From: Peter Müller Date: Tue, 14 Apr 2020 14:32:47 +0000 (+0200) Subject: kernel: enable page poisoning on x86_64 X-Git-Url: http://git.ipfire.org/?a=commitdiff_plain;h=efd508e9f60d17d8d2205ba8ef3f03407c720fa8;p=people%2Fms%2Fipfire-2.x.git kernel: enable page poisoning on x86_64 This is already active on i586 and prevents information leaks from freed data. Cc: Arne Fitzenreiter Signed-off-by: Peter Müller Signed-off-by: Arne Fitzenreiter --- diff --git a/config/kernel/kernel.config.x86_64-ipfire b/config/kernel/kernel.config.x86_64-ipfire index e4ad2fd3ff..333e9244d4 100644 --- a/config/kernel/kernel.config.x86_64-ipfire +++ b/config/kernel/kernel.config.x86_64-ipfire @@ -6327,7 +6327,9 @@ CONFIG_DEBUG_KERNEL=y # # CONFIG_PAGE_EXTENSION is not set # CONFIG_DEBUG_PAGEALLOC is not set -# CONFIG_PAGE_POISONING is not set +CONFIG_PAGE_POISONING=y +# CONFIG_PAGE_POISONING_NO_SANITY is not set +CONFIG_PAGE_POISONING_ZERO=y # CONFIG_DEBUG_PAGE_REF is not set # CONFIG_DEBUG_RODATA_TEST is not set # CONFIG_DEBUG_OBJECTS is not set