Skip to content

c4pt000/kernel-6.8.2-expSEHDsec-HAXM-cgroupvirtio

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

04-18-2024

firewall blocking tools UFW based and ipset based with iptables + tools

patch-libvirt-IPTABLES-NFTABLES-UFW.sh patches libvirtd for KVM default virsh net-autostart

https://raw.githubusercontent.com/c4pt000/kernel-6.8.2-expSEHDsec-HAXM-cgroupvirtio/master/patch-libvirt-IPTABLES-NFTABLES-UFW.sh

https://github.com/c4pt000/mega-blocker-iptables-ipset-04-17-2024

6.8.2 updated for Fedora 39

Fedora 34/35 ONLY! will not work on Fedora 39

how to enable HAXM once the kernel is installed

cd /usr/src/kernels/5.11.6-HAXM-expSEHDsec-c4pt000-amdNV-kali-ctick-1khz/arch/x86/kvm/haxm
make -j24
make -j24 install
modprobe haxm

should return this....

# lsmod | grep haxm
haxm                  241664  0

01-03-2022

  • a host of more drivers have been enabled for SPI programming, UART, GPIO programming (programmers), enabled more legacy gamepad joystick drivers for legacy video game consoles, (NES, SNES, TURBGFX64, PS1, PS2) attempted to add more stability with mobile systems to release the usb keyboard with encrypted filesystems for password entry (on some mobile usb keyboard vendors there is an IRQ bug which affects the keyboard with a 20-30 second delay to release the keyboard WITH THIS KERNEL NOT the STOCK KERNEL) compare the previous-config file with current-config file to see differences, desktop systems do not have an issue with a delay with keyboard input on initial boot (same as before), enabled more TPM vendors and touchscreen vendors, more attempts at using x509 certiifcates with integrity style secure boot when booting as UEFI secure boot, I reverted some dynamic tick clock rates and different governor frequency throttling flags back to match the stock kernel more with this current release in an attempt to iron out the delay affecting mobile usb keyboards

  • re-enabled NTFS write and exFAT windows file system support (again, forgot)

  • some mobile systems might require a quick second reboot to help release the keyboard instead of having a delay for keyboard input (same as before)

  • https://github.com/c4pt000/kernel-5.11.6-expSEHDsec-HAXM-cgroup-virtio-nvidia-amd-kaliwifi/releases/tag/haxm-experimental

  • sometimes the RPM doesnt unpack correctly to /boot to create initramfs when overwriting the exisitng installed kernel ( rpm -qa | grep kernel ) "same as before"

as before for rebuilding the initramfs to boot after " rpm -Uvh --force kernel*rpm "

dracut -f 
and check initramfs-5.11.6 date creation against command line "date" command
ls -lh /boot/*5.11.6*
date
grub2-mkconfig -o /boot/grub2/grub.cfg
grub2-mkconfig -o /boot/efi/EFI/fedora/grub.cfg

01-02-2022

updated for stability issues with RTW8822CE specifically see releases (includes two scripts now for /usr/bin for switching between monitor and managed mode when card is labeled as wlo1)

01-01-2022

modified rtl88x2ce or modified rtw88_882ce will panic running system when wifi cant fully connect with 1 bar of connectivity *WIP

new

added scripts to enable monitor mode and managed mode to be placed into /usr/bin
WHEN your WIFI card is labeled "wlo1" with iwconfig
IF YOUR CARD *IS NOT* labeled "wlo1" adjust accordingly 
to be placed into /usr/bin
cp -rf set-managed-mode.sh
cp -rf set-monitor-mode.sh
chmod +x /usr/bin/set-managed-mode.sh
chmod +x /usr/bin/set-monitor-mode.sh
if going back to "managed" mode is problematic it might require airmon-ng stop


airmon-ng stop wlo1mon


  • 10-28-2021

readded RTL8812au (kali wifi driver known for realtek wifi high-powered usb cards) directly to the kernel as a running module at boot

delayed from the kernel changing slightly from 4.4.167 to 5.11 also the changes to RTL8812au which created a problem as a conflict between other realtek modules due to the hardware abstraction layer source code which is part of rtw88_8822ce and rtl8812au drivers

rtw88_8822ce requires manually building module (again)

cd /usr/src/kernels/5.11.6-HAXM-expSEHDsec-c4pt000-amdNV-kaliwifi88/drivers/net/wireless/realtek/rtw88
make -j24
make -j24 install
modprobe rtl88x2ce
  • for txpower functions of the rtl8812au see the included file from notes on kali linux and the 8812au.conf file located in this repo adjusting txpower range on the rtl8812au

