aboutsummaryrefslogtreecommitdiffstats
path: root/arch/x86/Kconfig
diff options
context:
space:
mode:
Diffstat (limited to 'arch/x86/Kconfig')
-rw-r--r--arch/x86/Kconfig30
1 files changed, 17 insertions, 13 deletions
diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig
index 1f4844505765..2a75931567c4 100644
--- a/arch/x86/Kconfig
+++ b/arch/x86/Kconfig
@@ -391,6 +391,13 @@ config X86_RDC321X
391 as R-8610-(G). 391 as R-8610-(G).
392 If you don't have one of these chips, you should say N here. 392 If you don't have one of these chips, you should say N here.
393 393
394config X86_UV
395 bool "SGI Ultraviolet"
396 depends on X86_64
397 help
398 This option is needed in order to support SGI Ultraviolet systems.
399 If you don't have one of these, you should say N here.
400
394config SCHED_OMIT_FRAME_POINTER 401config SCHED_OMIT_FRAME_POINTER
395 def_bool y 402 def_bool y
396 prompt "Single-depth WCHAN output" 403 prompt "Single-depth WCHAN output"
@@ -1341,13 +1348,17 @@ config SECCOMP
1341 1348
1342 If unsure, say Y. Only embedded should say N here. 1349 If unsure, say Y. Only embedded should say N here.
1343 1350
1351config CC_STACKPROTECTOR_ALL
1352 bool
1353
1344config CC_STACKPROTECTOR 1354config CC_STACKPROTECTOR
1345 bool "Enable -fstack-protector buffer overflow detection (EXPERIMENTAL)" 1355 bool "Enable -fstack-protector buffer overflow detection (EXPERIMENTAL)"
1346 depends on X86_64 && EXPERIMENTAL && BROKEN 1356 depends on X86_64
1357 select CC_STACKPROTECTOR_ALL
1347 help 1358 help
1348 This option turns on the -fstack-protector GCC feature. This 1359 This option turns on the -fstack-protector GCC feature. This
1349 feature puts, at the beginning of critical functions, a canary 1360 feature puts, at the beginning of functions, a canary value on
1350 value on the stack just before the return address, and validates 1361 the stack just before the return address, and validates
1351 the value just before actually returning. Stack based buffer 1362 the value just before actually returning. Stack based buffer
1352 overflows (that need to overwrite this return address) now also 1363 overflows (that need to overwrite this return address) now also
1353 overwrite the canary, which gets detected and the attack is then 1364 overwrite the canary, which gets detected and the attack is then
@@ -1355,15 +1366,8 @@ config CC_STACKPROTECTOR
1355 1366
1356 This feature requires gcc version 4.2 or above, or a distribution 1367 This feature requires gcc version 4.2 or above, or a distribution
1357 gcc with the feature backported. Older versions are automatically 1368 gcc with the feature backported. Older versions are automatically
1358 detected and for those versions, this configuration option is ignored. 1369 detected and for those versions, this configuration option is
1359 1370 ignored. (and a warning is printed during bootup)
1360config CC_STACKPROTECTOR_ALL
1361 bool "Use stack-protector for all functions"
1362 depends on CC_STACKPROTECTOR
1363 help
1364 Normally, GCC only inserts the canary value protection for
1365 functions that use large-ish on-stack buffers. By enabling
1366 this option, GCC will be asked to do this for ALL functions.
1367 1371
1368source kernel/Kconfig.hz 1372source kernel/Kconfig.hz
1369 1373