Merge remote-tracking branch 'raja/limit_full_force' into arraybolt3/trixie

This commit is contained in:
Aaron Rainbolt 2025-11-29 20:23:09 -06:00
commit 2b2d30afce
No known key found for this signature in database
GPG key ID: A709160D73C79109
2 changed files with 16 additions and 0 deletions

View file

@ -253,6 +253,9 @@ Kernel space:
- Prevent runaway privileged processes from writing to block devices that are mounted by
filesystems to protect against filesystem corruption and kernel crashes.
- Restrict processes from modifying their own memory mappings unless actively done via
`ptrace()` in order to limit self-modification which can trigger exploits.
Direct memory access:
- Enable strict IOMMU translation to protect against some DMA attacks via the use

View file

@ -273,6 +273,19 @@ GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX erst_disable"
##
GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX bdev_allow_write_mounted=0"
## Restrict processes from modifying their own memory mappings.
## Prevents the use of FULL_FORCE by a processes unless via ptrace() for debugging.
## Limit self-modification which can be used trigger race condition vulnerabilities.
##
## https://lore.kernel.org/lkml/20240712-vfs-procfs-ce7e6c7cf26b@brauner/
## https://lwn.net/Articles/983169/
## https://github.com/a13xp0p0v/kernel-hardening-checker/pull/201
## https://github.com/Kicksecure/security-misc/issues/330
##
## Using "proc_mem.force_override=never" provides superior protection by never allowing overrides.
##
GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX proc_mem.force_override=ptrace"
## 2. Direct Memory Access:
##
## https://madaidans-insecurities.github.io/guides/linux-hardening.html#dma-attacks