mirror of
https://github.com/vincentmli/bpfire.git
synced 2026-04-10 02:55:55 +02:00
87f3b1e5682dbf13c9e2203ade95b55cbc91c626
This patch turns on instrumentation to avoid skipping the guard page in large stack frames. Without this flag, vulnerabilities can result in where the stack overlaps with the heap, or thread stacks spill into other regions of memory. This flag in only available on x86_64 and aarch64. Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Description
No description provided
Languages
Perl
70.4%
Shell
23%
C
4%
Python
0.6%
Makefile
0.5%
Other
1.4%