Kconfig (22ec1a2aea73b9dfe340dff7945bd85af4cc6280) Kconfig (385ce0ea4c078517fa51c261882c4e72fba53005)
1#
2# Security configuration
3#
4
5menu "Security options"
6
7source security/keys/Kconfig
8

--- 40 unchanged lines hidden (view full) ---

49 bool "Socket and Networking Security Hooks"
50 depends on SECURITY
51 help
52 This enables the socket and networking security hooks.
53 If enabled, a security module can use these hooks to
54 implement socket and networking access controls.
55 If you are unsure how to answer this question, answer N.
56
1#
2# Security configuration
3#
4
5menu "Security options"
6
7source security/keys/Kconfig
8

--- 40 unchanged lines hidden (view full) ---

49 bool "Socket and Networking Security Hooks"
50 depends on SECURITY
51 help
52 This enables the socket and networking security hooks.
53 If enabled, a security module can use these hooks to
54 implement socket and networking access controls.
55 If you are unsure how to answer this question, answer N.
56
57config PAGE_TABLE_ISOLATION
58 bool "Remove the kernel mapping in user mode"
59 depends on X86_64 && !UML
60 help
61 This feature reduces the number of hardware side channels by
62 ensuring that the majority of kernel addresses are not mapped
63 into userspace.
64
65 See Documentation/x86/pagetable-isolation.txt for more details.
66
57config SECURITY_INFINIBAND
58 bool "Infiniband Security Hooks"
59 depends on SECURITY && INFINIBAND
60 help
61 This enables the Infiniband security hooks.
62 If enabled, a security module can use these hooks to
63 implement Infiniband access controls.
64 If you are unsure how to answer this question, answer N.

--- 73 unchanged lines hidden (view full) ---

138 The heap allocator implements __check_heap_object() for
139 validating memory ranges against heap object sizes in
140 support of CONFIG_HARDENED_USERCOPY.
141
142config HARDENED_USERCOPY
143 bool "Harden memory copies between kernel and userspace"
144 depends on HAVE_HARDENED_USERCOPY_ALLOCATOR
145 select BUG
67config SECURITY_INFINIBAND
68 bool "Infiniband Security Hooks"
69 depends on SECURITY && INFINIBAND
70 help
71 This enables the Infiniband security hooks.
72 If enabled, a security module can use these hooks to
73 implement Infiniband access controls.
74 If you are unsure how to answer this question, answer N.

--- 73 unchanged lines hidden (view full) ---

148 The heap allocator implements __check_heap_object() for
149 validating memory ranges against heap object sizes in
150 support of CONFIG_HARDENED_USERCOPY.
151
152config HARDENED_USERCOPY
153 bool "Harden memory copies between kernel and userspace"
154 depends on HAVE_HARDENED_USERCOPY_ALLOCATOR
155 select BUG
146 imply STRICT_DEVMEM
147 help
148 This option checks for obviously wrong memory regions when
149 copying memory to/from the kernel (via copy_to_user() and
150 copy_from_user() functions) by rejecting memory ranges that
151 are larger than the specified heap object, span multiple
152 separately allocated pages, are not on the process stack,
153 or are part of the kernel text. This kills entire classes
154 of heap overflow exploits and similar kernel memory exposures.

--- 102 unchanged lines hidden ---
156 help
157 This option checks for obviously wrong memory regions when
158 copying memory to/from the kernel (via copy_to_user() and
159 copy_from_user() functions) by rejecting memory ranges that
160 are larger than the specified heap object, span multiple
161 separately allocated pages, are not on the process stack,
162 or are part of the kernel text. This kills entire classes
163 of heap overflow exploits and similar kernel memory exposures.

--- 102 unchanged lines hidden ---