  • 09-02-2021

update for ELAN touchpad support with newer HP laptops core i3

https://raw.githubusercontent.com/c4pt000/kernel-5.11.6-expSEHDsec-HAXM-cgroup-virtio-nvidia-amd/master/IMG_20210831_213455971.jpg

https://drive.google.com/file/d/1AiLHkRJ6liDo5f9XVB-yLMtRa-disa2K/view?usp=sharing

RTL8822CE -> newer hp laptops 802.11ac

0000:01:00.0 Network controller [0280]: Realtek Semiconductor Co., Ltd. RTL8822CE 802.11ac PCIe Wireless Network Adapter [10ec:c822]

git clone https://github.com/juanro49/rtl88x2ce-dkms
cd rtl88x2ce-dkms/
make -j24
make -j24 install
modprobe rtl88x2ce
  • 07-04-2021 added BLUEZ-0bda:8771-Realtek-rtl8761b_fw-installer.sh to install realtek 0bda:8771 usb bluetooth (install, unplug , replug)
https://raw.githubusercontent.com/c4pt000/kernel-5.11.6-expSEHDsec-HAXM-cgroup-virtio-nvidia-amd/master/BLUEZ-0bda%3A8771-Realtek-rtl8761b_fw-installer.sh
  • 06-12-2021

LINODE GPU CLUSTER script Fedora 34

https://github.com/c4pt000/linode-GPU-bitcoin-dogecoin-RECOVER-wallet.dat-passphrase_or_private_key_decrypt-hashcat

https://raw.githubusercontent.com/c4pt000/radiocoin/master/BUILD_SCRIPTS/LINODE-NO_CUSTOM_KERNEL_GPU-CLUSTER-script-FEDORA-34

  • 05-06-2021
  • added better support for AMD? by removing alot of the framebuffer stuff for RADEON, AMDGPU ^ still WIP** stuck on EFI framebuffer for radeon/amdgpu
┌─[root@fedora]─[/opt]
└──╼ #cat /boot/config-5.11.6-HAXM-expSEHDsec-c4pt000 | grep RADEON
CONFIG_DRM_RADEON=m
CONFIG_DRM_RADEON_USERPTR=y
# CONFIG_FB_RADEON is not set


┌─[root@fedora]─[/opt]
└──╼ #cat /boot/config-5.11.6-HAXM-expSEHDsec-c4pt000 | grep AMDGPU
CONFIG_DRM_AMDGPU=m
# CONFIG_DRM_AMDGPU_SI is not set
# CONFIG_DRM_AMDGPU_CIK is not set
CONFIG_DRM_AMDGPU_USERPTR=y
CONFIG_DRM_AMDGPU_GART_DEBUGFS=y

rpm -e --nodeps kernel kernel-headers kernel-devel

yum install kernel-5.11.6_HAXM_expSEHDsec_c4pt000_amdNV-1.x86_64.rpm -y
yum install kernel-headers-5.11.6_HAXM_expSEHDsec_c4pt000_amdNV-1.x86_64.rpm -y
yum install kernel-devel-5.11.6_HAXM_expSEHDsec_c4pt000_amdNV-1.x86_64.rpm -y

AMD users (amdgpu kernel driver 4.4-fglrx is over now) without "amdgpu" installed regular nouveau/radeon

/etc/default/grub
nomodeset

or
/etc/default/grub
radeon.si_support=0 radeon.cik_support=0 amdgpu.si_support=1 amdgpu.cik_support=1 amdgpu.dc=0 rd.driver.blacklist=radeon nomodeset

todo: add "exfat" directly to the running kernel

https://github.com/c4pt000/exfat

for adjusting terminal settings, titlebar settings and other effects see komorebi, Aqua-Term, xscreensaver and disabling tool-tips

https://github.com/c4pt000/Aqua-Term <- titlebar resize and disabling tool-tips

https://github.com/c4pt000/komorebi-centos-debian

https://github.com/c4pt000/xscreensaver-fingerprint-atomic






  • updates for problems with virsh net-autostart default, virsh net-start default

improvements for virsh? fedora is outdating iptables to iptables legacy to replace it with nftables and or bpfilter iptables legacy has an issue if firewalld is disabled and or with firewalld-filesystem requires a reboot (review script before running it)

patch for libvirtd + ufw + iptables problems with fedora 34

requires reboot after running (ipv4 working ipv6 might be disabled)

if docker has network issues internally?

