mirror of
https://github.com/Kicksecure/security-misc.git
synced 2025-02-02 13:14:42 -05:00
do not set kernel boot parameter page_poison=1 in Qubes since does not work
https://github.com/QubesOS/qubes-issues/issues/5212#issuecomment-533873012
This commit is contained in:
parent
f57702c158
commit
94d40c68d4
@ -7,8 +7,13 @@ GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX slab_nomerge"
|
||||
## Enables sanity checks (F), redzoning (Z) and poisoning (P).
|
||||
GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX slub_debug=FZP"
|
||||
|
||||
## Wipes free memory so it can't leak in various ways and prevents some use-after-free vulnerabilites.
|
||||
GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX page_poison=1"
|
||||
if command -v "qubesdb-read" >/dev/null 2>&1 ; then
|
||||
## https://github.com/QubesOS/qubes-issues/issues/5212#issuecomment-533873012
|
||||
true "skip adding page_poison=1 in Qubes"
|
||||
else
|
||||
## Wipes free memory so it can't leak in various ways and prevents some use-after-free vulnerabilites.
|
||||
GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX page_poison=1"
|
||||
fi
|
||||
|
||||
## Makes the kernel panic on uncorrectable errors in ECC memory that an attacker could exploit.
|
||||
GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX mce=0"
|
||||
|
Loading…
x
Reference in New Issue
Block a user