--- zzzz-none-000/linux-4.9.276/arch/Kconfig 2021-07-20 14:21:16.000000000 +0000 +++ falcon-5530-750/linux-4.9.276/arch/Kconfig 2023-04-05 08:19:00.000000000 +0000 @@ -471,6 +471,15 @@ endchoice +config CC_STACKPROTECTOR_BUG_ON_FAIL + bool "Detection of stack-corruption will trigger BUG()" + default n + depends on CC_STACKPROTECTOR + help + Detection of stack-corruption will trigger BUG(). + Depend on implementation of BUG() further info (backtrace, + registerdump,stacktrace) possible. + config THIN_ARCHIVES bool help @@ -772,4 +781,23 @@ the stack to map directly to the KASAN shadow map using a formula that is incorrect if the stack is in vmalloc space. +config ARCH_HAS_REFCOUNT + bool + help + An architecture selects this when it has implemented refcount_t + using open coded assembly primitives that provide an optimized + refcount_t implementation, possibly at the expense of some full + refcount state checks of CONFIG_REFCOUNT_FULL=y. + + The refcount overflow check behavior, however, must be retained. + Catching overflows is the primary security concern for protecting + against bugs in reference counts. +config REFCOUNT_FULL + bool "Perform full reference count validation at the expense of speed" + help + Enabling this switches the refcounting infrastructure from a fast + unchecked atomic_t implementation to a fully state checked + implementation, which can be (slightly) slower but provides protections + against various use-after-free conditions that can be used in + security flaw exploits. source "kernel/gcov/Kconfig"