We have had guard page support for close to two years now and it's time we start enabling it by default to catch stack overflows.
Signed-off-by: Ahmad Fatoum <a.fat...@pengutronix.de> --- lib/Kconfig.hardening | 1 + 1 file changed, 1 insertion(+) diff --git a/lib/Kconfig.hardening b/lib/Kconfig.hardening index 658de4953aa1..53bf4d5bb956 100644 --- a/lib/Kconfig.hardening +++ b/lib/Kconfig.hardening @@ -153,6 +153,7 @@ config FORTIFY_SOURCE config STACK_GUARD_PAGE bool "Place guard page to catch stack overflows" depends on ARM && MMU + default y help When enabled, barebox places a faulting guard page to catch total stack usage exceeding CONFIG_STACK_SIZE. On overflows, that hit -- 2.39.5