|
11e6eeee4a
|
Set default hostname to AA000-0. Enable CPU RDRAND. Enable initialising kernel stack variables at function entry. Enable poisoning kernel stack before returning from syscalls. Enable register zeroing on function exit. Disable Kernel Self Protection Project recommendations.
|
2022-10-06 01:54:35 +01:00 |
|
|
68d3fb5a7e
|
Update Linux to 5.15.69. Enable -Werror to cause compilation failure on warnings. Change kernel compression method from Gzip to ZSTD.
|
2022-09-26 04:17:25 +01:00 |
|
|
253c1b872d
|
Update Linux to 5.15.68. Remove SMT core scheduling due to disabling SMT. Remove unnecessary Intel TXT. Remove unnecessary IOSF MBI. Decrease maximum CPU count to 6 due to disabling SMT. Add IRQFLAGS NMI support. Remove serial 8250 DMA. Remove MFD Intel PMC BXT. Remove USB printer support. Remove DMA devices. Remove x86 platform devices. Remove IOASID. Add AMD IOMMU V2. Remove Intel IOMMU. Add F2FS. Add EFIVAR FS. Remove NFS V3. Remove runtime testing.
|
2022-09-26 01:57:43 +01:00 |
|
|
4323015ab8
|
Update Linux to 5.15.68. Remove SMT core scheduling due to disabling SMT. Remove unnecessary Intel TXT. Remove unnecessary IOSF MBI. Decrease maximum CPU count to 6 due to disabling SMT. Add IRQFLAGS NMI support. Remove serial 8250 DMA. Remove MFD Intel PMC BXT. Remove USB printer support. Remove DMA devices. Remove x86 platform devices. Remove IOASID. Add AMD IOMMU V2. Remove Intel IOMMU. Add F2FS. Add EFIVAR FS. Remove NFS V3. Remove runtime testing.
|
2022-09-26 01:57:09 +01:00 |
|
|
838428152e
|
Disable kvm.nx_huge_pages mitigation. Disable L1 Terminal Fault mitigation due to current CPU not being vulnerable. Disable Microarchitectural Data Sampling mitigation due to current CPU not being vulnerable. Disable MMIO stale data mitigation due to current CPU not being vulnerable. Disable Page Table Isolation mitigation due to current CPU not being vulnerable. Disable Retbleed mitigation due to current CPU not being vulnerable. Enable Spectre V2 mitigation due to current CPU being vulnerable. Enable Speculative Store Bypass mitigation due to current CPU being vulnerable. Disable Special Register Buffer Data Sampling mitigation due to current CPU not being vulnerable. Disable Transactional Synchronization Extensions mitigation async abort due to current CPU not being vulnerable. Disable debugfs. Enable initialize-on-allocation to ensure memory is zeroed on allocation. Enable initialize-on-free to ensure memory is zeroed on free. Enable page allocation shuffle. Enable randomize kstack offset. Disable SLAB merging. Disable vsyscall. Disable SMT for protection against potential security issues. Remove CPU mitigations not applicable to current CPU. Remove wireless support. Build system firmware into kernel.
|
2022-09-16 23:10:16 +01:00 |
|
|
1478da90ed
|
Increase maximum number of CPUs to 12. Build AMD Zen and Zen 3 microcode into kernel. Remove virtualisation support from kernel.
|
2022-09-13 22:18:27 +01:00 |
|
|
a633ce2b15
|
Update Linux 5.15.52 to 5.15.59.
|
2022-09-06 19:53:16 +01:00 |
|
|
33c391aadf
|
Update Linux kernel configuration file from 5.15.41 to 5.15.52.
|
2022-07-12 12:03:35 +01:00 |
|
|
de05dff8d5
|
Add Linux directory. Add Linux kernel configuration file.
|
2022-07-09 13:03:42 +01:00 |
|