Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upCONFIG_STRICT_DEVMEM enabled #2543
Comments
andrewdavidwong
added
C: other
enhancement
labels
Dec 28, 2016
andrewdavidwong
added this to the Far in the future milestone
Dec 28, 2016
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
xloem commentedDec 28, 2016
Qubes OS version (e.g.,
R3.2):R3.2
Affected TemplateVMs (e.g.,
fedora-23, if applicable):dom0
Expected behavior:
If a security issue is found in Qubes, it should be easy to isolate and debug the system.
Actual behavior:
CONFIG_STRICT_DEVMEM=y is set in the kernel configuration, so making a complete memory dump seems to require prior preparation.
Steps to reproduce the behavior:
General notes:
I do not believe enabling this flag should be a security issue, as only root has access to this device file, and a user who is root can also insert a kernel module which provides access to RAM. This is just much more cumbersome.
I'd be curious as to alternative or recommended methods of taking a core dump from a live Qubes system as well.
Related issues: