projects
/
kconfig-hardened-check.git
/ blobdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
|
commitdiff
|
tree
raw
|
inline
| side by side
Merge branch 'page-table-check'
[kconfig-hardened-check.git]
/
kernel_hardening_checker
/
config_files
/
kspp-recommendations
/
kspp-kconfig-arm.config
diff --git
a/kernel_hardening_checker/config_files/kspp-recommendations/kspp-kconfig-arm.config
b/kernel_hardening_checker/config_files/kspp-recommendations/kspp-kconfig-arm.config
index d4493e7eaa3bf932d40904d91f0777afc7366d8e..c75026046439f27d1423e0358bceb938c669b363 100644
(file)
--- a/
kernel_hardening_checker/config_files/kspp-recommendations/kspp-kconfig-arm.config
+++ b/
kernel_hardening_checker/config_files/kspp-recommendations/kspp-kconfig-arm.config
@@
-1,4
+1,4
@@
-# Linux/arm 6.
1.5
Kernel Configuration
+# Linux/arm 6.
6.7
Kernel Configuration
# Report BUG() conditions and kill the offending process.
CONFIG_BUG=y
# Report BUG() conditions and kill the offending process.
CONFIG_BUG=y
@@
-68,7
+68,8
@@
CONFIG_HARDENED_USERCOPY=y
CONFIG_SLAB_FREELIST_RANDOM=y
CONFIG_SLAB_FREELIST_HARDENED=y
CONFIG_SLAB_FREELIST_RANDOM=y
CONFIG_SLAB_FREELIST_HARDENED=y
-# Randomize high-order page allocation freelist.
+# Allow for randomization of high-order page allocation freelist. Must be enabled with
+# the "page_alloc.shuffle=1" command line below).
CONFIG_SHUFFLE_PAGE_ALLOCATOR=y
# Allow allocator validation checking to be enabled (see "slub_debug=P" below).
CONFIG_SHUFFLE_PAGE_ALLOCATOR=y
# Allow allocator validation checking to be enabled (see "slub_debug=P" below).
@@
-185,6
+186,9
@@
CONFIG_STATIC_USERMODEHELPER=y
# Use the modern PTY interface (devpts) only.
# CONFIG_LEGACY_PTYS is not set
# Use the modern PTY interface (devpts) only.
# CONFIG_LEGACY_PTYS is not set
+# Block TTY stuffing attacks (this will break screen readers, see "dev.tty.legacy_tiocsti" sysctl below).
+# CONFIG_LEGACY_TIOCSTI is not set
+
# If SELinux can be disabled at runtime, the LSM structures cannot be read-only; keep off.
# CONFIG_SECURITY_SELINUX_DISABLE is not set
# If SELinux can be disabled at runtime, the LSM structures cannot be read-only; keep off.
# CONFIG_SECURITY_SELINUX_DISABLE is not set