO=y
|
CONFIG_INIT_STACK_ALL_ZERO=y
|
||||||
|
|
||||||
|
# Wipe kernel stack after syscall completion to reduce stale data lifetime.
|
||||||
|
CONFIG_KSTACK_ERASE=y
|
||||||
|
|
||||||
# Wipe RAM at reboot via EFI. For more details, see:
|
# Wipe RAM at reboot via EFI. For more details, see:
|
||||||
# https://trustedcomputinggroup.org/resource/pc-client-work-group-platform-reset-attack-mitigation-specification/
|
# https://trustedcomputinggroup.org/resource/pc-client-work-group-platform-reset-attack-mitigation-specification/
|
||||||
# https://bugzilla.redhat.com/show_bug.cgi?id=1532058
|
# https://bugzilla.redhat.com/show_bug.cgi?id=1532058
|
||||||
|
Loading…
Reference in New Issue
Block a user