hardening.config (d754ed2821fd9675d203cb73c4afcd593e28b7d0) | hardening.config (67f2df3b82d091ed095d0e47e1f3a9d3e18e4e41) |
---|---|
1# Help: Basic kernel hardening options 2# 3# These are considered the basic kernel hardening, self-protection, and 4# attack surface reduction options. They are expected to have low (or 5# no) performance impact on most workloads, and have a reasonable level 6# of legacy API removals. 7 8# Make sure reporting of various hardening actions is possible. --- 6 unchanged lines hidden (view full) --- 15 16# Kernel image and memory ASLR. 17CONFIG_RANDOMIZE_BASE=y 18CONFIG_RANDOMIZE_MEMORY=y 19 20# Randomize allocator freelists, harden metadata. 21CONFIG_SLAB_FREELIST_RANDOM=y 22CONFIG_SLAB_FREELIST_HARDENED=y | 1# Help: Basic kernel hardening options 2# 3# These are considered the basic kernel hardening, self-protection, and 4# attack surface reduction options. They are expected to have low (or 5# no) performance impact on most workloads, and have a reasonable level 6# of legacy API removals. 7 8# Make sure reporting of various hardening actions is possible. --- 6 unchanged lines hidden (view full) --- 15 16# Kernel image and memory ASLR. 17CONFIG_RANDOMIZE_BASE=y 18CONFIG_RANDOMIZE_MEMORY=y 19 20# Randomize allocator freelists, harden metadata. 21CONFIG_SLAB_FREELIST_RANDOM=y 22CONFIG_SLAB_FREELIST_HARDENED=y |
23CONFIG_SLAB_BUCKETS=y |
|
23CONFIG_SHUFFLE_PAGE_ALLOCATOR=y 24CONFIG_RANDOM_KMALLOC_CACHES=y 25 26# Sanity check userspace page table mappings. 27CONFIG_PAGE_TABLE_CHECK=y 28CONFIG_PAGE_TABLE_CHECK_ENFORCED=y 29 30# Randomize kernel stack offset on syscall entry. --- 76 unchanged lines hidden --- | 24CONFIG_SHUFFLE_PAGE_ALLOCATOR=y 25CONFIG_RANDOM_KMALLOC_CACHES=y 26 27# Sanity check userspace page table mappings. 28CONFIG_PAGE_TABLE_CHECK=y 29CONFIG_PAGE_TABLE_CHECK_ENFORCED=y 30 31# Randomize kernel stack offset on syscall entry. --- 76 unchanged lines hidden --- |