Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
K
kernel-hardening-checker
Overview
Overview
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
fact-depend
kernel-hardening-checker
Commits
f77dc51d
Commit
f77dc51d
authored
Jul 09, 2018
by
anthraxx
Committed by
Alexander Popov
Jul 20, 2018
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
store option check result as class member
Conflicts resolved by @a13xp0p0v:
parent
6a3d6ad7
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
119 additions
and
114 deletions
+119
-114
kconfig-hardened-check.py
kconfig-hardened-check.py
+119
-114
No files found.
kconfig-hardened-check.py
View file @
f77dc51d
...
@@ -33,138 +33,144 @@ class Opt:
...
@@ -33,138 +33,144 @@ class Opt:
self
.
decision
=
decision
self
.
decision
=
decision
self
.
reason
=
reason
self
.
reason
=
reason
self
.
state
=
None
self
.
state
=
None
self
.
result
=
None
def
check
(
self
):
def
check
(
self
):
global
error_count
global
error_count
if
self
.
expected
==
self
.
state
:
if
self
.
expected
==
self
.
state
:
return
True
,
'OK'
self
.
result
=
'OK'
return
True
,
self
.
result
if
self
.
state
is
None
:
if
self
.
state
is
None
:
if
self
.
expected
==
'is not set'
:
if
self
.
expected
==
'is not set'
:
return
True
,
'OK: not found'
self
.
result
=
'OK: not found'
return
True
,
self
.
result
else
:
else
:
error_count
+=
1
error_count
+=
1
return
False
,
'FAIL: not found'
self
.
result
=
'FAIL: not found'
return
False
,
self
.
result
error_count
+=
1
error_count
+=
1
return
False
,
'FAIL: "'
+
self
.
state
+
'"'
self
.
result
=
'FAIL: "'
+
self
.
state
+
'"'
return
False
,
self
.
result
def
__repr__
(
self
):
def
__repr__
(
self
):
return
'{} = {}'
.
format
(
self
.
name
,
self
.
state
)
return
'{} = {}'
.
format
(
self
.
name
,
self
.
state
)
def
construct_opt_checks
():
def
construct_opt_checks
():
opt_list
.
append
(
[
Opt
(
'BUG'
,
'y'
,
'ubuntu18'
,
'self_protection'
),
''
]
)
opt_list
.
append
(
Opt
(
'BUG'
,
'y'
,
'ubuntu18'
,
'self_protection'
)
)
opt_list
.
append
(
[
Opt
(
'PAGE_TABLE_ISOLATION'
,
'y'
,
'ubuntu18'
,
'self_protection'
),
''
]
)
opt_list
.
append
(
Opt
(
'PAGE_TABLE_ISOLATION'
,
'y'
,
'ubuntu18'
,
'self_protection'
)
)
opt_list
.
append
(
[
Opt
(
'RETPOLINE'
,
'y'
,
'ubuntu18'
,
'self_protection'
),
''
]
)
opt_list
.
append
(
Opt
(
'RETPOLINE'
,
'y'
,
'ubuntu18'
,
'self_protection'
)
)
opt_list
.
append
(
[
Opt
(
'X86_64'
,
'y'
,
'ubuntu18'
,
'self_protection'
),
''
]
)
opt_list
.
append
(
Opt
(
'X86_64'
,
'y'
,
'ubuntu18'
,
'self_protection'
)
)
opt_list
.
append
(
[
Opt
(
'STRICT_KERNEL_RWX'
,
'y'
,
'ubuntu18'
,
'self_protection'
),
''
]
)
opt_list
.
append
(
Opt
(
'STRICT_KERNEL_RWX'
,
'y'
,
'ubuntu18'
,
'self_protection'
)
)
opt_list
.
append
(
[
Opt
(
'STRICT_MODULE_RWX'
,
'y'
,
'ubuntu18'
,
'self_protection'
),
''
]
)
opt_list
.
append
(
Opt
(
'STRICT_MODULE_RWX'
,
'y'
,
'ubuntu18'
,
'self_protection'
)
)
opt_list
.
append
(
[
Opt
(
'DEBUG_WX'
,
'y'
,
'ubuntu18'
,
'self_protection'
),
''
]
)
opt_list
.
append
(
Opt
(
'DEBUG_WX'
,
'y'
,
'ubuntu18'
,
'self_protection'
)
)
opt_list
.
append
(
[
Opt
(
'RANDOMIZE_BASE'
,
'y'
,
'ubuntu18'
,
'self_protection'
),
''
]
)
opt_list
.
append
(
Opt
(
'RANDOMIZE_BASE'
,
'y'
,
'ubuntu18'
,
'self_protection'
)
)
opt_list
.
