Files
bpfire/config/rootfiles/common/x86_64
Peter Müller 4c46e7f818 linux: Randomize layout of sensitive kernel structures
To quote from the kernel documentation:

> If you say Y here, the layouts of structures that are entirely
> function pointers (and have not been manually annotated with
> __no_randomize_layout), or structures that have been explicitly
> marked with __randomize_layout, will be randomized at compile-time.
> This can introduce the requirement of an additional information
> exposure vulnerability for exploits targeting these structure
> types.
>
> Enabling this feature will introduce some performance impact,
> slightly increase memory usage, and prevent the use of forensic
> tools like Volatility against the system (unless the kernel
> source tree isn't cleaned after kernel installation).
>
> The seed used for compilation is located at
> scripts/gcc-plgins/randomize_layout_seed.h. It remains after
> a make clean to allow for external modules to be compiled with
> the existing seed and will be removed by a make mrproper or
> make distclean.
>
> Note that the implementation requires gcc 4.7 or newer.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Acked-by: Michael Tremer <michael.tremer@ipfire.org>
2022-08-03 10:59:03 +00:00
..
2022-02-05 12:11:00 +00:00
2022-06-07 06:30:51 +00:00
2021-06-03 09:14:21 +00:00
2020-01-04 18:23:54 +00:00
2022-05-30 19:25:18 +00:00
2022-02-05 12:14:11 +00:00
2020-11-13 11:11:47 +00:00
2021-12-05 11:44:58 +01:00
2021-02-01 10:46:36 +00:00
2022-06-29 20:11:34 +00:00
2018-07-14 13:43:49 +01:00
2022-02-06 14:09:43 +00:00
2018-03-31 09:56:48 +02:00
2021-04-14 17:27:11 +00:00
2022-02-01 13:50:32 +00:00
2018-07-14 13:43:53 +01:00