  • ufw disable (and or ufw reset) -> rebuild "your" ufw ruleset
  • sysctl -w net.ipv4.ip_forward=1
  • systemctl restart docker

working /etc/default/grub

hugepages=4G vga=792 iommu=pt intel_iommu=on resume=/YOUR-RESUME-HERE-8a1c-b89e781144f0 \
rd.lvm.lv=anacYOUR-ROOTive/root rd.luks.uuid=luks-dbf3YOUR-LUKES-VOLUME-HERE \
rd.lvm.lv=anaconda_locaYOUR-LVM_UUID_HERE-e781144f0 \
rhgb pcie_acs_override=downstream  vfio-pci.id 1b73:1100 
manual install of RPMs

rpm -Uvh --force kernel-5.11.6_HAXM_expSEHDsec_c4pt000-1.x86_64.rpm 
rpm -Uvh --force kernel-devel-5.11.6_HAXM_expSEHDsec_c4pt000-1.x86_64.rpm 
rpm -Uvh --force kernel-headers-5.11.6_HAXM_expSEHDsec_c4pt000-1.x86_64.rpm 

rpm2cpio kernel-5.11.6_HAXM_expSEHDsec_c4pt000-1.x86_64.rpm | cpio -idmv

cp -rf boot/config-5.11.6-HAXM-expSEHDsec-c4pt000 /boot/
cp -rf boot/vmlinuz-5.11.6-HAXM-expSEHDsec-c4pt000 /boot/
cp -rf boot/System.map-5.11.6-HAXM-expSEHDsec-c4pt000 /boot/
cp -rf lib/modules/* /lib/modules/5.11.6-HAXM-expSEHDsec-c4pt000/
depmod -a
mkinitrd /boot/initramfs-5.11.6-HAXM-expSEHDsec-c4pt000.img 5.11.6-HAXM-expSEHDsec-c4pt000 --force


systemd.unified_cgroup_hierarchy=1 and or cgroup_enable=memory,namespace,blkio  might interfere with HAXM loading

cgroup_enable=memory,namespace,blkio systemd.unified_cgroup_hierarchy=0

/etc/default/grub
------------------
GRUB_CMDLINE_LINUX="iommu=pt intel_iommu=on ..........UUIDstuffhere......... rhgb vga=792 pcie_acs_override=downstream,multifunction"


grub2-mkconfig -o /boot/grub2/grub.cfg 
grub2-mkconfig -o /boot/efi/EFI/fedora/grub.cfg


  • 05-14-2021

use at your own risk (fprint and xscreensaver + sudo enabled fprint login)

figure wip as done, buggy driver support, (but working stability) xscreensaver + sudo fingerprint autologin -> working with a restart-fingerprint.sh script when needed, requires fprint_demo to make a fingerprint to enroll as user and should enable root?

# wip** fingerprint support VFS495 fingerprint usb module

https://github.com/c4pt000/Validity-sensors-fprint-demo-fingerprint-gui-biometric-fedora

# wip** xscreensaver fingerprint support

https://github.com/c4pt000/xscreensaver-fingerprint-atomic "see customization to "SBall screensaver as Atomic"

deploying a chroot recovery environment with a luks volume (skip cryptsetup for non luks volume)

or at boot with grub init=/bin/sh rw

cryptsetup open /dev/mapper/fedora-root froot
passwd:
cryptsetup open /dev/mapper/fedora-home fhome
passwd:

mkdir /mnt/fedora-root
mount /dev/mapper/froot /mnt/fedora-root
mount /dev/mapper/fhome /mnt/fedora-root/fhome
lsblk -a
mount /dev/sda2 /mnt/fedora-root/boot            # where /dev/sda2 = /boot          2G~ volume
mount /dev/sda1 /mnt/fedora-root/boot/efi        # where /dev/sda1 = /boot/efi      300M~ volume

mount --rbind /dev /mnt/fedora-root/dev
mount --rbind /dev/pts /mnt/fedora-root/dev/pts
mount --rbind /proc /mnt/fedora-root/proc
mount --rbind /tmp /mnt/fedora-root/tmp
mount --rbind /sys /mnt/fedora-root/sys

