summaryrefslogtreecommitdiffstats
path: root/fragments/base/security (follow)
Commit message (Collapse)AuthorAgeLines
* fragments: Enable CONFIG_RANDSTRUCT_PERFORMANCEWolfgang Müller2022-10-15-0/+1
| | | | | This option is now needed for Kernel Self Protection system to be available.
* fragments: Remove reference to STRUCTLEAK_BYREFWolfgang Müller2022-07-10-1/+0
| | | | This option no longer exists in versions >= 5.18.7.
* fragments: Enable core scheduling for SMTWolfgang Müller2022-07-10-0/+2
| | | | | This should be safe to have enabled (but unused) and gives us an extra layer of potential mitigation of SMT side channels.
* fragments: Add requisite option for KSPWolfgang Müller2022-06-04-0/+1
|
* fragments: Update to latest KSP recommendationsWolfgang Müller2021-08-13-0/+5
| | | | | | The Gentoo KSP recommendations have changed slightly again, now requiring three different settings instead of just one. Additionally, in order to enable KSP at all, CONFIG_MODIFY_LDT_SYSCALL needs to be unset.
* fragments: Enable CONFIG_SECURITYWolfgang Müller2021-08-13-0/+2
| | | | | | An upcoming commit updates to the latest KSP recommendations and requires this particular setting as a direct dependency for CONFIG_SECURITY_YAMA.
* fragments: Remove obsoleted KSP switchWolfgang Müller2021-07-20-1/+0
| | | | | | The newer versions of sys-kernel/gentoo-sources do not have this switch anymore, instead relying only on the architecture-specific switches. Remove it.
* fragments: Enable GENTOO_KERNEL_SELF_PROTECTIONWolfgang Müller2021-07-03-0/+3
| | | | | | | | | This setting pulls in a set of recommended settings [1] from the Kernel Self Protection Project. We are pretty sure that we exhaustively set all these manually already, but since Gentoo upstream provides this option, make use of it too. [1] https://kernsec.org/wiki/index.php/Kernel_Self_Protection_Project/Recommended_Settings
* fragments: Remove superfluous options for 5.10Wolfgang Müller2021-03-06-1/+0
| | | | | These options have either been merged into others or enabled unconditionally.
* Improve security by disabling vsyscall table for legacy appsWynn Wolf Arbor2020-02-29-0/+3
|
* Initial importWynn Wolf Arbor2020-02-29-0/+14