Kconfig (19952a92037e752f9d3bbbad552d596f9a56e146) | Kconfig (389ee0c2ffedf5819dccc2c67dd15757c4550765) |
---|---|
1config ARM 2 bool 3 default y 4 select ARCH_BINFMT_ELF_RANDOMIZE_PIE 5 select ARCH_HAS_ATOMIC64_DEC_IF_POSITIVE 6 select ARCH_HAS_TICK_BROADCAST if GENERIC_CLOCKEVENTS_BROADCAST 7 select ARCH_HAVE_CUSTOM_GPIO_H 8 select ARCH_MIGHT_HAVE_PC_PARPORT --- 16 unchanged lines hidden (view full) --- 25 select HARDIRQS_SW_RESEND 26 select HAVE_ARCH_JUMP_LABEL if !XIP_KERNEL 27 select HAVE_ARCH_KGDB 28 select HAVE_ARCH_SECCOMP_FILTER if (AEABI && !OABI_COMPAT) 29 select HAVE_ARCH_TRACEHOOK 30 select HAVE_BPF_JIT 31 select HAVE_CONTEXT_TRACKING 32 select HAVE_C_RECORDMCOUNT | 1config ARM 2 bool 3 default y 4 select ARCH_BINFMT_ELF_RANDOMIZE_PIE 5 select ARCH_HAS_ATOMIC64_DEC_IF_POSITIVE 6 select ARCH_HAS_TICK_BROADCAST if GENERIC_CLOCKEVENTS_BROADCAST 7 select ARCH_HAVE_CUSTOM_GPIO_H 8 select ARCH_MIGHT_HAVE_PC_PARPORT --- 16 unchanged lines hidden (view full) --- 25 select HARDIRQS_SW_RESEND 26 select HAVE_ARCH_JUMP_LABEL if !XIP_KERNEL 27 select HAVE_ARCH_KGDB 28 select HAVE_ARCH_SECCOMP_FILTER if (AEABI && !OABI_COMPAT) 29 select HAVE_ARCH_TRACEHOOK 30 select HAVE_BPF_JIT 31 select HAVE_CONTEXT_TRACKING 32 select HAVE_C_RECORDMCOUNT |
33 select HAVE_CC_STACKPROTECTOR | |
34 select HAVE_DEBUG_KMEMLEAK 35 select HAVE_DMA_API_DEBUG 36 select HAVE_DMA_ATTRS 37 select HAVE_DMA_CONTIGUOUS if MMU 38 select HAVE_DYNAMIC_FTRACE if (!XIP_KERNEL) 39 select HAVE_FTRACE_MCOUNT_RECORD if (!XIP_KERNEL) 40 select HAVE_FUNCTION_GRAPH_TRACER if (!THUMB2_KERNEL) 41 select HAVE_FUNCTION_TRACER if (!XIP_KERNEL) --- 881 unchanged lines hidden (view full) --- 923source "arch/arm/mach-ep93xx/Kconfig" 924 925source "arch/arm/mach-footbridge/Kconfig" 926 927source "arch/arm/mach-gemini/Kconfig" 928 929source "arch/arm/mach-highbank/Kconfig" 930 | 33 select HAVE_DEBUG_KMEMLEAK 34 select HAVE_DMA_API_DEBUG 35 select HAVE_DMA_ATTRS 36 select HAVE_DMA_CONTIGUOUS if MMU 37 select HAVE_DYNAMIC_FTRACE if (!XIP_KERNEL) 38 select HAVE_FTRACE_MCOUNT_RECORD if (!XIP_KERNEL) 39 select HAVE_FUNCTION_GRAPH_TRACER if (!THUMB2_KERNEL) 40 select HAVE_FUNCTION_TRACER if (!XIP_KERNEL) --- 881 unchanged lines hidden (view full) --- 922source "arch/arm/mach-ep93xx/Kconfig" 923 924source "arch/arm/mach-footbridge/Kconfig" 925 926source "arch/arm/mach-gemini/Kconfig" 927 928source "arch/arm/mach-highbank/Kconfig" 929 |
930source "arch/arm/mach-hisi/Kconfig" 931 |
|
931source "arch/arm/mach-integrator/Kconfig" 932 933source "arch/arm/mach-iop32x/Kconfig" 934 935source "arch/arm/mach-iop33x/Kconfig" 936 937source "arch/arm/mach-iop13xx/Kconfig" 938 --- 913 unchanged lines hidden (view full) --- 1852 execution. By using pipes or other transports made available to 1853 the process as file descriptors supporting the read/write 1854 syscalls, it's possible to isolate those applications in 1855 their own address space using seccomp. Once seccomp is 1856 enabled via prctl(PR_SET_SECCOMP), it cannot be disabled 1857 and the task is only allowed to execute a few safe syscalls 1858 defined by each seccomp mode. 1859 | 932source "arch/arm/mach-integrator/Kconfig" 933 934source "arch/arm/mach-iop32x/Kconfig" 935 936source "arch/arm/mach-iop33x/Kconfig" 937 938source "arch/arm/mach-iop13xx/Kconfig" 939 --- 913 unchanged lines hidden (view full) --- 1853 execution. By using pipes or other transports made available to 1854 the process as file descriptors supporting the read/write 1855 syscalls, it's possible to isolate those applications in 1856 their own address space using seccomp. Once seccomp is 1857 enabled via prctl(PR_SET_SECCOMP), it cannot be disabled 1858 and the task is only allowed to execute a few safe syscalls 1859 defined by each seccomp mode. 1860 |
1861config CC_STACKPROTECTOR 1862 bool "Enable -fstack-protector buffer overflow detection (EXPERIMENTAL)" 1863 help 1864 This option turns on the -fstack-protector GCC feature. This 1865 feature puts, at the beginning of functions, a canary value on 1866 the stack just before the return address, and validates 1867 the value just before actually returning. Stack based buffer 1868 overflows (that need to overwrite this return address) now also 1869 overwrite the canary, which gets detected and the attack is then 1870 neutralized via a kernel panic. 1871 This feature requires gcc version 4.2 or above. 1872 |
|
1860config SWIOTLB 1861 def_bool y 1862 1863config IOMMU_HELPER 1864 def_bool SWIOTLB 1865 1866config XEN_DOM0 1867 def_bool y --- 396 unchanged lines hidden --- | 1873config SWIOTLB 1874 def_bool y 1875 1876config IOMMU_HELPER 1877 def_bool SWIOTLB 1878 1879config XEN_DOM0 1880 def_bool y --- 396 unchanged lines hidden --- |