Files
ladybird/Kernel
Brian Gianforcaro 458244c0c1 Kernel: Enable -ftrivial-auto-var-init as a security mitigation
The flag will automatically initialize all variables to a pattern based
on it's type. The goal being here is to eradicate an entire bug class
of issues that can originate from uninitialized stack memory.

Some examples include:

 - Kernel information disclosure, where uninitialized struct members
   or struct padding is copied back to usermode, leaking kernel
   information such as stack or heap addresses, or secret data like
   stack cookies.

 - Control flow based on uninitialized memory can cause a variety of
   issues at runtime, including stack corruptions like buffer
   overflows, heap corruptions due to deleting stray pointers.
   Even basic logic bugs can result from control flow operating on
   uninitialized data.

As of GCC 12 this flag is now supported.
https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=a25e0b5e6ac8a77a71c229e0a7b744603365b0e9

Clang has already supported it for a few releases.
https://reviews.llvm.org/D54604
2022-06-24 12:35:36 +01:00
..
2022-06-19 09:05:35 +02:00
2022-04-01 21:24:45 +01:00
2022-06-19 09:05:35 +02:00
2022-04-01 21:24:45 +01:00
2022-04-01 21:24:45 +01:00
2022-04-01 21:24:45 +01:00
2022-04-01 21:24:45 +01:00
2022-04-01 21:24:45 +01:00
2022-04-01 21:24:45 +01:00
2022-04-01 21:24:45 +01:00
2022-04-01 21:24:45 +01:00
2022-04-01 21:24:45 +01:00
2022-04-01 21:24:45 +01:00
2022-04-01 21:24:45 +01:00
2022-04-01 21:24:45 +01:00
2022-04-01 21:24:45 +01:00
2022-04-01 21:24:45 +01:00
2022-04-01 21:24:45 +01:00
2022-04-01 21:24:45 +01:00
2022-04-01 21:24:45 +01:00
2022-04-01 21:24:45 +01:00
2022-04-01 21:24:45 +01:00
2022-04-01 21:24:45 +01:00
2022-03-04 20:07:05 +01:00
2022-04-01 21:24:45 +01:00
2022-04-01 21:24:45 +01:00