append
(
[
Opt
(
'RANDOMIZE_MEMORY'
,
'y'
,
'ubuntu18'
,
'self_protection'
),
''
]
)
opt_list
.
append
(
Opt
(
'RANDOMIZE_MEMORY'
,
'y'
,
'ubuntu18'
,
'self_protection'
)
)
opt_list
.
append
(
[
Opt
(
'CC_STACKPROTECTOR'
,
'y'
,
'ubuntu18'
,
'self_protection'
),
''
]
)
opt_list
.
append
(
Opt
(
'CC_STACKPROTECTOR'
,
'y'
,
'ubuntu18'
,
'self_protection'
)
)
opt_list
.
append
(
[
Opt
(
'CC_STACKPROTECTOR_STRONG'
,
'y'
,
'ubuntu18'
,
'self_protection'
),
''
]
)
opt_list
.
append
(
Opt
(
'CC_STACKPROTECTOR_STRONG'
,
'y'
,
'ubuntu18'
,
'self_protection'
)
)
opt_list
.
append
(
[
Opt
(
'VMAP_STACK'
,
'y'
,
'ubuntu18'
,
'self_protection'
),
''
]
)
opt_list
.
append
(
Opt
(
'VMAP_STACK'
,
'y'
,
'ubuntu18'
,
'self_protection'
)
)
opt_list
.
append
(
[
Opt
(
'THREAD_INFO_IN_TASK'
,
'y'
,
'ubuntu18'
,
'self_protection'
),
''
]
)
opt_list
.
append
(
Opt
(
'THREAD_INFO_IN_TASK'
,
'y'
,
'ubuntu18'
,
'self_protection'
)
)
opt_list
.
append
(
[
Opt
(
'SCHED_STACK_END_CHECK'
,
'y'
,
'ubuntu18'
,
'self_protection'
),
''
]
)
opt_list
.
append
(
Opt
(
'SCHED_STACK_END_CHECK'
,
'y'
,
'ubuntu18'
,
'self_protection'
)
)
opt_list
.
append
(
[
Opt
(
'SLUB_DEBUG'
,
'y'
,
'ubuntu18'
,
'self_protection'
),
''
]
)
opt_list
.
append
(
Opt
(
'SLUB_DEBUG'
,
'y'
,
'ubuntu18'
,
'self_protection'
)
)
opt_list
.
append
(
[
Opt
(
'SLAB_FREELIST_HARDENED'
,
'y'
,
'ubuntu18'
,
'self_protection'
),
''
]
)
opt_list
.
append
(
Opt
(
'SLAB_FREELIST_HARDENED'
,
'y'
,
'ubuntu18'
,
'self_protection'
)
)
opt_list
.
append
(
[
Opt
(
'SLAB_FREELIST_RANDOM'
,
'y'
,
'ubuntu18'
,
'self_protection'
),
''
]
)
opt_list
.
append
(
Opt
(
'SLAB_FREELIST_RANDOM'
,
'y'
,
'ubuntu18'
,
'self_protection'
)
)
opt_list
.
append
(
[
Opt
(
'HARDENED_USERCOPY'
,
'y'
,
'ubuntu18'
,
'self_protection'
),
''
]
)
opt_list
.
append
(
Opt
(
'HARDENED_USERCOPY'
,
'y'
,
'ubuntu18'
,
'self_protection'
)
)
opt_list
.
append
(
[
Opt
(
'FORTIFY_SOURCE'
,
'y'
,
'ubuntu18'
,
'self_protection'
),
''
]
)
opt_list
.
append
(
Opt
(
'FORTIFY_SOURCE'
,
'y'
,
'ubuntu18'
,
'self_protection'
)
)
opt_list
.
append
(
[
Opt
(
'MODULE_SIG'
,
'y'
,
'ubuntu18'
,
'self_protection'
),
''
]
)
opt_list
.
append
(
Opt
(
'MODULE_SIG'
,
'y'
,
'ubuntu18'
,
'self_protection'
)
)
opt_list
.
append
(
[
Opt
(
'MODULE_SIG_ALL'
,
'y'
,
'ubuntu18'
,
'self_protection'
),
''
]
)
opt_list
.
append
(
Opt
(
'MODULE_SIG_ALL'
,
'y'
,
'ubuntu18'
,
'self_protection'
)
)
opt_list
.
append
(
[
Opt
(
'MODULE_SIG_SHA512'
,
'y'
,
'ubuntu18'
,
'self_protection'
),
''
]
)
opt_list
.
append
(
Opt
(
'MODULE_SIG_SHA512'
,
'y'
,
'ubuntu18'
,
'self_protection'
)
)
opt_list
.
append
(
[
Opt
(
'SYN_COOKIES'
,
'y'
,
'ubuntu18'
,
'self_protection'
),
''
]
)
# another reason?
opt_list
.
append
(
Opt
(
'SYN_COOKIES'
,
'y'
,
'ubuntu18'
,
'self_protection'
)
)
# another reason?
opt_list
.
append
(
[
Opt
(
'DEFAULT_MMAP_MIN_ADDR'
,
'65536'
,
'ubuntu18'
,
'self_protection'
),
''
]
)
opt_list
.
append
(
Opt
(
'DEFAULT_MMAP_MIN_ADDR'
,
'65536'
,
'ubuntu18'
,
'self_protection'
)
)
opt_list
.
append
(
[
Opt
(
'BUG_ON_DATA_CORRUPTION'
,
'y'
,
'kspp'
,
'self_protection'
),
''
]
)
opt_list
.
append
(
Opt
(
'BUG_ON_DATA_CORRUPTION'
,
'y'
,
'kspp'
,
'self_protection'
)
)
opt_list
.
append
(
[
Opt
(
'PAGE_POISONING'
,
'y'
,
'kspp'
,
'self_protection'
),
''
]
)
opt_list
.
append
(
Opt
(
'PAGE_POISONING'
,
'y'
,
'kspp'
,
'self_protection'
)
)
opt_list
.
append
(
[
Opt
(
'GCC_PLUGINS'
,
'y'
,
'kspp'
,
'self_protection'
),
''
]
)
opt_list
.
append
(
Opt
(
'GCC_PLUGINS'
,
'y'
,
'kspp'
,
'self_protection'
)
)
opt_list
.
append
(
[
Opt
(
'GCC_PLUGIN_RANDSTRUCT'
,
'y'
,
'kspp'
,
'self_protection'
),
''
]
)
opt_list
.
append
(
Opt
(
'GCC_PLUGIN_RANDSTRUCT'
,
'y'
,
'kspp'
,
'self_protection'
)
)
opt_list
.
append
(
[
Opt
(
'GCC_PLUGIN_STRUCTLEAK'
,
'y'
,
'kspp'
,
'self_protection'
),
''
]
)
opt_list
.
append
(
Opt
(
'GCC_PLUGIN_STRUCTLEAK'
,
'y'
,
'kspp'
,
'self_protection'
)
)
opt_list
.
append
(
[
Opt
(
'GCC_PLUGIN_STRUCTLEAK_BYREF_ALL'
,
'y'
,
'kspp'
,
'self_protection'
),
''
]
)
opt_list
.
append
(
Opt
(
'GCC_PLUGIN_STRUCTLEAK_BYREF_ALL'
,
'y'
,
'kspp'
,
'self_protection'
)
)
opt_list
.
append
(
[
Opt
(
'GCC_PLUGIN_LATENT_ENTROPY'
,
'y'
,
'kspp'
,
'self_protection'
),
''
]
)
opt_list
.
append
(
Opt
(
'GCC_PLUGIN_LATENT_ENTROPY'
,
'y'
,
'kspp'
,
'self_protection'
)
)
opt_list
.
append
(
[
Opt
(
'REFCOUNT_FULL'
,
'y'
,
'kspp'
,
'self_protection'
),
''
]
)
opt_list
.
append
(
Opt
(
'REFCOUNT_FULL'
,
'y'
,
'kspp'
,
'self_protection'
)
)
opt_list
.
append
(
[
Opt
(
'DEBUG_LIST'
,
'y'
,
'kspp'
,
'self_protection'
),
''
]
)
opt_list
.
append
(
Opt
(
'DEBUG_LIST'
,
'y'
,
'kspp'
,
'self_protection'
)
)
opt_list
.
append
(
[
Opt
(
'DEBUG_SG'
,
'y'
,
'kspp'
,
'self_protection'
),
''
]
)
opt_list
.
append
(
Opt
(
'DEBUG_SG'
,
'y'
,
'kspp'
,
'self_protection'
)
)
opt_list
.
append
(
[
Opt
(
'DEBUG_CREDENTIALS'
,
'y'
,
'kspp'
,
'self_protection'
),
''
]
)
opt_list
.
append
(
Opt
(
'DEBUG_CREDENTIALS'
,
'y'
,
'kspp'
,
'self_protection'
)
)
opt_list
.
append
(
[
Opt
(
'DEBUG_NOTIFIERS'
,
'y'
,
'kspp'
,
'self_protection'
),
''
]
)
opt_list
.
append
(
Opt
(
'DEBUG_NOTIFIERS'
,
'y'
,
'kspp'
,
'self_protection'
)
)
opt_list
.
append
(
[
Opt
(
'MODULE_SIG_FORCE'
,
'y'
,
'kspp'
,
'self_protection'
),
''
]
)
opt_list
.
append
(
Opt
(
'MODULE_SIG_FORCE'
,
'y'
,
'kspp'
,
'self_protection'
)
)
opt_list
.
append
(
[
Opt
(
'HARDENED_USERCOPY_FALLBACK'
,
'is not set'
,
'kspp'
,
'self_protection'
),
''
]
)
opt_list
.
append
(
Opt
(
'HARDENED_USERCOPY_FALLBACK'
,
'is not set'
,
'kspp'
,
'self_protection'
)
)
opt_list
.
append
(
[
Opt
(
'GCC_PLUGIN_STACKLEAK'
,
'y'
,
'my'
,
'self_protection'
),
''
]
)
opt_list
.
append
(
Opt
(
'GCC_PLUGIN_STACKLEAK'
,
'y'
,
'my'
,
'self_protection'
)
)
opt_list
.
append
(
[
Opt
(
'SLUB_DEBUG_ON'
,
'y'
,
'my'
,
'self_protection'
),
''
]
)
opt_list
.
append
(
Opt
(
'SLUB_DEBUG_ON'
,
'y'
,
'my'
,
'self_protection'
)
)
opt_list
.
append
(
[
Opt
(
'SECURITY_DMESG_RESTRICT'
,
'y'
,
'my'
,
'self_protection'
),
''
]
)
opt_list
.
append
(
Opt
(
'SECURITY_DMESG_RESTRICT'
,
'y'
,
'my'
,
'self_protection'
)
)
opt_list
.
append
(
[
Opt
(
'STATIC_USERMODEHELPER'
,
'y'
,
'my'
,
'self_protection'
),
''
]
)
# breaks systemd?
opt_list
.
append
(
Opt
(
'STATIC_USERMODEHELPER'
,
'y'
,
'my'
,
'self_protection'
)
)
# breaks systemd?
opt_list
.
append
(
[
Opt
(
'PAGE_POISONING_NO_SANITY'
,
'is not set'
,
'my'
,
'self_protection'
),
''
]
)
opt_list
.
append
(
Opt
(
'PAGE_POISONING_NO_SANITY'
,
'is not set'
,
'my'
,
'self_protection'
)
)
opt_list
.
append
(
[
Opt
(
'PAGE_POISONING_ZERO'
,
'is not set'
,
'my'
,
'self_protection'
),
''
]
)
opt_list
.
append
(
Opt
(
'PAGE_POISONING_ZERO'
,
'is not set'
,
'my'
,
'self_protection'
)
)
opt_list
.
append
(
[
Opt
(
'SECURITY'
,
'y'
,
'ubuntu18'
,
'security_policy'
),
''
]
)
opt_list
.
append
(
Opt
(
'SECURITY'
,
'y'
,
'ubuntu18'
,
'security_policy'
)
)
opt_list
.
append
(
[
Opt
(
'SECURITY_YAMA'
,
'y'
,
'ubuntu18'
,
'security_policy'
),
''
]
)
opt_list
.
append
(
Opt
(
'SECURITY_YAMA'
,
'y'
,
'ubuntu18'
,
'security_policy'
)
)
opt_list
.
append
(
[
Opt
(
'SECURITY_SELINUX_DISABLE'
,
'is not set'
,
'ubuntu18'
,
'security_policy'
),
''
]
)
opt_list
.
append
(
Opt
(
'SECURITY_SELINUX_DISABLE'
,
'is not set'
,
'ubuntu18'
,
'security_policy'
)
)
opt_list
.
append
(
[
Opt
(
'SECCOMP'
,
'y'
,
'ubuntu18'
,
'cut_attack_surface'
),
''
]
)
opt_list
.
append
(
Opt
(
'SECCOMP'
,
'y'
,
'ubuntu18'
,
'cut_attack_surface'
)
)
opt_list
.
append
(
[
Opt
(
'SECCOMP_FILTER'
,
'y'
,
'ubuntu18'
,
'cut_attack_surface'
),
''
]
)
opt_list
.
append
(
Opt
(
'SECCOMP_FILTER'
,
'y'
,
'ubuntu18'
,
'cut_attack_surface'
)
)
opt_list
.
append
(
[
Opt
(
'STRICT_DEVMEM'
,
'y'
,
'ubuntu18'
,
'cut_attack_surface'
),
''
]
)
opt_list
.
