Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Enable ssbd=force-on #280

Merged
merged 1 commit into from
Nov 8, 2024
Merged

Enable ssbd=force-on #280

merged 1 commit into from
Nov 8, 2024

Conversation

raja-grewal
Copy link
Contributor

As per the suggested review in #278, there is a minor addition we can make that in many cases is not neccessary.

Currently, our inclusion of spec_store_bypass_disable=on unconditionally disables Speculative Store Bypass .

The use of ssbd=force-on also unconditionally enables the mitigation for both kernel and userspace that is applicable in situations where a firmware based mitigation is offered.

Therefore, I see no harm in also including this parameter.

Changes

Add the ssbd=force-on kernel boot parameter.

Mandatory Checklist

  • Legal agreements accepted. By contributing to this organisation, you acknowledge you have read, understood, and agree to be bound by these these agreements:

Terms of Service, Privacy Policy, Cookie Policy, E-Sign Consent, DMCA, Imprint

Optional Checklist

The following items are optional but might be requested in certain cases.

  • I have tested it locally
  • I have reviewed and updated any documentation if relevant
  • I am providing new code and test(s) for it

@adrelanos adrelanos merged commit 238f32e into Kicksecure:master Nov 8, 2024
@raja-grewal raja-grewal deleted the ssbd branch November 9, 2024 01:58
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants