From f5dd317a47a3ef85683547235a46bbf3da7e9d8c Mon Sep 17 00:00:00 2001 From: Alexander Popov Date: Mon, 19 Aug 2024 17:27:06 +0300 Subject: [PATCH] Disabling VCAP_KUNIT_TEST and BUILD_SALT doesn't look security relevant --- kernel_hardening_checker/checks.py | 2 -- 1 file changed, 2 deletions(-) diff --git a/kernel_hardening_checker/checks.py b/kernel_hardening_checker/checks.py index b472f5c..3ff699d 100755 --- a/kernel_hardening_checker/checks.py +++ b/kernel_hardening_checker/checks.py @@ -393,10 +393,8 @@ def add_kconfig_checks(l: List[ChecklistObjType], arch: str) -> None: l += [KconfigCheck('cut_attack_surface', 'grsec', 'SUNRPC_DEBUG', 'is not set')] l += [KconfigCheck('cut_attack_surface', 'grsec', 'X86_16BIT', 'is not set')] l += [KconfigCheck('cut_attack_surface', 'grsec', 'BLK_DEV_UBLK', 'is not set')] - l += [KconfigCheck('cut_attack_surface', 'grsec', 'VCAP_KUNIT_TEST', 'is not set')] l += [KconfigCheck('cut_attack_surface', 'grsec', 'SMB_SERVER', 'is not set')] l += [KconfigCheck('cut_attack_surface', 'grsec', 'XFS_ONLINE_SCRUB_STATS', 'is not set')] - l += [KconfigCheck('cut_attack_surface', 'grsec', 'BUILD_SALT', 'is not set')] l += [KconfigCheck('cut_attack_surface', 'grsec', 'CACHESTAT_SYSCALL', 'is not set')] l += [KconfigCheck('cut_attack_surface', 'grsec', 'PREEMPTIRQ_TRACEPOINTS', 'is not set')] l += [KconfigCheck('cut_attack_surface', 'grsec', 'ENABLE_DEFAULT_TRACERS', 'is not set')] -- 2.31.1