Skip to content

A tool for checking the security hardening options of the Linux kernel

License

Notifications You must be signed in to change notification settings

LinuxSafety-Security/kconfig-safety-check

 
 

Repository files navigation

kconfig-safety-check

There are plenty of safety and security hardening options in the Linux kernel.

This tool is to help with checking Linux Configurations.

1. Supported Architectures

  • X86_64
  • X86_32
  • ARM64
  • ARM

2. Installation

You can install the package:

pip install git+https://github.com/wenhuizhang/kconfig-safety-check

or simply run ./bin/kconfig-safety-check from the cloned repository.

3. Usage

1. Example usage:

./bin/kconfig-safety-check -p X86_64 -c ../linux-image-bsk/.config -m show_fail
usage: kconfig-safety-check [-h] [--version] [-p {X86_64,X86_32,ARM64,ARM}]
                              [-c CONFIG]
                              [-m {verbose,json,show_ok,show_fail}]
                              [-e {dev, prod, debug, trace}]

A tool for checking the security hardening options of the Linux kernel

optional arguments:
  -h, --help            show this help message and exit
  --version             show program's version number and exit
  -p {X86_64,X86_32,ARM64,ARM}, --print {X86_64,X86_32,ARM64,ARM}
                        print security hardening preferences for the selected architecture
  -c CONFIG, --config CONFIG
                        check the kernel config file against these preferences
  -m {verbose,json,show_ok,show_fail}, --mode {verbose,json,show_ok,show_fail}
                        choose the report mode
  -e {dev, prod, debug, trace}, --env {dev, prod, debug, trace}
                        choose the check environment

2. Output modes

  • no -m argument for the default output mode (see the example below)
  • -m verbose for printing additional info:
    • config options without a corresponding check
    • internals of complex checks
  • -m show_fail for showing only the failed checks
  • -m show_ok for showing only the successful checks
  • -m json for printing the results in JSON format (for combining kconfig-safety-check with other tools)

