Kconfig.hardening (9a87ffc99ec8eb8d35eed7c4f816d75f5cc9662e) Kconfig.hardening (aebc7b0d8d91bbc69e976909963046bc48bca4fd)
1# SPDX-License-Identifier: GPL-2.0-only
2menu "Kernel hardening options"
3
4config GCC_PLUGIN_STRUCTLEAK
5 bool
6 help
7 While the kernel is built with warnings enabled for any missed
8 stack variable initializations, this warning is silenced for

--- 265 unchanged lines hidden (view full) ---

274 generated "write-what-where" gadgets) in the resulting kernel
275 image. This has a less than 1% performance impact on most
276 workloads. Image size growth depends on architecture, and should
277 be evaluated for suitability. For example, x86_64 grows by less
278 than 1%, and arm64 grows by about 5%.
279
280endmenu
281
1# SPDX-License-Identifier: GPL-2.0-only
2menu "Kernel hardening options"
3
4config GCC_PLUGIN_STRUCTLEAK
5 bool
6 help
7 While the kernel is built with warnings enabled for any missed
8 stack variable initializations, this warning is silenced for

--- 265 unchanged lines hidden (view full) ---

274 generated "write-what-where" gadgets) in the resulting kernel
275 image. This has a less than 1% performance impact on most
276 workloads. Image size growth depends on architecture, and should
277 be evaluated for suitability. For example, x86_64 grows by less
278 than 1%, and arm64 grows by about 5%.
279
280endmenu
281
282menu "Hardening of kernel data structures"
283
284config LIST_HARDENED
285 bool "Check integrity of linked list manipulation"
286 help
287 Minimal integrity checking in the linked-list manipulation routines
288 to catch memory corruptions that are not guaranteed to result in an
289 immediate access fault.
290
291 If unsure, say N.
292
293endmenu
294
282config CC_HAS_RANDSTRUCT
283 def_bool $(cc-option,-frandomize-layout-seed-file=/dev/null)
284 # Randstruct was first added in Clang 15, but it isn't safe to use until
285 # Clang 16 due to https://github.com/llvm/llvm-project/issues/60349
286 depends on !CC_IS_CLANG || CLANG_VERSION >= 160000
287
288choice
289 prompt "Randomize layout of sensitive kernel structures"

--- 69 unchanged lines hidden ---
295config CC_HAS_RANDSTRUCT
296 def_bool $(cc-option,-frandomize-layout-seed-file=/dev/null)
297 # Randstruct was first added in Clang 15, but it isn't safe to use until
298 # Clang 16 due to https://github.com/llvm/llvm-project/issues/60349
299 depends on !CC_IS_CLANG || CLANG_VERSION >= 160000
300
301choice
302 prompt "Randomize layout of sensitive kernel structures"

--- 69 unchanged lines hidden ---