https://github.com/torvalds/linux/commit/bd33ef3681359343863f2290aded182b0441edee

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1746971

Title:
  Please enable PAGE_POISONING

Status in linux package in Ubuntu:
  Triaged
Status in linux source package in Bionic:
  Triaged

Bug description:
  Hi,

  page poising is currently disabled in Ubuntu kernels:

  $ grep PAGE_POISON /boot/config-4.13.0-32-generic
  # CONFIG_PAGE_POISONING is not set

  It is also disabled in mainline kernels:

  $ grep PAGE_POISON /boot/config-4.14.16-041416-generic
  # CONFIG_PAGE_POISONING is not set

  On the contrary, it is enabled in Debian stretch and buster/sid
  kernels:

  # grep PAGE_POISON /boot/config-*
  /boot/config-4.9.0-5-amd64:CONFIG_PAGE_POISONING=y
  /boot/config-4.9.0-5-amd64:CONFIG_PAGE_POISONING_NO_SANITY=y
  /boot/config-4.9.0-5-amd64:# CONFIG_PAGE_POISONING_ZERO is not set

  $ grep PAGE_POISON /boot/config-*
  /boot/config-4.14.0-3-amd64:CONFIG_PAGE_POISONING=y
  /boot/config-4.14.0-3-amd64:CONFIG_PAGE_POISONING_NO_SANITY=y
  /boot/config-4.14.0-3-amd64:# CONFIG_PAGE_POISONING_ZERO is not set

  It is an interesting kernel hardening feature, so could you please
  enable those options in Ubuntu and mainline kernels?

  Some background information is here:

    https://outflux.net/blog/archives/2016/09/30/security-things-in-
  linux-v4-6/

  ProblemType: Bug
  DistroRelease: Ubuntu 17.10
  Package: linux-image-4.13.0-32-generic 4.13.0-32.35
  ProcVersionSignature: Ubuntu 4.13.0-32.35-generic 4.13.13
  Uname: Linux 4.13.0-32-generic x86_64
  ApportVersion: 2.20.7-0ubuntu3.7
  Architecture: amd64
  AudioDevicesInUse:
   USER        PID ACCESS COMMAND
   /dev/snd/controlC0:  bonnaudl   3167 F.... pulseaudio
  CurrentDesktop: KDE
  Date: Fri Feb  2 09:47:37 2018
  EcryptfsInUse: Yes
  HibernationDevice: RESUME=UUID=cf81afe7-8427-45fa-9149-c11d060a5a26
  MachineType: Dell Inc. Latitude E6520
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.13.0-32-generic 
root=UUID=749a9901-bdd3-4b5f-b80e-69414667e058 ro vsyscall=none 
ecurity=apparmor enable_mtrr_cleanup mtrr_spare_reg_nr=1 mtrr_gran_size=32M 
mtrr_chunk_size=128M quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-4.13.0-32-generic N/A
   linux-backports-modules-4.13.0-32-generic  N/A
   linux-firmware                             1.169.3
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 11/14/2013
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A19
  dmi.board.name: 0NVF5K
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A01
  dmi.chassis.type: 9
  dmi.chassis.vendor: Dell Inc.
  dmi.modalias: 
dmi:bvnDellInc.:bvrA19:bd11/14/2013:svnDellInc.:pnLatitudeE6520:pvr01:rvnDellInc.:rn0NVF5K:rvrA01:cvnDellInc.:ct9:cvr:
  dmi.product.name: Latitude E6520
  dmi.product.version: 01
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1746971/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to