Commit Graph

63 Commits

Author SHA1 Message Date
92669dba18 Comment out machine check exception 2022-08-21 23:02:44 +10:00
0c5b1e9f57 undo "force kernel to panic on "oopses"
because implemented differently already

https://forums.whonix.org/t/set-oops-panic-kernel-parameter-or-kernel-panic-on-oops-1-sysctl-for-better-security/7713
2022-07-23 07:49:56 -04:00
ca764d8de0 force kernel to panic on "oopses" 2022-07-20 04:06:35 +10:00
1660aaa6dd update details around disabling SMT 2022-07-19 03:38:41 +10:00
bfd78a2c06 update SRBDS mitigation 2022-07-19 03:16:08 +10:00
c3ebb9160f CPU mitigation - MMIO Stale Data 2022-07-19 02:33:16 +10:00
59e90ff122 CPU mitigation - L1D FLushing 2022-07-19 02:32:41 +10:00
8531fbf99d CPU mitigation - SRBDS 2022-07-19 02:30:49 +10:00
73f1e23332 shuffle and rewording 2022-07-19 02:29:46 +10:00
a47922ad28 enforce of IOMMU TLB invalidation 2022-07-13 04:47:07 +10:00
33df16af80 disables random.trust_bootloader 2022-07-13 04:37:03 +10:00
d0779a96fc add reference 2022-07-13 04:36:34 +10:00
74858d257b enable randomize_kstack_offset 2022-07-13 04:34:35 +10:00
f572332108 disable slub_debug 2022-07-13 04:32:03 +10:00
1c0e071948 comments 2022-07-05 10:45:55 -04:00
5d47f5f74c comments 2022-07-05 10:45:09 -04:00
435c689cf9 comments 2022-07-05 10:44:28 -04:00
c20d588d78 comments 2022-07-05 10:42:37 -04:00
b342ce930e add /etc/default/grub.d/40_cold_boot_attack_defense.cfg 2022-07-05 10:28:22 -04:00
67eaf8c916 comments 2022-06-29 11:40:38 -04:00
72908d6b0d comments 2022-06-29 11:34:55 -04:00
2d37e3a1af copyright 2022-05-20 14:46:38 -04:00
c72567dbd2 fix 2021-09-14 14:18:44 -04:00
d62bbaab82 fix, unduplicate kernel command line 2021-09-12 11:40:58 -04:00
bd31b4085c remove Debian buster support in /etc/default/grub.d 2021-09-09 12:16:18 -04:00
ac0c492663 do not set kernel parameter quiet loglevel=0 for recovery boot option
for easier debugging
2021-09-06 08:22:55 -04:00
49902b8c56 move grub quiet to separate config file /etc/default/grub.d/41_quiet.cfg 2021-09-06 08:19:41 -04:00
db43cedcfd LANG=C str_replace 2021-08-22 05:23:24 -04:00
a67007f4b7 copyright 2021-03-17 09:45:21 -04:00
06ffd5d220 Restrict access to debugfs 2020-09-28 19:21:20 +00:00
6485df8126 Prevent kernel info leaks in console during boot.
add kernel parameter `quiet loglevel=0`

https://phabricator.whonix.org/T950
2020-04-23 12:26:31 -04:00
72228946dc fix etc/default/grub.d/40_kernel_hardening.cfg
in Qubes if no kernel package is installed
2020-04-08 16:46:11 +00:00
2ceea8d1fe update copyright year 2020-04-01 08:49:59 -04:00
f6b6ab374e Gather more entropy during boot 2020-02-16 19:51:32 +00:00
9b767139ef Avoid holes in IOMMU 2020-02-14 18:52:01 +00:00
700c7ed908 Create 40_cpu_mitigations.cfg 2020-02-12 18:42:13 +00:00
ba0043b8a7 Update 40_kernel_hardening.cfg 2020-02-12 18:36:05 +00:00
e4c6e897cf kvm.nx_huge_pages=force 2020-02-03 16:06:46 +00:00
b9d65338bc unconditionally enable all CPU bugs (spectre, meltdown, L1TF, ...)
this might reduce performance

* `spectre_v2=on`
* `spec_store_bypass_disable=on`
* `tsx=off`
* `tsx_async_abort=full,nosmt`

Thanks to @madaidan for the suggestion!

https://forums.whonix.org/t/should-all-kernel-patches-for-cpu-bugs-be-unconditionally-enabled-vs-performance-vs-applicability/7647
2020-01-30 05:55:13 -05:00
c1a0da60be set kernel boot parameter l1tf=full,force and nosmt=force
https://forums.whonix.org/t/should-all-kernel-patches-for-cpu-bugs-be-unconditionally-enabled-vs-performance-vs-applicability/7647/17
2020-01-30 00:46:48 -05:00
ede536913d no longer hardcode amd64 2019-12-24 06:00:41 -05:00
ac49c55d1f Merge pull request #49 from madaidan/kver
Detect kernel upgrades
2019-12-24 10:55:03 +00:00
98e88d1456 Detect kernel upgrades 2019-12-23 19:57:43 +00:00
d1a0650fd9 Use only one slub_debug parameter 2019-12-23 19:44:52 +00:00
3e131174d5 comments 2019-12-23 05:00:35 -05:00
9f072ce4f9 comment 2019-12-23 03:46:02 -05:00
26fe9394ff disable lockdown for now due to module loading 2019-12-23 03:41:54 -05:00
535c258b83 More kernel hardening 2019-12-23 03:35:07 -05:00
0c25a96b59 description / comments 2019-12-03 02:18:32 -05:00
5da2a27bf0 Distrust the CPU for initial entropy 2019-12-02 16:43:00 +00:00