Kconfig (14e77332e74603efab8347c89d3cda447c3b97c9) Kconfig (80ddf5ce1c9291cb175d52ed1227134ad48c47ee)
1# SPDX-License-Identifier: GPL-2.0
2config MMU
3 def_bool y
4
5config CPU_BIG_ENDIAN
6 def_bool y
7
8config LOCKDEP_SUPPORT

--- 554 unchanged lines hidden (view full) ---

563 bool "spectre_v2=auto"
564
565config EXPOLINE_FULL
566 bool "spectre_v2=on"
567
568endchoice
569
570config RELOCATABLE
1# SPDX-License-Identifier: GPL-2.0
2config MMU
3 def_bool y
4
5config CPU_BIG_ENDIAN
6 def_bool y
7
8config LOCKDEP_SUPPORT

--- 554 unchanged lines hidden (view full) ---

563 bool "spectre_v2=auto"
564
565config EXPOLINE_FULL
566 bool "spectre_v2=on"
567
568endchoice
569
570config RELOCATABLE
571 bool "Build a relocatable kernel"
572 default y
571 def_bool y
573 help
574 This builds a kernel image that retains relocation information
575 so it can be loaded at an arbitrary address.
576 The kernel is linked as a position-independent executable (PIE)
577 and contains dynamic relocations which are processed early in the
578 bootup process.
579 The relocations make the kernel image about 15% larger (compressed
580 10%), but are discarded at runtime.
572 help
573 This builds a kernel image that retains relocation information
574 so it can be loaded at an arbitrary address.
575 The kernel is linked as a position-independent executable (PIE)
576 and contains dynamic relocations which are processed early in the
577 bootup process.
578 The relocations make the kernel image about 15% larger (compressed
579 10%), but are discarded at runtime.
580 Note: this option exists only for documentation purposes, please do
581 not remove it.
581
582config RANDOMIZE_BASE
583 bool "Randomize the address of the kernel image (KASLR)"
582
583config RANDOMIZE_BASE
584 bool "Randomize the address of the kernel image (KASLR)"
584 depends on RELOCATABLE
585 default y
586 help
587 In support of Kernel Address Space Layout Randomization (KASLR),
588 this randomizes the address at which the kernel image is loaded,
589 as a security feature that deters exploit attempts relying on
590 knowledge of the location of kernel internals.
591
592endmenu

--- 337 unchanged lines hidden ---
585 default y
586 help
587 In support of Kernel Address Space Layout Randomization (KASLR),
588 this randomizes the address at which the kernel image is loaded,
589 as a security feature that deters exploit attempts relying on
590 knowledge of the location of kernel internals.
591
592endmenu

--- 337 unchanged lines hidden ---