This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
** Tags added: bionic
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1746971
Title:
Please enable PAGE_POISONING
Status in linux package in Ubuntu:
Confirmed
Bug description:
Hi,
page poising is currently disabled in Ubuntu kernels:
$ grep PAGE_POISON /boot/config-4.13.0-32-generic
# CONFIG_PAGE_POISONING is not set
It is also disabled in mainline kernels:
$ grep PAGE_POISON /boot/config-4.14.16-041416-generic
# CONFIG_PAGE_POISONING is not set
On the contrary, it is enabled in Debian stretch and buster/sid
kernels:
# grep PAGE_POISON /boot/config-*
/boot/config-4.9.0-5-amd64:CONFIG_PAGE_POISONING=y
/boot/config-4.9.0-5-amd64:CONFIG_PAGE_POISONING_NO_SANITY=y
/boot/config-4.9.0-5-amd64:# CONFIG_PAGE_POISONING_ZERO is not set
$ grep PAGE_POISON /boot/config-*
/boot/config-4.14.0-3-amd64:CONFIG_PAGE_POISONING=y
/boot/config-4.14.0-3-amd64:CONFIG_PAGE_POISONING_NO_SANITY=y
/boot/config-4.14.0-3-amd64:# CONFIG_PAGE_POISONING_ZERO is not set
It is an interesting kernel hardening feature, so could you please
enable those options in Ubuntu and mainline kernels?
Some background information is here:
https://outflux.net/blog/archives/2016/09/30/security-things-in-
linux-v4-6/
ProblemType: Bug
DistroRelease: Ubuntu 17.10
Package: linux-image-4.13.0-32-generic 4.13.0-32.35
ProcVersionSignature: Ubuntu 4.13.0-32.35-generic 4.13.13
Uname: Linux 4.13.0-32-generic x86_64
ApportVersion: 2.20.7-0ubuntu3.7
Architecture: amd64
AudioDevicesInUse:
USER PID ACCESS COMMAND
/dev/snd/controlC0: bonnaudl 3167 F.... pulseaudio
CurrentDesktop: KDE
Date: Fri Feb 2 09:47:37 2018
EcryptfsInUse: Yes
HibernationDevice: RESUME=UUID=cf81afe7-8427-45fa-9149-c11d060a5a26
MachineType: Dell Inc. Latitude E6520
ProcFB: 0 inteldrmfb
ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.13.0-32-generic
root=UUID=749a9901-bdd3-4b5f-b80e-69414667e058 ro vsyscall=none
ecurity=apparmor enable_mtrr_cleanup mtrr_spare_reg_nr=1 mtrr_gran_size=32M
mtrr_chunk_size=128M quiet splash vt.handoff=7
RelatedPackageVersions:
linux-restricted-modules-4.13.0-32-generic N/A
linux-backports-modules-4.13.0-32-generic N/A
linux-firmware 1.169.3
SourcePackage: linux
UpgradeStatus: No upgrade log present (probably fresh install)
dmi.bios.date: 11/14/2013
dmi.bios.vendor: Dell Inc.
dmi.bios.version: A19
dmi.board.name: 0NVF5K
dmi.board.vendor: Dell Inc.
dmi.board.version: A01
dmi.chassis.type: 9
dmi.chassis.vendor: Dell Inc.
dmi.modalias:
dmi:bvnDellInc.:bvrA19:bd11/14/2013:svnDellInc.:pnLatitudeE6520:pvr01:rvnDellInc.:rn0NVF5K:rvrA01:cvnDellInc.:ct9:cvr:
dmi.product.name: Latitude E6520
dmi.product.version: 01
dmi.sys.vendor: Dell Inc.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1746971/+subscriptions
--
Mailing list: https://launchpad.net/~kernel-packages
Post to : [email protected]
Unsubscribe : https://launchpad.net/~kernel-packages
More help : https://help.launchpad.net/ListHelp