diff options
author | Marek Mahut <marek.mahut@gmail.com> | 2019-07-19 15:49:37 +0200 |
---|---|---|
committer | Marek Mahut <marek.mahut@gmail.com> | 2019-07-19 15:49:37 +0200 |
commit | e72f25673df16021bc91bfa6a92d10bacf33055b (patch) | |
tree | 3cf4383e7839b202171aaf292d40fdb696a2589b | |
parent | 663542ad0483131e8c36742283191a8f40a7363d (diff) | |
download | nixpkgs-e72f25673df16021bc91bfa6a92d10bacf33055b.tar nixpkgs-e72f25673df16021bc91bfa6a92d10bacf33055b.tar.gz nixpkgs-e72f25673df16021bc91bfa6a92d10bacf33055b.tar.bz2 nixpkgs-e72f25673df16021bc91bfa6a92d10bacf33055b.tar.lz nixpkgs-e72f25673df16021bc91bfa6a92d10bacf33055b.tar.xz nixpkgs-e72f25673df16021bc91bfa6a92d10bacf33055b.tar.zst nixpkgs-e72f25673df16021bc91bfa6a92d10bacf33055b.zip |
Renaming security.virtualization.flushL1DataCache to virtualisation
Fixes #65044
-rw-r--r-- | nixos/modules/profiles/hardened.nix | 2 | ||||
-rw-r--r-- | nixos/modules/rename.nix | 2 | ||||
-rw-r--r-- | nixos/modules/security/misc.nix | 8 |
3 files changed, 7 insertions, 5 deletions
diff --git a/nixos/modules/profiles/hardened.nix b/nixos/modules/profiles/hardened.nix index 97279a78a57..29c3f2f8bbf 100644 --- a/nixos/modules/profiles/hardened.nix +++ b/nixos/modules/profiles/hardened.nix @@ -26,7 +26,7 @@ with lib; security.allowSimultaneousMultithreading = mkDefault false; - security.virtualization.flushL1DataCache = mkDefault "always"; + security.virtualisation.flushL1DataCache = mkDefault "always"; security.apparmor.enable = mkDefault true; diff --git a/nixos/modules/rename.nix b/nixos/modules/rename.nix index f611a3992ed..4ae64222274 100644 --- a/nixos/modules/rename.nix +++ b/nixos/modules/rename.nix @@ -63,6 +63,8 @@ with lib; (mkRemovedOptionModule [ "security" "setuidOwners" ] "Use security.wrappers instead") (mkRemovedOptionModule [ "security" "setuidPrograms" ] "Use security.wrappers instead") + (mkRenamedOptionModule [ "security" "virtualization" "flushL1DataCache" ] [ "security" "virtualisation" "flushL1DataCache" ]) + # PAM (mkRenamedOptionModule [ "security" "pam" "enableU2F" ] [ "security" "pam" "u2f" "enable" ]) diff --git a/nixos/modules/security/misc.nix b/nixos/modules/security/misc.nix index bf474ac0a54..2a7f07ef6db 100644 --- a/nixos/modules/security/misc.nix +++ b/nixos/modules/security/misc.nix @@ -48,13 +48,13 @@ with lib; e.g., shared caches). This attack vector is unproven. Disabling SMT is a supplement to the L1 data cache flushing mitigation - (see <xref linkend="opt-security.virtualization.flushL1DataCache"/>) + (see <xref linkend="opt-security.virtualisation.flushL1DataCache"/>) versus malicious VM guests (SMT could "bring back" previously flushed data). ''; }; - security.virtualization.flushL1DataCache = mkOption { + security.virtualisation.flushL1DataCache = mkOption { type = types.nullOr (types.enum [ "never" "cond" "always" ]); default = null; description = '' @@ -114,8 +114,8 @@ with lib; boot.kernelParams = [ "nosmt" ]; }) - (mkIf (config.security.virtualization.flushL1DataCache != null) { - boot.kernelParams = [ "kvm-intel.vmentry_l1d_flush=${config.security.virtualization.flushL1DataCache}" ]; + (mkIf (config.security.virtualisation.flushL1DataCache != null) { + boot.kernelParams = [ "kvm-intel.vmentry_l1d_flush=${config.security.virtualisation.flushL1DataCache}" ]; }) ]; } |