projects
/
kconfig-hardened-check.git
/ commitdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
| commitdiff |
tree
raw
|
patch
| inline |
side by side
(parent:
6d15e0e
)
Update the 'kernel.modules_disabled' check
author
Alexander Popov
<alex.popov@linux.com>
Sun, 16 Jun 2024 05:48:52 +0000
(08:48 +0300)
committer
Alexander Popov
<alex.popov@linux.com>
Sun, 16 Jun 2024 05:48:52 +0000
(08:48 +0300)
kernel_hardening_checker/checks.py
patch
|
blob
|
history
diff --git
a/kernel_hardening_checker/checks.py
b/kernel_hardening_checker/checks.py
index 9cb414ee1d3742da755a16d1dee54980a242d479..fa2de4240e244ead8c9d0e90ea977095d1f50216 100755
(executable)
--- a/
kernel_hardening_checker/checks.py
+++ b/
kernel_hardening_checker/checks.py
@@
-716,7
+716,7
@@
def add_sysctl_checks(l: List[ChecklistObjType], _arch: StrOrNone) -> None:
# At first, it disabled unprivileged userfaultfd,
# and since v5.11 it enables unprivileged userfaultfd for user-mode only.
- l += [OR(SysctlCheck('cut_attack_surface', '
clipos
', 'kernel.modules_disabled', '1'),
+ l += [OR(SysctlCheck('cut_attack_surface', '
kspp
', 'kernel.modules_disabled', '1'),
AND(KconfigCheck('cut_attack_surface', 'kspp', 'MODULES', 'is not set'),
have_kconfig))] # radical, but may be useful in some cases