projects
/
kconfig-hardened-check.git
/ blobdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
|
commitdiff
|
tree
raw
|
inline
| side by side
Update the KSPP recommendations
[kconfig-hardened-check.git]
/
kconfig_hardened_check
/
config_files
/
kspp-recommendations
/
kspp-recommendations-x86-32.config
diff --git
a/kconfig_hardened_check/config_files/kspp-recommendations/kspp-recommendations-x86-32.config
b/kconfig_hardened_check/config_files/kspp-recommendations/kspp-recommendations-x86-32.config
index 477d75c1dd1608cdc313bb723986657518df10fd..a382f411912194929c2d93cd524cba4b753d6534 100644
(file)
--- a/
kconfig_hardened_check/config_files/kspp-recommendations/kspp-recommendations-x86-32.config
+++ b/
kconfig_hardened_check/config_files/kspp-recommendations/kspp-recommendations-x86-32.config
@@
-1,5
+1,5
@@
# CONFIGs
# CONFIGs
-# Linux/i386 5.4.0 Kernel Configuration
+# Linux/i386 5.
1
4.0 Kernel Configuration
# Report BUG() conditions and kill the offending process.
CONFIG_BUG=y
# Report BUG() conditions and kill the offending process.
CONFIG_BUG=y
@@
-80,6
+80,9
@@
CONFIG_REFCOUNT_FULL=y
# Check for memory copies that might overflow a structure in str*() and mem*() functions both at build-time and run-time.
CONFIG_FORTIFY_SOURCE=y
# Check for memory copies that might overflow a structure in str*() and mem*() functions both at build-time and run-time.
CONFIG_FORTIFY_SOURCE=y
+# Avoid kernel memory address exposures via dmesg (sets sysctl kernel.dmesg_restrict initial value to 1)
+CONFIG_SECURITY_DMESG_RESTRICT=y
+
# Dangerous; enabling this allows direct physical memory writing.
# CONFIG_ACPI_CUSTOM_METHOD is not set
# Dangerous; enabling this allows direct physical memory writing.
# CONFIG_ACPI_CUSTOM_METHOD is not set
@@
-162,9
+165,15
@@
CONFIG_X86_PAE=y
# Disallow allocating the first 64k of memory.
CONFIG_DEFAULT_MMAP_MIN_ADDR=65536
# Disallow allocating the first 64k of memory.
CONFIG_DEFAULT_MMAP_MIN_ADDR=65536
+# Disable Model-Specific Register writes.
+# CONFIG_X86_MSR is not set
+
# Randomize position of kernel.
CONFIG_RANDOMIZE_BASE=y
# Randomize position of kernel.
CONFIG_RANDOMIZE_BASE=y
+# Randomize kernel stack offset on syscall entry (since v5.13).
+CONFIG_RANDOMIZE_KSTACK_OFFSET_DEFAULT=y
+
# Enable Kernel Page Table Isolation to remove an entire class of cache timing side-channels.
CONFIG_PAGE_TABLE_ISOLATION=y
# Enable Kernel Page Table Isolation to remove an entire class of cache timing side-channels.
CONFIG_PAGE_TABLE_ISOLATION=y