mirror of
https://github.com/Kicksecure/security-misc.git
synced 2025-11-25 12:56:23 -05:00
Set kpti=1
This commit is contained in:
parent
5b97e7bd27
commit
5e87c9bea4
2 changed files with 16 additions and 0 deletions
|
|
@ -156,6 +156,8 @@ CPU mitigations:
|
||||||
|
|
||||||
- Spectre Side Channels (BTI and BHI)
|
- Spectre Side Channels (BTI and BHI)
|
||||||
|
|
||||||
|
- Meltdown
|
||||||
|
|
||||||
- Speculative Store Bypass (SSB)
|
- Speculative Store Bypass (SSB)
|
||||||
|
|
||||||
- L1 Terminal Fault (L1TF)
|
- L1 Terminal Fault (L1TF)
|
||||||
|
|
|
||||||
|
|
@ -71,6 +71,20 @@ GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX nosmt=force"
|
||||||
GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX spectre_v2=on"
|
GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX spectre_v2=on"
|
||||||
GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX spectre_bhi=on"
|
GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX spectre_bhi=on"
|
||||||
|
|
||||||
|
## Meltdown:
|
||||||
|
## Mitigate Spectre Variant 3 using kernel page table isolation (PTI).
|
||||||
|
## Force enable PTI of user and kernel address spaces on all cores.
|
||||||
|
## Mitigations for X86_64 CPUs are done in /etc/default/grub.d/40_kernel_hardening.cfg using "pti=on".
|
||||||
|
## Currently affects ARM64 CPUs.
|
||||||
|
##
|
||||||
|
## https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)
|
||||||
|
## https://en.wikipedia.org/wiki/Kernel_page-table_isolation
|
||||||
|
##
|
||||||
|
## KSPP=yes
|
||||||
|
## KSPP sets CONFIG_UNMAP_KERNEL_AT_EL0=y.
|
||||||
|
##
|
||||||
|
GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX kpti=1"
|
||||||
|
|
||||||
## Speculative Store Bypass (SSB):
|
## Speculative Store Bypass (SSB):
|
||||||
## Mitigate Spectre Variant 4 by disabling speculative store bypass system-wide.
|
## Mitigate Spectre Variant 4 by disabling speculative store bypass system-wide.
|
||||||
## Unconditionally enable the mitigation for both kernel and userspace.
|
## Unconditionally enable the mitigation for both kernel and userspace.
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue