Kconfig (d8da19fbdedd5852592fbba18a7348e3f09500e6) | Kconfig (e5f02b51fa0cb785e352e77271a65e96051b789b) |
---|---|
1# SPDX-License-Identifier: GPL-2.0 2config LOONGARCH 3 bool 4 default y 5 select ACPI 6 select ACPI_GENERIC_GSI if ACPI 7 select ACPI_MCFG if ACPI 8 select ACPI_SYSTEM_POWER_STATES_SUPPORT if ACPI --- 487 unchanged lines hidden (view full) --- 496config RELOCATABLE 497 bool "Relocatable kernel" 498 help 499 This builds the kernel as a Position Independent Executable (PIE), 500 which retains all relocation metadata required, so as to relocate 501 the kernel binary at runtime to a different virtual address from 502 its link address. 503 | 1# SPDX-License-Identifier: GPL-2.0 2config LOONGARCH 3 bool 4 default y 5 select ACPI 6 select ACPI_GENERIC_GSI if ACPI 7 select ACPI_MCFG if ACPI 8 select ACPI_SYSTEM_POWER_STATES_SUPPORT if ACPI --- 487 unchanged lines hidden (view full) --- 496config RELOCATABLE 497 bool "Relocatable kernel" 498 help 499 This builds the kernel as a Position Independent Executable (PIE), 500 which retains all relocation metadata required, so as to relocate 501 the kernel binary at runtime to a different virtual address from 502 its link address. 503 |
504config RANDOMIZE_BASE 505 bool "Randomize the address of the kernel (KASLR)" 506 depends on RELOCATABLE 507 help 508 Randomizes the physical and virtual address at which the 509 kernel image is loaded, as a security feature that 510 deters exploit attempts relying on knowledge of the location 511 of kernel internals. 512 513 The kernel will be offset by up to RANDOMIZE_BASE_MAX_OFFSET. 514 515 If unsure, say N. 516 517config RANDOMIZE_BASE_MAX_OFFSET 518 hex "Maximum KASLR offset" if EXPERT 519 depends on RANDOMIZE_BASE 520 range 0x0 0x10000000 521 default "0x01000000" 522 help 523 When KASLR is active, this provides the maximum offset that will 524 be applied to the kernel image. It should be set according to the 525 amount of physical RAM available in the target system. 526 527 This is limited by the size of the lower address memory, 256MB. 528 |
|
504config SECCOMP 505 bool "Enable seccomp to safely compute untrusted bytecode" 506 depends on PROC_FS 507 default y 508 help 509 This kernel feature is useful for number crunching applications 510 that may need to compute untrusted bytecode during their 511 execution. By using pipes or other transports made available to --- 59 unchanged lines hidden --- | 529config SECCOMP 530 bool "Enable seccomp to safely compute untrusted bytecode" 531 depends on PROC_FS 532 default y 533 help 534 This kernel feature is useful for number crunching applications 535 that may need to compute untrusted bytecode during their 536 execution. By using pipes or other transports made available to --- 59 unchanged lines hidden --- |