3. Example output for Debian GNU/Linux 9 (stretch):

$ ./bin/kconfig-safety-check -p X86_64 -c ../linux-config/config.x86_64.5.10 -m show_fail
[+] Special report mode: show_fail
[+] Kconfig file to check: ../linux-config/config.x86_64.5.10
[+] Detected architecture: X86_64
[+] Detected kernel version: 5.10
=========================================================================================================================
              option name               | type  |desired val | decision |      reason      | check result
=========================================================================================================================
CONFIG_SLAB_MERGE_DEFAULT               |kconfig|     n      |ELISA_safety, Intel|Memory management:Heap:Use after free| FAIL: "y"
CONFIG_INIT_ON_FREE_DEFAULT_ON          |kconfig|     y      |ELISA_safety|Memory management:Heap:Debug| FAIL: "is not set"
CONFIG_INIT_ON_ALLOC_DEFAULT_ON         |kconfig|     y      |ELISA_safety|Memory management:Heap:Debug| FAIL: "is not set"
CONFIG_REFCOUNT_FULL                    |kconfig|     y      |ELISA_safety|Kernel Memory reference count: Use after free| FAIL: not found
CONFIG_GCC_PLUGIN_STRUCTKLEAK           |kconfig|     y      |ELISA_safety|GCC, plugins, Stack memory:Uninitialized variables| FAIL: not found
CONFIG_GCC_PLUGIN_STRUCTLEAK_BYREF_ALL  |kconfig|     y      |ELISA_safety|GCC, plugins, Stack memory:Uninitialized variables| FAIL: not found
CONFIG_INIT_STACK_ALL                   |kconfig|     y      |ELISA_safety|Stack memory:Uninitialized variables| FAIL: not found
CONFIG_BPF_JIT_ALWAYS_ON                |kconfig|     y      |ELISA_safety|Kernel Memory:Isolation of critical code| FAIL: "is not set"
CONFIG_BPF_UNPRIV_DEFAULT_OFF           |kconfig|     y      |ELISA_safety|Kernel Memory:Isolation of critical code| FAIL: not found
CONFIG_GCC_PLUGIN_STACKLEAK             |kconfig|     y      |ELISA_safety|Stack memory:Stack overflow| FAIL: not found
CONFIG_PAGE_POISONING_NO_SANITY         |kconfig|     n      |ELISA_safety|Stack memory:Stack overflow| FAIL: "y"
CONFIG_DEBUG_SG                         |kconfig|     y      |ELISA_safety|Driver: Heap overflow| FAIL: "is not set"
CONFIG_KMEM                             |kconfig|     n      |  Intel   |Kernel Memory:Kernel corruption of user space memory| FAIL: not found
CONFIG_DEVMEM                           |kconfig|     n      |ELISA_safety, Intel|Kernel Memory:Kernel corruption of user space memory| FAIL: "y"
CONFIG_DEVPORT                          |kconfig|     n      |ELISA_safety, Intel|Kernel Memory:Kernel corruption of user space memory| FAIL: "y"
CONFIG_ACPI_CUSTOM_METHOD               |kconfig|     n      |ELISA_safety|Kernel Memory:Kernel corruption of user space memory| FAIL: "is not set"
CONFIG_LEGACY_PTYS                      |kconfig|     n      |ELISA_safety|Kernel Memory:Kernel corruption of user space memory| FAIL: "is not set"
CONFIG_HIBERNATION                      |kconfig|     n      |ELISA_safety|Kernel Memory:Kernel corruption of user space memory| FAIL: "y"
CONFIG_KEXEC                            |kconfig|     n      |ELISA_safety|Kernel Memory:Kernel corruption of user space memory| FAIL: "y"
CONFIG_HARDENED_USERCOPY_FALLBACK       |kconfig|     n      |ELISA_safety|Kernel Memory:Kernel corruption of user space memory| FAIL: "is not set"
CONFIG_HARDENED_USERCOPY_PAGESPAN       |kconfig|     n      |ELISA_safety|Kernel Memory:Kernel corruption of user space memory| FAIL: "is not set"
CONFIG_COMPAT_BRK                       |kconfig|     n      |ELISA_safety|Heap memory:R/W access to memory allocated to another software element| FAIL: "is not set"
CONFIG_USERFAULTFD                      |kconfig|     n      |ELISA_safety|Heap memory:R/W access to memory allocated to another software element| FAIL: "y"
CONFIG_KPROBES                          |kconfig|     n      |ELISA_safety|Stack memory:Enable traceability| FAIL: "y"
CONFIG_PROC_KCORE                       |kconfig|     n      |ELISA_safety|Stack memory:Enable traceability| FAIL: "y"
CONFIG_KALLSYMS                         |kconfig|     n      |ELISA_safety|Stack memory:Enable traceability| FAIL: "y"
CONFIG_WQ_WATCHDOG                      |kconfig|     y      |ELISA_safety|Debug:Kernel mode lockup| FAIL: "is not set"
CONFIG_KCSAN                            |kconfig|     y      |ELISA_safety|Debug:Kernel mode lockup| FAIL: not found
CONFIG_PROVE_LOCKING                    |kconfig|     y      |ELISA_safety|Debug:Kernel mode lockup| FAIL: "is not set"
CONFIG_DEBUG_RT_MUTEXES                 |kconfig|     y      |ELISA_safety| Debug:RT mutexes | FAIL: "is not set"
CONFIG_DEBUG_SPINLOCK                   |kconfig|     y      |ELISA_safety| Debug:RT mutexes | FAIL: "is not set"
CONFIG_DEBUG_MUTEXES                    |kconfig|     y      |ELISA_safety| Debug:RT mutexes | FAIL: "is not set"
CONFIG_DEBUG_WW_MUTEX_SLOWPATH          |kconfig|     y      |ELISA_safety| Debug:RT mutexes | FAIL: "is not set"
CONFIG_DEBUG_LOCK_ALLOC                 |kconfig|     y      |ELISA_safety| Debug:RT mutexes | FAIL: "is not set"
CONFIG_DEBUG_LOCKING_API_SELFTESTS      |kconfig|     y      |ELISA_safety| Debug:RT mutexes | FAIL: "is not set"
CONFIG_LOCK_TORTURE_TEST                |kconfig|     y      |ELISA_safety| Debug:RT mutexes | FAIL: "is not set"
CONFIG_WW_MUTEX_SELFTEST                |kconfig|     y      |ELISA_safety| Debug:RT mutexes | FAIL: "is not set"
CONFIG_RCU_TORTURE_TEST                 |kconfig|     y      |ELISA_safety| Debug:RT mutexes | FAIL: "is not set"
CONFIG_DEBUG_ATOMIC_SLEEP               |kconfig|     y      |ELISA_safety| Debug:RT mutexes | FAIL: "is not set"
CONFIG_DEBUG_NOTIFIERS                  |kconfig|     y      |ELISA_safety|Debug:Notification| FAIL: "is not set"
CONFIG_LOCK_STAT                        |kconfig|     y      |ELISA_safety|Debug:Notification| FAIL: "is not set"
CONFIG_RETPOLINE                        |kconfig|     y      |ELISA_safety|Branch Target Buffer:Side Channel Attacks| FAIL: "is not set"
CONFIG_BPF_UNPRIV_DEFAULT_OFF           |kconfig|     n      |ELISA_safety|Branch Target Buffer:Side Channel Attacks| FAIL: not found
CONFIG_LIVEPATCH                        |kconfig|     n      |ELISA_safety|    Live Patch    | FAIL: "y"
CONFIG_DEVKMEM                          |kconfig|     y      |ELISA_safety|Kernel Memory:Kernel corruption of user space memory| FAIL: "is not set"
CONFIG_SECURITY_WRITABLE_HOOKS          |kconfig|     n      |ELISA_security|Linux Security Module| FAIL: not found
CONFIG_SECURITY_INFINIBAND              |kconfig|     y      |ELISA_security|Linux Security Module| FAIL: "is not set"
CONFIG_INTEL_TXT                        |kconfig|     y      |ELISA_security|Linux Security Module| FAIL: "is not set"
CONFIG_LSM_MMAP_MIN_ADDR                |kconfig|     y      |ELISA_security|Linux Security Module| FAIL: not found
CONFIG_STATIC_USERMODEHELPER            |kconfig|     y      |ELISA_security|Linux Security Module| FAIL: "is not set"
CONFIG_STATIC_USERMODEHELPER_PATH       |kconfig|     y      |ELISA_security|Linux Security Module| FAIL: not found
CONFIG_SECURITY_SELINUX                 |kconfig|     y      |ELISA_security|Linux Security Module| FAIL: "is not set"
CONFIG_SECURITY_APPARMOR                |kconfig|     y      |ELISA_security|Linux Security Module| FAIL: "is not set"

[+] Config check is finished: 'OK' - 34 (suppressed in output) / 'FAIL' - 53

About

A tool for checking the security hardening options of the Linux kernel

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Python 99.6%
  • Nix 0.4%