1. 14 Aug, 2022 1 commit
    • Describe the meaning of the checks · 6a467438
      Don't add CmdlineChecks in add_kconfig_checks() to avoid wrong results
      when the tool doesn't check the cmdline.
      
      A common pattern for checking the 'param_x' cmdline parameter
      that __overrides__ the 'PARAM_X_DEFAULT' kconfig option:
        l += [OR(CmdlineCheck(reason, decision, 'param_x', '1'),
                 AND(KconfigCheck(reason, decision, 'PARAM_X_DEFAULT_ON', 'y'),
                     CmdlineCheck(reason, decision, 'param_x, 'is not set')))]
      
      Here we don't check the kconfig options or minimal kernel version
      required for the cmdline parameters. That would make the checks
      very complex and not give a 100% guarantee anyway.
      Alexander Popov authored
  2. 13 Aug, 2022 4 commits
  3. 21 Jul, 2022 4 commits
    • Improve the slab_common.usercopy_fallback check · b51a6979
      Having HARDENED_USERCOPY_FALLBACK disabled is not enough.
      Alexander Popov authored
    • Improve the STACKPROTECTOR check · 3bdbc3ae
      The Linux kernel 4.16-4.17 has a weird STACKPROTECTOR configuration:
      CC_STACKPROTECTOR_NONE -- stackprotector is disabled;
      CC_STACKPROTECTOR_REGULAR -- similar to current STACKPROTECTOR;
      CC_STACKPROTECTOR_STRONG -- similar to current STACKPROTECTOR_STRONG;
      CC_STACKPROTECTOR_AUTO -- the best stack-protector that compiler provides.
      These options are mutually exclusive.
      
      Let's improve the STACKPROTECTOR check:
      - Add CC_STACKPROTECTOR_REGULAR as a valid alternative name of this option;
      - Add CC_STACKPROTECTOR_STRONG to avoid false negative result;
      - Add CC_STACKPROTECTOR_AUTO hoping that it enables at least STACKPROTECTOR.
      
      The STACKPROTECTOR_STRONG check still requires explicit configuration, not
      CC_STACKPROTECTOR_AUTO.
      
      Thanks to @izh1979 for the idea
      Alexander Popov authored
    • Don't mention LKDTM · 5d007e67
      I can't recommend disabling it, because LKDTM is used to test the kernel
      hardening features.
      
      But I cant recommend enabling it, because LKDTM contains intentional
      memory corruption errors. It's not for production systems.
      
      So let's simply drop the comment about LKDTM.
      Alexander Popov authored
  4. 17 Jul, 2022 4 commits
  5. 11 Jul, 2022 4 commits
  6. 09 Jul, 2022 2 commits
  7. 08 Jul, 2022 1 commit
  8. 20 Jun, 2022 4 commits
  9. 19 Jun, 2022 3 commits
  10. 08 Jun, 2022 10 commits
  11. 30 May, 2022 3 commits