-
Notifications
You must be signed in to change notification settings - Fork 158
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Suggestions for kernel-hardening-checker #113
Comments
I had similar thoughts, the performance rating sounds sensible |
@asarubbo, that's an interesting idea. Could you please describe it in the issue #66 as well? However, creating such a rating would not be easy because some kernel security features have different performance penalty depending on the type of system workload (a number and type of system calls, for example). Do you have an idea which particular kernel option makes your system run slow on compiling chromium? First of all, I would recommend comparing performance of the default configuration and hardened configuration without |
@asarubbo, yes, that's true. Currently, the options are sorted by the complexity of the checking rule. It's easier for maintenance. You have multiple options to avoid exhausting navigation in menuconfig.
|
Closing for now. |
Hello @a13xp0p0v
I have two suggestions for kernel-hardening-checker
Would be great have a column that gives a rank (from 1-10) maybe about how much a CONFIG_* impacts on performance.
To give an idea about what I'm talking, with a general example with C and stack protection:
FORTIFY_SOURCE
has impact of 1;-fstack-protector-strong
has an impact of 5;-fstack-protector-all
has an impact of 8;Rank number can be on your judge with will give the idea to the user.
Thanks
The text was updated successfully, but these errors were encountered: