projects
/
kconfig-hardened-check.git
/ commitdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
| commitdiff |
tree
raw
|
patch
|
inline
| side by side (parent:
89acc36
)
Drop some of my security policy recommendations
author
Alexander Popov
<alex.popov@linux.com>
Sun, 9 Oct 2022 21:55:21 +0000
(
00:55
+0300)
committer
Alexander Popov
<alex.popov@linux.com>
Sun, 9 Oct 2022 21:55:21 +0000
(
00:55
+0300)
kconfig_hardened_check/__init__.py
patch
|
blob
|
history
diff --git
a/kconfig_hardened_check/__init__.py
b/kconfig_hardened_check/__init__.py
index 98a3493b9e2d6394e5b8f179cbcf2d8a7d4e0306..5855cf0756aca75e42a6af0e08e641f41cae1856 100644
(file)
--- a/
kconfig_hardened_check/__init__.py
+++ b/
kconfig_hardened_check/__init__.py
@@
-12,7
+12,6
@@
#
# N.B Hardening command line parameters:
# iommu=force (does it help against DMA attacks?)
#
# N.B Hardening command line parameters:
# iommu=force (does it help against DMA attacks?)
-# loadpin.enforce=1
#
# Mitigations of CPU vulnerabilities:
# Аrch-independent:
#
# Mitigations of CPU vulnerabilities:
# Аrch-independent:
@@
-540,11
+539,6
@@
def add_kconfig_checks(l, arch):
l += [KconfigCheck('security_policy', 'clipos', 'SECURITY_LOCKDOWN_LSM_EARLY', 'y')]
l += [KconfigCheck('security_policy', 'clipos', 'LOCK_DOWN_KERNEL_FORCE_CONFIDENTIALITY', 'y')]
l += [KconfigCheck('security_policy', 'my', 'SECURITY_WRITABLE_HOOKS', 'is not set')] # refers to SECURITY_SELINUX_DISABLE
l += [KconfigCheck('security_policy', 'clipos', 'SECURITY_LOCKDOWN_LSM_EARLY', 'y')]
l += [KconfigCheck('security_policy', 'clipos', 'LOCK_DOWN_KERNEL_FORCE_CONFIDENTIALITY', 'y')]
l += [KconfigCheck('security_policy', 'my', 'SECURITY_WRITABLE_HOOKS', 'is not set')] # refers to SECURITY_SELINUX_DISABLE
- l += [KconfigCheck('security_policy', 'my', 'SECURITY_SAFESETID', 'y')]
- loadpin_is_set = KconfigCheck('security_policy', 'my', 'SECURITY_LOADPIN', 'y')
- l += [loadpin_is_set] # needs userspace support
- l += [AND(KconfigCheck('security_policy', 'my', 'SECURITY_LOADPIN_ENFORCE', 'y'),
- loadpin_is_set)]
# 'cut_attack_surface', 'defconfig'
l += [OR(KconfigCheck('cut_attack_surface', 'defconfig', 'BPF_UNPRIV_DEFAULT_OFF', 'y'),
# 'cut_attack_surface', 'defconfig'
l += [OR(KconfigCheck('cut_attack_surface', 'defconfig', 'BPF_UNPRIV_DEFAULT_OFF', 'y'),