projects
/
kconfig-hardened-check.git
/ blobdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
|
commitdiff
|
tree
raw
|
inline
| side by side
Version 0.5.3 (supports Linux kernel v5.3)
[kconfig-hardened-check.git]
/
README.md
diff --git
a/README.md
b/README.md
index 978c660930894972a2613e0c126b158d4ebd3e37..2780cf3a54a55dacca436c053807ff0e57e71b9f 100644
(file)
--- a/
README.md
+++ b/
README.md
@@
-15,7
+15,9
@@
against my hardening preferences, which are based on the
- [CLIP OS kernel configuration][2],
- last public [grsecurity][3] patch (options which they disable).
- [CLIP OS kernel configuration][2],
- last public [grsecurity][3] patch (options which they disable).
-Please don't cry if my Python code looks like C. I'm just a kernel developer.
+I also created [__Linux Kernel Defence Map__][4] that is a graphical representation of the
+relationships between these hardening features and the corresponding vulnerability classes
+or exploitation techniques.
## Supported microarchitectures
## Supported microarchitectures
@@
-187,7
+189,7
@@
So the version of `kconfig-hardened-check` is associated with the corresponding
The version format is: __[major_number].[kernel_version]__
The version format is: __[major_number].[kernel_version]__
-The current version of `kconfig-hardened-check` is __0.5.
2
__, it's marked with the git tag.
+The current version of `kconfig-hardened-check` is __0.5.
3
__, it's marked with the git tag.
## Questions and answers
## Questions and answers
@@
-214,3
+216,4
@@
try to install `gcc-7-plugin-dev` package, it should help.
[1]: http://kernsec.org/wiki/index.php/Kernel_Self_Protection_Project/Recommended_Settings
[2]: https://docs.clip-os.org/clipos/kernel.html#configuration
[3]: https://grsecurity.net/
[1]: http://kernsec.org/wiki/index.php/Kernel_Self_Protection_Project/Recommended_Settings
[2]: https://docs.clip-os.org/clipos/kernel.html#configuration
[3]: https://grsecurity.net/
+[4]: https://github.com/a13xp0p0v/linux-kernel-defence-map