This document describes all kernel parameters audited by LinSpec.
- Path: /proc/sys/kernel/randomize_va_space
- Expected: 2
- Risk:
- Disabled → predictable memory layout
- Enables exploitation (ROP, ret2libc)
- Path: /proc/sys/kernel/kptr_restrict
- Expected: 2
- Risk:
- Kernel address leakage
- KASLR bypass
- Path: /proc/sys/kernel/dmesg_restrict
- Expected: 1
- Risk:
- Information disclosure
- Path: /proc/sys/kernel/yama/ptrace_scope
- Expected: 1 or higher
- Risk:
- Process injection
- Path: /proc/sys/net/ipv4/tcp_syncookies
- Expected: 1
- Risk:
- SYN Flood vulnerability
- Path: /proc/sys/net/core/bpf_jit_harden
- Expected: 2
- Risk:
- JIT spray / kernel exploitation
- Source: /sys/devices/system/cpu/vulnerabilities/
- Evaluation:
- Mitigated
- Vulnerable
- Not affected
| Status | Meaning |
|---|---|
| PASS | Secure configuration |
| WARN | Potential risk |
| VULN | Exploitable condition |