From e4c6e897cf37cbf5de6d90888a0ddbe56db11c2f Mon Sep 17 00:00:00 2001 From: HulaHoop0 <55955185+HulaHoop0@users.noreply.github.com> Date: Mon, 3 Feb 2020 16:06:46 +0000 Subject: [PATCH] kvm.nx_huge_pages=force --- etc/default/grub.d/40_kernel_hardening.cfg | 3 +++ 1 file changed, 3 insertions(+) diff --git a/etc/default/grub.d/40_kernel_hardening.cfg b/etc/default/grub.d/40_kernel_hardening.cfg index 82a2bb8..e9f7aae 100644 --- a/etc/default/grub.d/40_kernel_hardening.cfg +++ b/etc/default/grub.d/40_kernel_hardening.cfg @@ -54,6 +54,9 @@ GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX l1tf=full,force" ## https://forums.whonix.org/t/should-all-kernel-patches-for-cpu-bugs-be-unconditionally-enabled-vs-performance-vs-applicability/7647/17 GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX nosmt=force" +## https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/multihit.html#mitigation-control-on-the-kernel-command-line-and-kvm-module-parameter +GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX kvm.nx_huge_pages=force" + ## Vsyscalls are obsolete, are at fixed addresses and are a target for ROP. GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX vsyscall=none"