append
(
Opt
(
'STRICT_DEVMEM'
,
'y'
,
'ubuntu18'
,
'cut_attack_surface'
)
)
opt_list
.
append
(
[
Opt
(
'ACPI_CUSTOM_METHOD'
,
'is not set'
,
'ubuntu18'
,
'cut_attack_surface'
),
''
]
)
opt_list
.
append
(
Opt
(
'ACPI_CUSTOM_METHOD'
,
'is not set'
,
'ubuntu18'
,
'cut_attack_surface'
)
)
opt_list
.
append
(
[
Opt
(
'COMPAT_BRK'
,
'is not set'
,
'ubuntu18'
,
'cut_attack_surface'
),
''
]
)
opt_list
.
append
(
Opt
(
'COMPAT_BRK'
,
'is not set'
,
'ubuntu18'
,
'cut_attack_surface'
)
)
opt_list
.
append
(
[
Opt
(
'DEVKMEM'
,
'is not set'
,
'ubuntu18'
,
'cut_attack_surface'
),
''
]
)
opt_list
.
append
(
Opt
(
'DEVKMEM'
,
'is not set'
,
'ubuntu18'
,
'cut_attack_surface'
)
)
opt_list
.
append
(
[
Opt
(
'COMPAT_VDSO'
,
'is not set'
,
'ubuntu18'
,
'cut_attack_surface'
),
''
]
)
opt_list
.
append
(
Opt
(
'COMPAT_VDSO'
,
'is not set'
,
'ubuntu18'
,
'cut_attack_surface'
)
)
opt_list
.
append
(
[
Opt
(
'X86_PTDUMP'
,
'is not set'
,
'ubuntu18'
,
'cut_attack_surface'
),
''
]
)
opt_list
.
append
(
Opt
(
'X86_PTDUMP'
,
'is not set'
,
'ubuntu18'
,
'cut_attack_surface'
)
)
opt_list
.
append
(
[
Opt
(
'ZSMALLOC_STAT'
,
'is not set'
,
'ubuntu18'
,
'cut_attack_surface'
),
''
]
)
opt_list
.
append
(
Opt
(
'ZSMALLOC_STAT'
,
'is not set'
,
'ubuntu18'
,
'cut_attack_surface'
)
)
opt_list
.
append
(
[
Opt
(
'PAGE_OWNER'
,
'is not set'
,
'ubuntu18'
,
'cut_attack_surface'
),
''
]
)
opt_list
.
append
(
Opt
(
'PAGE_OWNER'
,
'is not set'
,
'ubuntu18'
,
'cut_attack_surface'
)
)
opt_list
.
append
(
[
Opt
(
'DEBUG_KMEMLEAK'
,
'is not set'
,
'ubuntu18'
,
'cut_attack_surface'
),
''
]
)
opt_list
.
append
(
Opt
(
'DEBUG_KMEMLEAK'
,
'is not set'
,
'ubuntu18'
,
'cut_attack_surface'
)
)
opt_list
.
append
(
[
Opt
(
'IO_STRICT_DEVMEM'
,
'y'
,
'kspp'
,
'cut_attack_surface'
),
''
]
)
opt_list
.
append
(
Opt
(
'IO_STRICT_DEVMEM'
,
'y'
,
'kspp'
,
'cut_attack_surface'
)
)
opt_list
.
append
(
[
Opt
(
'LEGACY_VSYSCALL_NONE'
,
'y'
,
'kspp'
,
'cut_attack_surface'
),
''
]
)
# 'vsyscall=none'
opt_list
.
append
(
Opt
(
'LEGACY_VSYSCALL_NONE'
,
'y'
,
'kspp'
,
'cut_attack_surface'
)
)
# 'vsyscall=none'
opt_list
.
append
(
[
Opt
(
'BINFMT_MISC'
,
'is not set'
,
'kspp'
,
'cut_attack_surface'
),
''
]
)
opt_list
.
append
(
Opt
(
'BINFMT_MISC'
,
'is not set'
,
'kspp'
,
'cut_attack_surface'
)
)
opt_list
.
append
(
[
Opt
(
'INET_DIAG'
,
'is not set'
,
'kspp'
,
'cut_attack_surface'
),
''
]
)
opt_list
.
append
(
Opt
(
'INET_DIAG'
,
'is not set'
,
'kspp'
,
'cut_attack_surface'
)
)
opt_list
.
append
(
[
Opt
(
'KEXEC'
,
'is not set'
,
'kspp'
,
'cut_attack_surface'
),
''
]
)
opt_list
.
append
(
Opt
(
'KEXEC'
,
'is not set'
,
'kspp'
,
'cut_attack_surface'
)
)
opt_list
.
append
(
[
Opt
(
'PROC_KCORE'
,
'is not set'
,
'kspp'
,
'cut_attack_surface'
),
''
]
)
opt_list
.
append
(
Opt
(
'PROC_KCORE'
,
'is not set'
,
'kspp'
,
'cut_attack_surface'
)
)
opt_list
.
append
(
[
Opt
(
'LEGACY_PTYS'
,
'is not set'
,
'kspp'
,
'cut_attack_surface'
),
''
]
)
opt_list
.
append
(
Opt
(
'LEGACY_PTYS'
,
'is not set'
,
'kspp'
,
'cut_attack_surface'
)
)
opt_list
.
append
(
[
Opt
(
'IA32_EMULATION'
,
'is not set'
,
'kspp'
,
'cut_attack_surface'
),
''
]
)
opt_list
.
append
(
Opt
(
'IA32_EMULATION'
,
'is not set'
,
'kspp'
,
'cut_attack_surface'
)
)
opt_list
.
append
(
[
Opt
(
'X86_X32'
,
'is not set'
,
'kspp'
,
'cut_attack_surface'
),
''
]
)
opt_list
.
append
(
Opt
(
'X86_X32'
,
'is not set'
,
'kspp'
,
'cut_attack_surface'
)
)
opt_list
.
append
(
[
Opt
(
'MODIFY_LDT_SYSCALL'
,
'is not set'
,
'kspp'
,
'cut_attack_surface'
),
''
]
)
opt_list
.
append
(
Opt
(
'MODIFY_LDT_SYSCALL'
,
'is not set'
,
'kspp'
,
'cut_attack_surface'
)
)
opt_list
.
append
(
[
Opt
(
'HIBERNATION'
,
'is not set'
,
'kspp'
,
'cut_attack_surface'
),
''
]
)
opt_list
.
append
(
Opt
(
'HIBERNATION'
,
'is not set'
,
'kspp'
,
'cut_attack_surface'
)
)
opt_list
.
append
(
[
Opt
(
'KPROBES'
,
'is not set'
,
'grsecurity'
,
'cut_attack_surface'
),
''
]
)
opt_list
.
append
(
Opt
(
'KPROBES'
,
'is not set'
,
'grsecurity'
,
'cut_attack_surface'
)
)
opt_list
.
append
(
[
Opt
(
'UPROBES'
,
'is not set'
,
'grsecurity'
,
'cut_attack_surface'
),
''
]
)
opt_list
.
append
(
Opt
(
'UPROBES'
,
'is not set'
,
'grsecurity'
,
'cut_attack_surface'
)
)
opt_list
.
append
(
[
Opt
(
'GENERIC_TRACER'
,
'is not set'
,
'grsecurity'
,
'cut_attack_surface'
),
''
]
)
opt_list
.
append
(
Opt
(
'GENERIC_TRACER'
,
'is not set'
,
'grsecurity'
,
'cut_attack_surface'
)
)
opt_list
.
append
(
[
Opt
(
'PROC_VMCORE'
,
'is not set'
,
'grsecurity'
,
'cut_attack_surface'
),
''
]
)
opt_list
.
append
(
Opt
(
'PROC_VMCORE'
,
'is not set'
,
'grsecurity'
,
'cut_attack_surface'
)
)
opt_list
.
append
(
[
Opt
(
'PROC_PAGE_MONITOR'
,
'is not set'
,
'grsecurity'
,
'cut_attack_surface'
),
''
]
)
opt_list
.
append
(
Opt
(
'PROC_PAGE_MONITOR'
,
'is not set'
,
'grsecurity'
,
'cut_attack_surface'
)
)
opt_list
.
append
(
[
Opt
(
'USELIB'
,
'is not set'
,
'grsecurity'
,
'cut_attack_surface'
),
''
]
)
opt_list
.
append
(
Opt
(
'USELIB'
,
'is not set'
,
'grsecurity'
,
'cut_attack_surface'
)
)
opt_list
.
append
(
[
Opt
(
'CHECKPOINT_RESTORE'
,
'is not set'
,
'grsecurity'
,
'cut_attack_surface'
),
''
]
)
opt_list
.
append
(
Opt
(
'CHECKPOINT_RESTORE'
,
'is not set'
,
'grsecurity'
,
'cut_attack_surface'
)
)
opt_list
.
append
(
[
Opt
(
'USERFAULTFD'
,
'is not set'
,
'grsecurity'
,
'cut_attack_surface'
),
''
]
)
opt_list
.
append
(
Opt
(
'USERFAULTFD'
,
'is not set'
,
'grsecurity'
,
'cut_attack_surface'
)
)
opt_list
.
append
(
[
Opt
(
'HWPOISON_INJECT'
,
'is not set'
,
'grsecurity'
,
'cut_attack_surface'
),
''
]
)
opt_list
.
append
(
Opt
(
'HWPOISON_INJECT'
,
'is not set'
,
'grsecurity'
,
'cut_attack_surface'
)
)
opt_list
.
append
(
[
Opt
(
'MEM_SOFT_DIRTY'
,
'is not set'
,
'grsecurity'
,
'cut_attack_surface'
),
''
]
)
opt_list
.
append
(
Opt
(
'MEM_SOFT_DIRTY'
,
'is not set'
,
'grsecurity'
,
'cut_attack_surface'
)
)
opt_list
.
append
(
[
Opt
(
'DEVPORT'
,
'is not set'
,
'grsecurity'
,
'cut_attack_surface'
),
''
]
)
opt_list
.
append
(
Opt
(
'DEVPORT'
,
'is not set'
,
'grsecurity'
,
'cut_attack_surface'
)
)
opt_list
.
append
(
[
Opt
(
'DEBUG_FS'
,
'is not set'
,
'grsecurity'
,
'cut_attack_surface'
),
''
]
)
opt_list
.
append
(
Opt
(
'DEBUG_FS'
,
'is not set'
,
'grsecurity'
,
'cut_attack_surface'
)
)
opt_list
.
append
(
[
Opt
(
'NOTIFIER_ERROR_INJECTION'
,
'is not set'
,
'grsecurity'
,
'cut_attack_surface'
),
''
]
)
opt_list
.
append
(
Opt
(
'NOTIFIER_ERROR_INJECTION'
,
'is not set'
,
'grsecurity'
,
'cut_attack_surface'
)
)
opt_list
.
append
(
[
Opt
(
'KEXEC_FILE'
,
'is not set'
,
'my'
,
'cut_attack_surface'
),
''
]
)
opt_list
.
append
(
Opt
(
'KEXEC_FILE'
,
'is not set'
,
'my'
,
'cut_attack_surface'
)
)
opt_list
.
append
(
[
Opt
(
'LIVEPATCH'
,
'is not set'
,
'my'
,
'cut_attack_surface'
),
''
]
)
opt_list
.
append
(
Opt
(
'LIVEPATCH'
,
'is not set'
,
'my'
,
'cut_attack_surface'
)
)
opt_list
.
append
(
[
Opt
(
'USER_NS'
,
'is not set'
,
'my'
,
'cut_attack_surface'
),
''
]
)
# user.max_user_namespaces=0
opt_list
.
append
(
Opt
(
'USER_NS'
,
'is not set'
,
'my'
,
'cut_attack_surface'
)
)
# user.max_user_namespaces=0
opt_list
.
append
(
[
Opt
(
'IP_DCCP'
,
'is not set'
,
'my'
,
'cut_attack_surface'
),
''
]
)
opt_list
.
append
(
Opt
(
'IP_DCCP'
,
'is not set'
,
'my'
,
'cut_attack_surface'
)
)
opt_list
.
append
(
[
Opt
(
'IP_SCTP'
,
'is not set'
,
'my'
,
'cut_attack_surface'
),
''
]
)
opt_list
.
append
(
Opt
(
'IP_SCTP'
,
'is not set'
,
'my'
,
'cut_attack_surface'
)
)
opt_list
.
append
(
[
Opt
(
'FTRACE'
,
'is not set'
,
'my'
,
'cut_attack_surface'
),
''
]
)
opt_list
.
append
(
Opt
(
'FTRACE'
,
'is not set'
,
'my'
,
'cut_attack_surface'
)
)
opt_list
.
append
(
[
Opt
(
'PROFILING'
,
'is not set'
,
'my'
,
'cut_attack_surface'
),
''
]
)
opt_list
.
append
(
Opt
(
'PROFILING'
,
'is not set'
,
'my'
,
'cut_attack_surface'
)
)
opt_list
.
append
(
[
Opt
(
'BPF_JIT'
,
'is not set'
,
'my'
,
'cut_attack_surface'
),
''
]
)
opt_list
.
append
(
Opt
(
'BPF_JIT'
,
'is not set'
,
'my'
,
'cut_attack_surface'
)
)
opt_list
.
append
(
[
Opt
(
'BPF_SYSCALL'
,
'is not set'
,
'my'
,
'cut_attack_surface'
),
''
]
)
opt_list
.
