From: jvoisin Date: Fri, 3 May 2024 13:43:43 +0000 (+0200) Subject: Add a check for CONFIG_UNWIND_PATCH_PAC_INTO_SCS X-Git-Url: https://jxself.org/git/?a=commitdiff_plain;h=3ccd5268b84cd2e27c0e56b4903439d8adbdaa2c;hp=b1012b145c6290dd8c00fc26c06abc0ef2784548;p=kconfig-hardened-check.git Add a check for CONFIG_UNWIND_PATCH_PAC_INTO_SCS It allows to fallback to a shadow call stack on aarch64 if PAC isn't supported. --- diff --git a/kernel_hardening_checker/checks.py b/kernel_hardening_checker/checks.py index fa664e0..e0caab6 100644 --- a/kernel_hardening_checker/checks.py +++ b/kernel_hardening_checker/checks.py @@ -241,6 +241,7 @@ def add_kconfig_checks(l, arch): if arch == 'ARM64': l += [KconfigCheck('self_protection', 'kspp', 'ARM64_SW_TTBR0_PAN', 'y')] l += [KconfigCheck('self_protection', 'kspp', 'SHADOW_CALL_STACK', 'y')] + l += [KconfigCheck('self_protection', 'kspp', 'UNWIND_PATCH_PAC_INTO_SCS', 'y')] l += [KconfigCheck('self_protection', 'kspp', 'KASAN_HW_TAGS', 'y')] # see also: kasan=on, kasan.stacktrace=off, kasan.fault=panic if arch == 'X86_32': l += [KconfigCheck('self_protection', 'kspp', 'PAGE_TABLE_ISOLATION', 'y')]