public inbox for development@lists.ipfire.org
 help / color / mirror / Atom feed
* Possible collateral damage while enabling KFENCE In IPFire 3.x
@ 2022-12-26 12:22 Peter Müller
  2022-12-27 10:28 ` Michael Tremer
  0 siblings, 1 reply; 2+ messages in thread
From: Peter Müller @ 2022-12-26 12:22 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 1144 bytes --]

Hello Michael,

above all, I hope you are doing well, and have/had some restful days.

Working through your changes related to the kernel configuration in IPFire 3.x,
I took the liberty of backporting some of them (whenever it made sense to do so)
- a patchset will be provided in due course, ideally by tomorrow at the latest.

However, looking at c36f92723a727a1f6366b5d27f5cd2eac106a3cc, the following
delta strikes me as implausible to be beneficial for security:

> -CONFIG_PAGE_POISONING=y
> +# CONFIG_PAGE_POISONING is not set

Here, you are _disabling_ page poisoning for all architectures in IPFire 3.x,
which I doubt is what you intended. For your reference, the current situation
in IPFire 2.x is mixed (as usual - sigh):

> $ grep CONFIG_PAGE_POISONING config/kernel/*
> config/kernel/kernel.config.aarch64-ipfire:# CONFIG_PAGE_POISONING is not set
> config/kernel/kernel.config.armv6l-ipfire:# CONFIG_PAGE_POISONING is not set
> config/kernel/kernel.config.riscv64-ipfire:CONFIG_PAGE_POISONING=y
> config/kernel/kernel.config.x86_64-ipfire:CONFIG_PAGE_POISONING=y

Thanks, and best regards,
Peter Müller

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2022-12-27 10:28 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-12-26 12:22 Possible collateral damage while enabling KFENCE In IPFire 3.x Peter Müller
2022-12-27 10:28 ` Michael Tremer

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox