Add more details about STACKLEAK
authorAlexander Popov <alex.popov@linux.com>
Mon, 3 Jun 2019 17:13:32 +0000 (20:13 +0300)
committerAlexander Popov <alex.popov@linux.com>
Mon, 3 Jun 2019 17:13:32 +0000 (20:13 +0300)
Refers to the issue #19 by @HacKurx

kconfig-hardened-check.py

index c2d35c17ea792b8a1dfd122cc1daa8eb145a67e9..4c53b15c31ffde81eac373a0e15b495f08ee80f1 100755 (executable)
@@ -240,7 +240,12 @@ def construct_checklist(arch):
         checklist.append(OptCheck('DEFAULT_MMAP_MIN_ADDR',        '32768', 'kspp', 'self_protection'))
 
     if debug_mode or arch == 'X86_64' or arch == 'ARM64' or arch == 'X86_32':
-        checklist.append(OptCheck('GCC_PLUGIN_STACKLEAK',         'y', 'my', 'self_protection'))
+        stackleak_is_set = OptCheck('GCC_PLUGIN_STACKLEAK',       'y', 'my', 'self_protection')
+        checklist.append(stackleak_is_set)
+        checklist.append(AND(OptCheck('STACKLEAK_METRICS',        'is not set', 'my', 'self_protection'), \
+                             stackleak_is_set))
+        checklist.append(AND(OptCheck('STACKLEAK_RUNTIME_DISABLE','is not set', 'my', 'self_protection'), \
+                             stackleak_is_set))
     checklist.append(OptCheck('LOCK_DOWN_KERNEL',                 'y', 'my', 'self_protection')) # remember about LOCK_DOWN_MANDATORY
     checklist.append(OptCheck('SLUB_DEBUG_ON',                    'y', 'my', 'self_protection'))
     checklist.append(OptCheck('SECURITY_DMESG_RESTRICT',          'y', 'my', 'self_protection'))