Lines Matching +full:level +full:- +full:sensitive

1 # SPDX-License-Identifier: GPL-2.0-only
7 def_bool $(cc-option,-ftrivial-auto-var-init=pattern)
10 def_bool $(cc-option,-ftrivial-auto-var-init=zero)
13 # Clang 16 and later warn about using the -enable flag, but it
15 …def_bool $(cc-option,-ftrivial-auto-var-init=zero -enable-trivial-auto-var-init-zero-knowing-it-wi…
34 This chooses the level of coverage over classes of potentially
47 bool "pattern-init everything (strongest)"
59 non-NULL values, buffer sizes and indices are very big. The
60 pattern is situation-specific; Clang on 64-bit uses 0xAA
62 which use 0xFF repeating (-NaN). Clang on 32-bit uses 0xFF
67 bool "zero-init everything (strongest and safest)"
78 (immediately NUL-terminated), pointers (NULL), indices
93 the lifetime of any sensitive stack contents and reduces
180 touching "cold" memory areas. Most cases see 3-5% impact. Some
184 def_bool $(cc-option,-fzero-call-used-regs=used-gpr)
186 # https://github.com/llvm/llvm-project/issues/59242
193 At the end of functions, always zero any caller-used register
199 generated "write-what-where" gadgets) in the resulting kernel
212 # https://github.com/llvm/llvm-project/issues/53645
245 Minimal integrity checking in the linked-list manipulation routines
264 def_bool $(cc-option,-frandomize-layout-seed-file=/dev/null)
266 # Clang 16 due to https://github.com/llvm/llvm-project/issues/60349
270 prompt "Randomize layout of sensitive kernel structures"
277 marked with __randomize_layout, will be randomized at compile-time.
303 Fully randomize the member layout of sensitive
315 bool "Limit randomization of structure layout to cache-lines"
319 Randomization of sensitive kernel structures will make a
320 best effort at restricting randomization to cacheline-sized