mirror of
https://github.com/Kicksecure/security-misc.git
synced 2025-04-29 12:36:11 -04:00
Enable kvm-intel.vmentry_l1d_flush=always
This commit is contained in:
parent
defba1f245
commit
45355aabdc
@ -66,11 +66,13 @@ GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX ssbd=force-on"
|
|||||||
|
|
||||||
## L1 Terminal Fault (L1TF):
|
## L1 Terminal Fault (L1TF):
|
||||||
## Mitigate the vulnerability by disabling L1D flush runtime control and SMT.
|
## Mitigate the vulnerability by disabling L1D flush runtime control and SMT.
|
||||||
|
## If conditional L1D flushing, mitigate the vulnerability for certain KVM hypervisor configurations.
|
||||||
## Currently affects Intel CPUs.
|
## Currently affects Intel CPUs.
|
||||||
##
|
##
|
||||||
## https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html
|
## https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html
|
||||||
##
|
##
|
||||||
GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX l1tf=full,force"
|
GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX l1tf=full,force"
|
||||||
|
GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX kvm-intel.vmentry_l1d_flush=always"
|
||||||
|
|
||||||
## Microarchitectural Data Sampling (MDS):
|
## Microarchitectural Data Sampling (MDS):
|
||||||
## Mitigate the vulnerability by clearing the buffer cache and disabling SMT.
|
## Mitigate the vulnerability by clearing the buffer cache and disabling SMT.
|
||||||
|
Loading…
x
Reference in New Issue
Block a user