From: Alexander Popov Date: Sat, 10 Aug 2024 11:05:34 +0000 (+0300) Subject: Add the LKDTM check X-Git-Tag: v0.6.10~29 X-Git-Url: https://jxself.org/git/?a=commitdiff_plain;h=160a370a7b52aae2acb1a8258e364fc5bf78f776;p=kconfig-hardened-check.git Add the LKDTM check Thanks to @izh1979 for the idea. --- diff --git a/kernel_hardening_checker/checks.py b/kernel_hardening_checker/checks.py index 6b89bd7..d0fd79e 100755 --- a/kernel_hardening_checker/checks.py +++ b/kernel_hardening_checker/checks.py @@ -424,6 +424,8 @@ def add_kconfig_checks(l: List[ChecklistObjType], arch: str) -> None: l += [KconfigCheck('cut_attack_surface', 'a13xp0p0v', 'XFS_SUPPORT_V4', 'is not set')] l += [KconfigCheck('cut_attack_surface', 'a13xp0p0v', 'BLK_DEV_WRITE_MOUNTED', 'is not set')] l += [KconfigCheck('cut_attack_surface', 'a13xp0p0v', 'FAULT_INJECTION', 'is not set')] + l += [KconfigCheck('cut_attack_surface', 'a13xp0p0v', 'LKDTM', 'is not set')] + # dangerous, only for debugging the kernel hardening features! l += [OR(KconfigCheck('cut_attack_surface', 'a13xp0p0v', 'TRIM_UNUSED_KSYMS', 'y'), modules_not_set)] l += [OR(KconfigCheck('cut_attack_surface', 'a13xp0p0v', 'MAGIC_SYSRQ_SERIAL', 'is not set'),