-CONFIG_INTEGRITY |kconfig| y |defconfig | harden_userspace | OK
-CONFIG_ARCH_MMAP_RND_BITS |kconfig| 32 | clipos | harden_userspace | FAIL: "28"
-nosmep |cmdline| is not set |defconfig | self_protection | OK: not found
-nosmap |cmdline| is not set |defconfig | self_protection | OK: not found
-nokaslr |cmdline| is not set |defconfig | self_protection | OK: not found
-nopti |cmdline| is not set |defconfig | self_protection | OK: not found
-nospectre_v1 |cmdline| is not set |defconfig | self_protection | OK: not found
-nospectre_v2 |cmdline| is not set |defconfig | self_protection | OK: not found
-rodata |cmdline| 1 |defconfig | self_protection | OK: rodata not found
-init_on_alloc |cmdline| 1 | kspp | self_protection | FAIL: not found
-init_on_free |cmdline| 1 | kspp | self_protection | FAIL: not found
-slab_nomerge |cmdline| | kspp | self_protection | OK: CONFIG_SLAB_MERGE_DEFAULT "is not set"
-iommu.strict |cmdline| 1 | kspp | self_protection | FAIL: not found
-iommu.passthrough |cmdline| 0 | kspp | self_protection | OK: CONFIG_IOMMU_DEFAULT_PASSTHROUGH "is not set"
-hardened_usercopy |cmdline| 1 | kspp | self_protection | OK: CONFIG_HARDENED_USERCOPY "y"
-slab_common.usercopy_fallback |cmdline| 0 | kspp | self_protection | OK: CONFIG_HARDENED_USERCOPY_FALLBACK not found
-randomize_kstack_offset |cmdline| 1 | kspp | self_protection | OK: CONFIG_RANDOMIZE_KSTACK_OFFSET_DEFAULT "y"
-pti |cmdline| on | kspp | self_protection | FAIL: not found
-page_alloc.shuffle |cmdline| 1 | clipos | self_protection | FAIL: not found
-spectre_v2 |cmdline| on | clipos | self_protection | FAIL: not found
-vsyscall |cmdline| none | kspp |cut_attack_surface| FAIL: not found
-debugfs |cmdline| off | grsec |cut_attack_surface| FAIL: not found
-
-[+] Config check is finished: 'OK' - 101 / 'FAIL' - 101
+CONFIG_CORESIGHT |kconfig| is not set | my |cut_attack_surface| OK: is not found
+CONFIG_XFS_SUPPORT_V4 |kconfig| is not set | my |cut_attack_surface| FAIL: "y"
+CONFIG_TRIM_UNUSED_KSYMS |kconfig| y | my |cut_attack_surface| FAIL: "is not set"
+CONFIG_MODULE_FORCE_LOAD |kconfig| is not set | my |cut_attack_surface| OK
+CONFIG_COREDUMP |kconfig| is not set | clipos | harden_userspace | FAIL: "y"
+CONFIG_ARCH_MMAP_RND_BITS |kconfig| 32 | my | harden_userspace | FAIL: "28"
+nosmep |cmdline| is not set |defconfig | self_protection | OK: is not found
+nosmap |cmdline| is not set |defconfig | self_protection | OK: is not found
+nokaslr |cmdline| is not set |defconfig | self_protection | OK: is not found
+nopti |cmdline| is not set |defconfig | self_protection | OK: is not found
+nospectre_v1 |cmdline| is not set |defconfig | self_protection | OK: is not found
+nospectre_v2 |cmdline| is not set |defconfig | self_protection | OK: is not found
+nospectre_bhb |cmdline| is not set |defconfig | self_protection | OK: is not found
+nospec_store_bypass_disable |cmdline| is not set |defconfig | self_protection | OK: is not found
+dis_ucode_ldr |cmdline| is not set |defconfig | self_protection | OK: is not found
+arm64.nobti |cmdline| is not set |defconfig | self_protection | OK: is not found
+arm64.nopauth |cmdline| is not set |defconfig | self_protection | OK: is not found
+arm64.nomte |cmdline| is not set |defconfig | self_protection | OK: is not found
+spectre_v2 |cmdline| is not off |defconfig | self_protection | FAIL: is off, not found
+spectre_v2_user |cmdline| is not off |defconfig | self_protection | FAIL: is off, not found
+spec_store_bypass_disable |cmdline| is not off |defconfig | self_protection | FAIL: is off, not found
+l1tf |cmdline| is not off |defconfig | self_protection | FAIL: is off, not found
+mds |cmdline| is not off |defconfig | self_protection | FAIL: is off, not found
+tsx_async_abort |cmdline| is not off |defconfig | self_protection | FAIL: is off, not found
+srbds |cmdline| is not off |defconfig | self_protection | FAIL: is off, not found
+mmio_stale_data |cmdline| is not off |defconfig | self_protection | FAIL: is off, not found
+retbleed |cmdline| is not off |defconfig | self_protection | FAIL: is off, not found
+spec_rstack_overflow |cmdline| is not off |defconfig | self_protection | FAIL: is off, not found
+gather_data_sampling |cmdline| is not off |defconfig | self_protection | FAIL: is off, not found
+rodata |cmdline| on |defconfig | self_protection | OK: rodata is not found
+mitigations |cmdline| auto,nosmt | kspp | self_protection | FAIL: is not found
+slab_merge |cmdline| is not set | kspp | self_protection | OK: is not found
+slub_merge |cmdline| is not set | kspp | self_protection | OK: is not found
+page_alloc.shuffle |cmdline| 1 | kspp | self_protection | FAIL: is not found
+slab_nomerge |cmdline| is present | kspp | self_protection | FAIL: is not present
+init_on_alloc |cmdline| 1 | kspp | self_protection | OK: CONFIG_INIT_ON_ALLOC_DEFAULT_ON is "y"
+init_on_free |cmdline| 1 | kspp | self_protection | FAIL: is not found
+hardened_usercopy |cmdline| 1 | kspp | self_protection | OK: CONFIG_HARDENED_USERCOPY is "y"
+slab_common.usercopy_fallback |cmdline| is not set | kspp | self_protection | OK: is not found
+iommu.strict |cmdline| 1 | kspp | self_protection | FAIL: is not found
+iommu.passthrough |cmdline| 0 | kspp | self_protection | OK: CONFIG_IOMMU_DEFAULT_PASSTHROUGH is "is not set"
+randomize_kstack_offset |cmdline| 1 | kspp | self_protection | OK: CONFIG_RANDOMIZE_KSTACK_OFFSET_DEFAULT is "y"
+pti |cmdline| on | kspp | self_protection | FAIL: is not found
+iommu |cmdline| force | clipos | self_protection | FAIL: is not found
+kfence.sample_interval |cmdline| is not off | my | self_protection | FAIL: is off, not found
+tsx |cmdline| off |defconfig |cut_attack_surface| OK: CONFIG_X86_INTEL_TSX_MODE_OFF is "y"
+nosmt |cmdline| is present | kspp |cut_attack_surface| FAIL: is not present
+vsyscall |cmdline| none | kspp |cut_attack_surface| FAIL: is not found
+vdso32 |cmdline| 0 | kspp |cut_attack_surface| OK: CONFIG_COMPAT_VDSO is "is not set"
+debugfs |cmdline| off | grsec |cut_attack_surface| FAIL: is not found
+sysrq_always_enabled |cmdline| is not set | my |cut_attack_surface| OK: is not found
+norandmaps |cmdline| is not set |defconfig | harden_userspace | OK: is not found
+net.core.bpf_jit_harden |sysctl | 2 | kspp | self_protection | FAIL: "0"
+kernel.dmesg_restrict |sysctl | 1 | kspp |cut_attack_surface| OK
+kernel.perf_event_paranoid |sysctl | 3 | kspp |cut_attack_surface| FAIL: "4"
+kernel.kexec_load_disabled |sysctl | 1 | kspp |cut_attack_surface| FAIL: "0"
+user.max_user_namespaces |sysctl | 0 | kspp |cut_attack_surface| FAIL: "31231"
+dev.tty.ldisc_autoload |sysctl | 0 | kspp |cut_attack_surface| FAIL: "1"
+kernel.unprivileged_bpf_disabled |sysctl | 1 | kspp |cut_attack_surface| FAIL: "2"
+kernel.kptr_restrict |sysctl | 2 | kspp |cut_attack_surface| FAIL: "1"
+dev.tty.legacy_tiocsti |sysctl | 0 | kspp |cut_attack_surface| FAIL: is not found
+vm.unprivileged_userfaultfd |sysctl | 0 | kspp |cut_attack_surface| OK
+kernel.modules_disabled |sysctl | 1 | clipos |cut_attack_surface| FAIL: "0"
+fs.protected_symlinks |sysctl | 1 | kspp | harden_userspace | OK
+fs.protected_hardlinks |sysctl | 1 | kspp | harden_userspace | OK
+fs.protected_fifos |sysctl | 2 | kspp | harden_userspace | FAIL: "1"
+fs.protected_regular |sysctl | 2 | kspp | harden_userspace | OK
+fs.suid_dumpable |sysctl | 0 | kspp | harden_userspace | FAIL: "2"
+kernel.randomize_va_space |sysctl | 2 | kspp | harden_userspace | OK
+kernel.yama.ptrace_scope |sysctl | 3 | kspp | harden_userspace | FAIL: "1"
+
+[+] Config check is finished: 'OK' - 121 / 'FAIL' - 139