lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 9 Feb 2022 19:57:48 +0100 From: Alexander Lobakin <alexandr.lobakin@...el.com> To: linux-hardening@...r.kernel.org, x86@...nel.org Cc: Alexander Lobakin <alexandr.lobakin@...el.com>, Borislav Petkov <bp@...en8.de>, Jesse Brandeburg <jesse.brandeburg@...el.com>, Kristen Carlson Accardi <kristen@...ux.intel.com>, Kees Cook <keescook@...omium.org>, Miklos Szeredi <miklos@...redi.hu>, Ard Biesheuvel <ardb@...nel.org>, Tony Luck <tony.luck@...el.com>, Bruce Schlobohm <bruce.schlobohm@...el.com>, Jessica Yu <jeyu@...nel.org>, kernel test robot <lkp@...el.com>, Miroslav Benes <mbenes@...e.cz>, Evgenii Shatokhin <eshatokhin@...tuozzo.com>, Jonathan Corbet <corbet@....net>, Masahiro Yamada <masahiroy@...nel.org>, Michal Marek <michal.lkml@...kovi.net>, Nick Desaulniers <ndesaulniers@...gle.com>, Herbert Xu <herbert@...dor.apana.org.au>, "David S. Miller" <davem@...emloft.net>, Thomas Gleixner <tglx@...utronix.de>, Will Deacon <will@...nel.org>, Ingo Molnar <mingo@...hat.com>, Christoph Hellwig <hch@....de>, Dave Hansen <dave.hansen@...ux.intel.com>, "H. Peter Anvin" <hpa@...or.com>, Andy Lutomirski <luto@...nel.org>, Peter Zijlstra <peterz@...radead.org>, Arnd Bergmann <arnd@...db.de>, Josh Poimboeuf <jpoimboe@...hat.com>, Nathan Chancellor <nathan@...nel.org>, Masami Hiramatsu <mhiramat@...nel.org>, Marios Pomonis <pomonis@...gle.com>, Sami Tolvanen <samitolvanen@...gle.com>, "H.J. Lu" <hjl.tools@...il.com>, Nicolas Pitre <nico@...xnic.net>, linux-kernel@...r.kernel.org, linux-kbuild@...r.kernel.org, linux-arch@...r.kernel.org, live-patching@...r.kernel.org, llvm@...ts.linux.dev Subject: [PATCH v10 11/15] x86/boot: allow FG-KASLR to be selected Now that the kernel has full support of FG-KASLR from both core and x86 code, allow FG-KASLR to be enabled for x86_64 if the "regular" KASLR is also turned on. Signed-off-by: Alexander Lobakin <alexandr.lobakin@...el.com> --- arch/x86/Kconfig | 1 + 1 file changed, 1 insertion(+) diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig index f6bb48d41349..d5442107a915 100644 --- a/arch/x86/Kconfig +++ b/arch/x86/Kconfig @@ -105,6 +105,7 @@ config X86 select ARCH_SUPPORTS_ASM_FUNCTION_SECTIONS select ARCH_SUPPORTS_ATOMIC_RMW select ARCH_SUPPORTS_DEBUG_PAGEALLOC + select ARCH_SUPPORTS_FG_KASLR if X86_64 && RANDOMIZE_BASE select ARCH_SUPPORTS_PAGE_TABLE_CHECK if X86_64 select ARCH_SUPPORTS_NUMA_BALANCING if X86_64 select ARCH_SUPPORTS_KMAP_LOCAL_FORCE_MAP if NR_CPUS <= 4096 -- 2.34.1
Powered by blists - more mailing lists