projects
/
kconfig-hardened-check.git
/ commitdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
| commitdiff |
tree
raw
|
patch
| inline |
side by side
(parent:
6268a31
)
Add CONFIG_SLS vs CVE-2021-26341 in Straight-Line-Speculation
author
Alexander Popov
<alex.popov@linux.com>
Sun, 13 Mar 2022 18:12:23 +0000
(21:12 +0300)
committer
Alexander Popov
<alex.popov@linux.com>
Sun, 13 Mar 2022 18:12:23 +0000
(21:12 +0300)
kconfig_hardened_check/__init__.py
patch
|
blob
|
history
diff --git
a/kconfig_hardened_check/__init__.py
b/kconfig_hardened_check/__init__.py
index 2b5fe1e68d7bd5b2fa6d58b95e7c26be90a6ac1d..b5960d9f3b6cb6d21a72d3b4a54e3b00f50e4fab 100644
(file)
--- a/
kconfig_hardened_check/__init__.py
+++ b/
kconfig_hardened_check/__init__.py
@@
-470,6
+470,7
@@
def add_kconfig_checks(l, arch):
# 'self_protection', 'my'
l += [KconfigCheck('self_protection', 'my', 'RESET_ATTACK_MITIGATION', 'y')] # needs userspace support (systemd)
if arch == 'X86_64':
+ l += [KconfigCheck('self_protection', 'my', 'SLS', 'y')] # vs CVE-2021-26341 in Straight-Line-Speculation
l += [AND(KconfigCheck('self_protection', 'my', 'AMD_IOMMU_V2', 'y'),
iommu_support_is_set)]
if arch == 'ARM64':