mirror of
https://github.com/Kicksecure/security-misc.git
synced 2025-02-23 06:39:48 -05:00
Add documentation on sysctl kernel.panic_on_oops=1
This commit is contained in:
parent
1b6161c2dc
commit
3926b91dcf
@ -41,6 +41,9 @@ space, user space, core dumps, and swap space.
|
||||
|
||||
- Restrict kernel profiling and the performance events system to `CAP_PERFMON`.
|
||||
|
||||
- Force the kernel to panic on "oopses" that can potentially indicate and thwart
|
||||
certain kernel exploitation attempts.
|
||||
|
||||
- Randomize the addresses (ASLR) for mmap base, stack, VDSO pages, and heap.
|
||||
|
||||
- Disable asynchronous I/O as `io_uring` has been the source
|
||||
|
@ -109,6 +109,17 @@ kernel.sysrq=0
|
||||
##
|
||||
kernel.perf_event_paranoid=3
|
||||
|
||||
## Force the kernel to panic on "oopses".
|
||||
## Can sometimes potentially indicate and thwart certain kernel exploitation attempts.
|
||||
## Also cause panics on machine check exceptions.
|
||||
## Panics may be due to false-positives such as bad drivers.
|
||||
##
|
||||
## https://forums.whonix.org/t/set-oops-panic-kernel-parameter-or-kernel-panic-on-oops-1-sysctl-for-better-security/7713
|
||||
##
|
||||
## See /usr/libexec/security-misc/panic-on-oops for implementation.
|
||||
##
|
||||
#kernel.panic_on_oops=1
|
||||
|
||||
## Enable ASLR for mmap base, stack, VDSO pages, and heap.
|
||||
## Heap randomization can lead to breakages with legacy applications.
|
||||
##
|
||||
|
Loading…
x
Reference in New Issue
Block a user