From: Michael Tremer <michael.tremer@ipfire.org>
To: development@lists.ipfire.org
Subject: Re: Possible collateral damage while enabling KFENCE In IPFire 3.x
Date: Tue, 27 Dec 2022 11:28:33 +0100 [thread overview]
Message-ID: <05844E32-E923-4D54-8360-2D18957ECDB7@ipfire.org> (raw)
In-Reply-To: <c86f3205-9ee4-49a2-a07c-9a2e800972b7@ipfire.org>
[-- Attachment #1: Type: text/plain, Size: 1722 bytes --]
Hello Peter,
> On 26 Dec 2022, at 13:22, Peter Müller <peter.mueller(a)ipfire.org> wrote:
>
> Hello Michael,
>
> above all, I hope you are doing well, and have/had some restful days.
One tries.
> Working through your changes related to the kernel configuration in IPFire 3.x,
> I took the liberty of backporting some of them (whenever it made sense to do so)
> - a patchset will be provided in due course, ideally by tomorrow at the latest.
> However, looking at c36f92723a727a1f6366b5d27f5cd2eac106a3cc, the following
> delta strikes me as implausible to be beneficial for security:
>
>> -CONFIG_PAGE_POISONING=y
>> +# CONFIG_PAGE_POISONING is not set
>
> Here, you are _disabling_ page poisoning for all architectures in IPFire 3.x,
> which I doubt is what you intended. For your reference, the current situation
> in IPFire 2.x is mixed (as usual - sigh):
This was not directly intended, but I noticed that this switch got disabled.
Since we are already trying to wipe all memory pages, what is the point of having this, too?
As far as I understand, all these options are compiled in, but none is then enabled since they all require any kernel command line switches. This is probably the worst design decision since losing a kernel command line is very easy.
-Michael
>> $ grep CONFIG_PAGE_POISONING config/kernel/*
>> config/kernel/kernel.config.aarch64-ipfire:# CONFIG_PAGE_POISONING is not set
>> config/kernel/kernel.config.armv6l-ipfire:# CONFIG_PAGE_POISONING is not set
>> config/kernel/kernel.config.riscv64-ipfire:CONFIG_PAGE_POISONING=y
>> config/kernel/kernel.config.x86_64-ipfire:CONFIG_PAGE_POISONING=y
>
> Thanks, and best regards,
> Peter Müller
prev parent reply other threads:[~2022-12-27 10:28 UTC|newest]
Thread overview: 2+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-12-26 12:22 Peter Müller
2022-12-27 10:28 ` Michael Tremer [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=05844E32-E923-4D54-8360-2D18957ECDB7@ipfire.org \
--to=michael.tremer@ipfire.org \
--cc=development@lists.ipfire.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox