mirror of
https://github.com/Kicksecure/security-misc.git
synced 2025-09-22 00:04:39 -04:00
Merge pull request #318 from raja-grewal/vmscape
Enable `vmscape=force`
This commit is contained in:
commit
24424bcbc0
2 changed files with 11 additions and 0 deletions
|
@ -178,6 +178,8 @@ CPU mitigations:
|
|||
|
||||
- Indirect Target Selection (ITS)
|
||||
|
||||
- VMScape
|
||||
|
||||
Boot parameters relating to kernel hardening, DMA mitigations, and entropy
|
||||
generation are outlined in the `/etc/default/grub.d/40_kernel_hardening.cfg`
|
||||
configuration file.
|
||||
|
|
|
@ -196,3 +196,12 @@ GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX reg_file_data_sampling=on"
|
|||
## https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/indirect-target-selection.html
|
||||
##
|
||||
GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX indirect_target_selection=force"
|
||||
|
||||
## VMScape:
|
||||
## Mitigate the vulnerability by flushing branch predictors before returning to userspace when exiting guests.
|
||||
## Comprehensive protection may also require disabling SMT to limit cross-thread attacks.
|
||||
## Currently affects both AMD and Intel CPUs.
|
||||
##
|
||||
## https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/vmscape.html
|
||||
##
|
||||
GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX vmscape=force"
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue