Kconfig (19952a92037e752f9d3bbbad552d596f9a56e146) Kconfig (389ee0c2ffedf5819dccc2c67dd15757c4550765)
1config ARM
2 bool
3 default y
4 select ARCH_BINFMT_ELF_RANDOMIZE_PIE
5 select ARCH_HAS_ATOMIC64_DEC_IF_POSITIVE
6 select ARCH_HAS_TICK_BROADCAST if GENERIC_CLOCKEVENTS_BROADCAST
7 select ARCH_HAVE_CUSTOM_GPIO_H
8 select ARCH_MIGHT_HAVE_PC_PARPORT

--- 16 unchanged lines hidden (view full) ---

25 select HARDIRQS_SW_RESEND
26 select HAVE_ARCH_JUMP_LABEL if !XIP_KERNEL
27 select HAVE_ARCH_KGDB
28 select HAVE_ARCH_SECCOMP_FILTER if (AEABI && !OABI_COMPAT)
29 select HAVE_ARCH_TRACEHOOK
30 select HAVE_BPF_JIT
31 select HAVE_CONTEXT_TRACKING
32 select HAVE_C_RECORDMCOUNT
1config ARM
2 bool
3 default y
4 select ARCH_BINFMT_ELF_RANDOMIZE_PIE
5 select ARCH_HAS_ATOMIC64_DEC_IF_POSITIVE
6 select ARCH_HAS_TICK_BROADCAST if GENERIC_CLOCKEVENTS_BROADCAST
7 select ARCH_HAVE_CUSTOM_GPIO_H
8 select ARCH_MIGHT_HAVE_PC_PARPORT

--- 16 unchanged lines hidden (view full) ---

25 select HARDIRQS_SW_RESEND
26 select HAVE_ARCH_JUMP_LABEL if !XIP_KERNEL
27 select HAVE_ARCH_KGDB
28 select HAVE_ARCH_SECCOMP_FILTER if (AEABI && !OABI_COMPAT)
29 select HAVE_ARCH_TRACEHOOK
30 select HAVE_BPF_JIT
31 select HAVE_CONTEXT_TRACKING
32 select HAVE_C_RECORDMCOUNT
33 select HAVE_CC_STACKPROTECTOR
34 select HAVE_DEBUG_KMEMLEAK
35 select HAVE_DMA_API_DEBUG
36 select HAVE_DMA_ATTRS
37 select HAVE_DMA_CONTIGUOUS if MMU
38 select HAVE_DYNAMIC_FTRACE if (!XIP_KERNEL)
39 select HAVE_FTRACE_MCOUNT_RECORD if (!XIP_KERNEL)
40 select HAVE_FUNCTION_GRAPH_TRACER if (!THUMB2_KERNEL)
41 select HAVE_FUNCTION_TRACER if (!XIP_KERNEL)

--- 881 unchanged lines hidden (view full) ---

923source "arch/arm/mach-ep93xx/Kconfig"
924
925source "arch/arm/mach-footbridge/Kconfig"
926
927source "arch/arm/mach-gemini/Kconfig"
928
929source "arch/arm/mach-highbank/Kconfig"
930
33 select HAVE_DEBUG_KMEMLEAK
34 select HAVE_DMA_API_DEBUG
35 select HAVE_DMA_ATTRS
36 select HAVE_DMA_CONTIGUOUS if MMU
37 select HAVE_DYNAMIC_FTRACE if (!XIP_KERNEL)
38 select HAVE_FTRACE_MCOUNT_RECORD if (!XIP_KERNEL)
39 select HAVE_FUNCTION_GRAPH_TRACER if (!THUMB2_KERNEL)
40 select HAVE_FUNCTION_TRACER if (!XIP_KERNEL)

--- 881 unchanged lines hidden (view full) ---

922source "arch/arm/mach-ep93xx/Kconfig"
923
924source "arch/arm/mach-footbridge/Kconfig"
925
926source "arch/arm/mach-gemini/Kconfig"
927
928source "arch/arm/mach-highbank/Kconfig"
929
930source "arch/arm/mach-hisi/Kconfig"
931
931source "arch/arm/mach-integrator/Kconfig"
932
933source "arch/arm/mach-iop32x/Kconfig"
934
935source "arch/arm/mach-iop33x/Kconfig"
936
937source "arch/arm/mach-iop13xx/Kconfig"
938

--- 913 unchanged lines hidden (view full) ---

1852 execution. By using pipes or other transports made available to
1853 the process as file descriptors supporting the read/write
1854 syscalls, it's possible to isolate those applications in
1855 their own address space using seccomp. Once seccomp is
1856 enabled via prctl(PR_SET_SECCOMP), it cannot be disabled
1857 and the task is only allowed to execute a few safe syscalls
1858 defined by each seccomp mode.
1859
932source "arch/arm/mach-integrator/Kconfig"
933
934source "arch/arm/mach-iop32x/Kconfig"
935
936source "arch/arm/mach-iop33x/Kconfig"
937
938source "arch/arm/mach-iop13xx/Kconfig"
939

--- 913 unchanged lines hidden (view full) ---

1853 execution. By using pipes or other transports made available to
1854 the process as file descriptors supporting the read/write
1855 syscalls, it's possible to isolate those applications in
1856 their own address space using seccomp. Once seccomp is
1857 enabled via prctl(PR_SET_SECCOMP), it cannot be disabled
1858 and the task is only allowed to execute a few safe syscalls
1859 defined by each seccomp mode.
1860
1861config CC_STACKPROTECTOR
1862 bool "Enable -fstack-protector buffer overflow detection (EXPERIMENTAL)"
1863 help
1864 This option turns on the -fstack-protector GCC feature. This
1865 feature puts, at the beginning of functions, a canary value on
1866 the stack just before the return address, and validates
1867 the value just before actually returning. Stack based buffer
1868 overflows (that need to overwrite this return address) now also
1869 overwrite the canary, which gets detected and the attack is then
1870 neutralized via a kernel panic.
1871 This feature requires gcc version 4.2 or above.
1872
1860config SWIOTLB
1861 def_bool y
1862
1863config IOMMU_HELPER
1864 def_bool SWIOTLB
1865
1866config XEN_DOM0
1867 def_bool y

--- 396 unchanged lines hidden ---
1873config SWIOTLB
1874 def_bool y
1875
1876config IOMMU_HELPER
1877 def_bool SWIOTLB
1878
1879config XEN_DOM0
1880 def_bool y

--- 396 unchanged lines hidden ---