append
(
Opt
(
'BPF_SYSCALL'
,
'is not set'
,
'my'
,
'cut_attack_surface'
)
)
opt_list
.
append
(
[
Opt
(
'ARCH_MMAP_RND_BITS'
,
'32'
,
'my'
,
'userspace_protection'
),
''
]
)
opt_list
.
append
(
Opt
(
'ARCH_MMAP_RND_BITS'
,
'32'
,
'my'
,
'userspace_protection'
)
)
opt_list
.
append
(
[
Opt
(
'LKDTM'
,
'm'
,
'my'
,
'feature_test'
),
''
]
)
opt_list
.
append
(
Opt
(
'LKDTM'
,
'm'
,
'my'
,
'feature_test'
)
)
def
print_opt_checks
():
def
print_opt_checks
():
print
(
'[+] Printing kernel hardening preferences...'
)
print
(
'[+] Printing kernel hardening preferences...'
)
print
(
' {:<39}|{:^13}|{:^10}|{:^20}'
.
format
(
'option name'
,
'desired val'
,
'decision'
,
'reason'
))
print
(
' {:<39}|{:^13}|{:^10}|{:^20}'
.
format
(
'option name'
,
'desired val'
,
'decision'
,
'reason'
))
print
(
' ======================================================================================'
)
print
(
' ======================================================================================'
)
for
o
in
opt_list
:
for
o
pt
in
opt_list
:
print
(
' CONFIG_{:<32}|{:^13}|{:^10}|{:^20}'
.
format
(
o
[
0
]
.
name
,
o
[
0
]
.
expected
,
o
[
0
]
.
decision
,
o
[
0
]
.
reason
))
print
(
' CONFIG_{:<32}|{:^13}|{:^10}|{:^20}'
.
format
(
o
pt
.
name
,
opt
.
expected
,
opt
.
decision
,
opt
.
reason
))
print
()
print
()
...
@@ -173,8 +179,8 @@ def print_check_results():
...
@@ -173,8 +179,8 @@ def print_check_results():
print
(
' {:<39}|{:^13}|{:^10}|{:^20}||{:^20}'
.
format
(
'option name'
,
'desired val'
,
'decision'
,
'reason'
,
'check result'
))
print
(
' {:<39}|{:^13}|{:^10}|{:^20}||{:^20}'
.
format
(
'option name'
,
'desired val'
,
'decision'
,
'reason'
,
'check result'
))
print
(
' ==========================================================================================================='
)
print
(
' ==========================================================================================================='
)
for
o
in
opt_list
:
for
o
pt
in
opt_list
:
print
(
' CONFIG_{:<32}|{:^13}|{:^10}|{:^20}||{:^20}'
.
format
(
o
[
0
]
.
name
,
o
[
0
]
.
expected
,
o
[
0
]
.
decision
,
o
[
0
]
.
reason
,
o
[
1
]
))
print
(
' CONFIG_{:<32}|{:^13}|{:^10}|{:^20}||{:^20}'
.
format
(
o
pt
.
name
,
opt
.
expected
,
opt
.
decision
,
opt
.
reason
,
opt
.
result
))
print
()
print
()
...
@@ -183,10 +189,9 @@ def get_option_state(options, name):
...
@@ -183,10 +189,9 @@ def get_option_state(options, name):
def
perform_checks
(
parsed_options
):
def
perform_checks
(
parsed_options
):
for
o
in
opt_list
:
for
opt
in
opt_list
:
opt
=
o
[
0
]
opt
.
state
=
get_option_state
(
parsed_options
,
opt
.
name
)
opt
.
state
=
get_option_state
(
parsed_options
,
opt
.
name
)
_
,
o
[
1
]
=
opt
.
check
()
opt
.
check
()
def
check_config_file
(
fname
):
def
check_config_file
(
fname
):
...
@@ -217,7 +222,7 @@ def check_config_file(fname):
...
@@ -217,7 +222,7 @@ def check_config_file(fname):
perform_checks
(
parsed_options
)
perform_checks
(
parsed_options
)
if
debug_mode
:
if
debug_mode
:
known_options
=
[
o
[
0
]
.
name
for
o
in
opt_list
]
known_options
=
[
o
pt
.
name
for
opt
in
opt_list
]
for
option
,
value
in
parsed_options
.
items
():
for
option
,
value
in
parsed_options
.
items
():
if
option
not
in
known_options
:
if
option
not
in
known_options
:
print
(
"DEBUG: dunno about option {} ({})"
.
format
(
option
,
value
))
print
(
"DEBUG: dunno about option {} ({})"
.
format
(
option
,
value
))
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment