** Changed in: linux (Ubuntu) Importance: Undecided => Wishlist ** Changed in: linux (Ubuntu) Status: Confirmed => Triaged
** Also affects: linux (Ubuntu Bionic) Importance: Wishlist Status: Triaged -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1746971 Title: Please enable PAGE_POISONING Status in linux package in Ubuntu: Triaged Status in linux source package in Bionic: Triaged Bug description: Hi, page poising is currently disabled in Ubuntu kernels: $ grep PAGE_POISON /boot/config-4.13.0-32-generic # CONFIG_PAGE_POISONING is not set It is also disabled in mainline kernels: $ grep PAGE_POISON /boot/config-4.14.16-041416-generic # CONFIG_PAGE_POISONING is not set On the contrary, it is enabled in Debian stretch and buster/sid kernels: # grep PAGE_POISON /boot/config-* /boot/config-4.9.0-5-amd64:CONFIG_PAGE_POISONING=y /boot/config-4.9.0-5-amd64:CONFIG_PAGE_POISONING_NO_SANITY=y /boot/config-4.9.0-5-amd64:# CONFIG_PAGE_POISONING_ZERO is not set $ grep PAGE_POISON /boot/config-* /boot/config-4.14.0-3-amd64:CONFIG_PAGE_POISONING=y /boot/config-4.14.0-3-amd64:CONFIG_PAGE_POISONING_NO_SANITY=y /boot/config-4.14.0-3-amd64:# CONFIG_PAGE_POISONING_ZERO is not set It is an interesting kernel hardening feature, so could you please enable those options in Ubuntu and mainline kernels? Some background information is here: https://outflux.net/blog/archives/2016/09/30/security-things-in- linux-v4-6/ ProblemType: Bug DistroRelease: Ubuntu 17.10 Package: linux-image-4.13.0-32-generic 4.13.0-32.35 ProcVersionSignature: Ubuntu 4.13.0-32.35-generic 4.13.13 Uname: Linux 4.13.0-32-generic x86_64 ApportVersion: 2.20.7-0ubuntu3.7 Architecture: amd64 AudioDevicesInUse: USER PID ACCESS COMMAND /dev/snd/controlC0: bonnaudl 3167 F.... pulseaudio CurrentDesktop: KDE Date: Fri Feb 2 09:47:37 2018 EcryptfsInUse: Yes HibernationDevice: RESUME=UUID=cf81afe7-8427-45fa-9149-c11d060a5a26 MachineType: Dell Inc. Latitude E6520 ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.13.0-32-generic root=UUID=749a9901-bdd3-4b5f-b80e-69414667e058 ro vsyscall=none ecurity=apparmor enable_mtrr_cleanup mtrr_spare_reg_nr=1 mtrr_gran_size=32M mtrr_chunk_size=128M quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-4.13.0-32-generic N/A linux-backports-modules-4.13.0-32-generic N/A linux-firmware 1.169.3 SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 11/14/2013 dmi.bios.vendor: Dell Inc. dmi.bios.version: A19 dmi.board.name: 0NVF5K dmi.board.vendor: Dell Inc. dmi.board.version: A01 dmi.chassis.type: 9 dmi.chassis.vendor: Dell Inc. dmi.modalias: dmi:bvnDellInc.:bvrA19:bd11/14/2013:svnDellInc.:pnLatitudeE6520:pvr01:rvnDellInc.:rn0NVF5K:rvrA01:cvnDellInc.:ct9:cvr: dmi.product.name: Latitude E6520 dmi.product.version: 01 dmi.sys.vendor: Dell Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1746971/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp