diff options
Diffstat (limited to 'scripts/gcc-plugins')
-rw-r--r-- | scripts/gcc-plugins/Kconfig | 51 |
1 files changed, 0 insertions, 51 deletions
diff --git a/scripts/gcc-plugins/Kconfig b/scripts/gcc-plugins/Kconfig index 352f03878a1e..80220ed26a35 100644 --- a/scripts/gcc-plugins/Kconfig +++ b/scripts/gcc-plugins/Kconfig | |||
@@ -108,57 +108,6 @@ config GCC_PLUGIN_RANDSTRUCT_PERFORMANCE | |||
108 | in structures. This reduces the performance hit of RANDSTRUCT | 108 | in structures. This reduces the performance hit of RANDSTRUCT |
109 | at the cost of weakened randomization. | 109 | at the cost of weakened randomization. |
110 | 110 | ||
111 | config GCC_PLUGIN_STACKLEAK | ||
112 | bool "Erase the kernel stack before returning from syscalls" | ||
113 | depends on GCC_PLUGINS | ||
114 | depends on HAVE_ARCH_STACKLEAK | ||
115 | help | ||
116 | This option makes the kernel erase the kernel stack before | ||
117 | returning from system calls. That reduces the information which | ||
118 | kernel stack leak bugs can reveal and blocks some uninitialized | ||
119 | stack variable attacks. | ||
120 | |||
121 | The tradeoff is the performance impact: on a single CPU system kernel | ||
122 | compilation sees a 1% slowdown, other systems and workloads may vary | ||
123 | and you are advised to test this feature on your expected workload | ||
124 | before deploying it. | ||
125 | |||
126 | This plugin was ported from grsecurity/PaX. More information at: | ||
127 | * https://grsecurity.net/ | ||
128 | * https://pax.grsecurity.net/ | ||
129 | |||
130 | config STACKLEAK_TRACK_MIN_SIZE | ||
131 | int "Minimum stack frame size of functions tracked by STACKLEAK" | ||
132 | default 100 | ||
133 | range 0 4096 | ||
134 | depends on GCC_PLUGIN_STACKLEAK | ||
135 | help | ||
136 | The STACKLEAK gcc plugin instruments the kernel code for tracking | ||
137 | the lowest border of the kernel stack (and for some other purposes). | ||
138 | It inserts the stackleak_track_stack() call for the functions with | ||
139 | a stack frame size greater than or equal to this parameter. | ||
140 | If unsure, leave the default value 100. | ||
141 | |||
142 | config STACKLEAK_METRICS | ||
143 | bool "Show STACKLEAK metrics in the /proc file system" | ||
144 | depends on GCC_PLUGIN_STACKLEAK | ||
145 | depends on PROC_FS | ||
146 | help | ||
147 | If this is set, STACKLEAK metrics for every task are available in | ||
148 | the /proc file system. In particular, /proc/<pid>/stack_depth | ||
149 | shows the maximum kernel stack consumption for the current and | ||
150 | previous syscalls. Although this information is not precise, it | ||
151 | can be useful for estimating the STACKLEAK performance impact for | ||
152 | your workloads. | ||
153 | |||
154 | config STACKLEAK_RUNTIME_DISABLE | ||
155 | bool "Allow runtime disabling of kernel stack erasing" | ||
156 | depends on GCC_PLUGIN_STACKLEAK | ||
157 | help | ||
158 | This option provides 'stack_erasing' sysctl, which can be used in | ||
159 | runtime to control kernel stack erasing for kernels built with | ||
160 | CONFIG_GCC_PLUGIN_STACKLEAK. | ||
161 | |||
162 | config GCC_PLUGIN_ARM_SSP_PER_TASK | 111 | config GCC_PLUGIN_ARM_SSP_PER_TASK |
163 | bool | 112 | bool |
164 | depends on GCC_PLUGINS && ARM | 113 | depends on GCC_PLUGINS && ARM |