diff --git a/README.md b/README.md index 238e2c1..f2bf497 100644 --- a/README.md +++ b/README.md @@ -78,9 +78,6 @@ configuration file. - Disable merging of slabs with similar size which reduces the risk of triggering heap overflows and limits influencing slab cache layout. -- Provides option to enable sanity checks and red zoning via slab debugging. - Not reccommened due to implicit disabling of kernel pointer hashing. - - Enable Memory zeroing at both allocation and free time which mitigate some use-after-free vulnerabilities by erasing sensitive information in memory. diff --git a/etc/default/grub.d/40_kernel_hardening.cfg b/etc/default/grub.d/40_kernel_hardening.cfg index 36cf099..fcc5352 100644 --- a/etc/default/grub.d/40_kernel_hardening.cfg +++ b/etc/default/grub.d/40_kernel_hardening.cfg @@ -28,15 +28,6 @@ kver="$(dpkg-query --show --showformat='${Version}' "$kpkg")" 2>/dev/null || tru ## GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX slab_nomerge" -## Enable sanity checks and red zoning of slabs. -## -## https://www.kernel.org/doc/html/latest/mm/slub.html -## https://lore.kernel.org/all/20210601182202.3011020-5-swboyd@chromium.org/T/#u -## -## Disabled as enabling this implicitly disables kernel pointer hashing. -## -#GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX slub_debug=FZ" - ## Zero memory at allocation time and free time. ## Fills newly allocated pages, freed pages, and heap objects with zeros. ## Mitigates use-after-free exploits by erasing sensitive information in memory.