On Wed, Jun 26, 2019 at 11:02 PM <zhe...@windriver.com> wrote:
>
> From: He Zhe <zhe...@windriver.com>
>
> Signed-off-by: He Zhe <zhe...@windriver.com>
> ---
> v2: Add a note for people using uvesafb or other similar things.
>

merged.

Bruce

>  features/security/security.cfg | 18 ++++++++++++++++++
>  1 file changed, 18 insertions(+)
>
> diff --git a/features/security/security.cfg b/features/security/security.cfg
> index 87408b6..0a4e246 100644
> --- a/features/security/security.cfg
> +++ b/features/security/security.cfg
> @@ -11,6 +11,7 @@ CONFIG_SLAB_FREELIST_HARDENED=y
>
>  # Stack Protector is for buffer overflow detection and hardening
>  CONFIG_STACKPROTECTOR=y
> +CONFIG_STACKPROTECTOR_STRONG=y
>
>  # Perform extensive checks on reference counting
>  CONFIG_REFCOUNT_FULL=y
> @@ -34,6 +35,8 @@ CONFIG_LEGACY_VSYSCALL_NONE=y
>  # CONFIG_INET_DIAG is not set
>
>  # Do not allow direct physical memory access (enable only STRICT mode...)
> +# Note that drivers like uvesafb/v86d depending on direct physical memory
> +# access would be affected.
>  # CONFIG_DEVMEM is not set
>  CONFIG_STRICT_DEVMEM=y
>  CONFIG_IO_STRICT_DEVMEM=y
> @@ -44,3 +47,18 @@ CONFIG_DEBUG_LIST=y
>  CONFIG_DEBUG_SG=y
>  CONFIG_DEBUG_NOTIFIERS=y
>  CONFIG_DEBUG_CREDENTIALS=y
> +
> +# Information exposure
> +CONFIG_PAGE_POISONING=y
> +
> +# Kernel Address Space Layout Randomization (KASLR)
> +CONFIG_RANDOMIZE_BASE=y
> +CONFIG_RANDOMIZE_MEMORY=y
> +
> +# Direct kernel overwrite
> +CONFIG_STRICT_KERNEL_RWX=y
> +CONFIG_STRICT_MODULE_RWX=y
> +
> +# Meltdown and Spectre
> +CONFIG_PAGE_TABLE_ISOLATION=y
> +CONFIG_RETPOLINE=y
> --
> 2.7.4
>


-- 
- Thou shalt not follow the NULL pointer, for chaos and madness await
thee at its end
- "Use the force Harry" - Gandalf, Star Trek II
-- 
_______________________________________________
linux-yocto mailing list
linux-yocto@yoctoproject.org
https://lists.yoctoproject.org/listinfo/linux-yocto

Reply via email to