:to enter chroot environment for bash as chroot "/"

chroot /mnt/fedora-root




fixing VFS root problems with broken initramfs requires:

depmod -a
mkinitramfs /boot/initramfs-kernel-VERSION.img kernel-VERSION --force




  • for HAXM 05-13-2021

https://github.com/c4pt000/kernel-5.11.6-expSEHDsec-HAXM-cgroup-virtio/releases/tag/haxm-experimental
https://github.com/c4pt000/haxm

https://raw.githubusercontent.com/c4pt000/kernel-5.11.6-expSEHDsec-HAXM-cgroup-virtio/master/config-5.11.6-HAXM-expSEHDsec-c4pt000

modprobe haxm

lsmod | grep haxm
haxm                  241664  0

for macOS bigSur vt-x
https://raw.githubusercontent.com/c4pt000/kernel-5.11.6-expSEHDsec-HAXM-cgroup-virtio/master/macOS-bigSur.xml-VT-X-adjust-accordingly.xml
https://github.com/c4pt000/kernel-5.11.6-expSEHDsec-HAXM-cgroup-virtio/raw/master/OPENCORE.img.tar.gz

wget https://raw.githubusercontent.com/c4pt000/OSX-KVM/master/fetch-macOS-v2.py
requires /etc/default/grub similar

iommu=pt intel_iommu=on UUIDHERE rd.lvm-here-etc end of line -> rhgb vga=792 rd.driver.blacklist=nouveau vfio-pci.ids 8086:yourid pcie_acs_override=downstream,multifunction"



cat /etc/modprobe.d/kvm.conf 
###
### This configuration file was provided by the qemu package.
### Feel free to update as needed.
###

###
### Set these options to enable nested virtualization
###


options kvm ignore_msrs=y
options kvm_intel nested=1

#options kvm_amd nested=1

options vfio_iommu_type1 allow_unsafe_interrupts=1


changes to /etc/modprobe.d/kvm.conf

mkinitrd /boot/initramfs-5.11.6-HAXM-expSEHDsec-c4pt000.img 5.11.6-HAXM-expSEHDsec-c4pt000 --force

disabling kvm_intel nested=1 will disable running docker inside of docker

s1

yum install virt-manager qemu ovmf etc

for ease of install bigSur

s1


Fetch macOS installer.

./fetch-macOS-v2.py
ATTENTION: Installing Big Sur is NOT recommended at this time, unless you are a Hackintosh developer! Let the Big Sur setup sit at the Country Selection screen and other similar places for a while ;)

You can choose your desired macOS version here. After executing this step, you should have the BaseSystem.dmg file in the current folder.

Sample run:

$ ./fetch-macOS-v2.py
1. High Sierra (10.13)
2. Mojave (10.14)
3. Catalina (10.15) - RECOMMENDED
4. Latest (Big Sur - 11)

Choose a product to download (1-4): 3
Note: Modern NVIDIA GPUs are supported on HighSierra but not on later versions.

Convert the downloaded BaseSystem.dmg file into the BaseSystem.img file.

qemu-img convert BaseSystem.dmg -O raw BaseSystem.img
Create a virtual HDD image where macOS will be installed. If you change the name of the disk image from mac_hdd.img to something else, the boot scripts will need to be updated to point to the new image name.

qemu-img create -f qcow2 mac_hdd_ng.img 128G

HAXM macOS bigSur qemu-kvm

from terminal

spctl --master-disable

"details" s1 s1 s1

s1 s1


sed -i 's/GRUB_ENABLE_BLSCFG=true/GRUB_ENABLE_BLSCFG=false/g' /etc/default/grub 

sleep 2s
grub2-editenv create
rpm -e --nodeps kernel-core kernel-modules kernel-headers kernel-devel kernel-srpm-macros kernel

rpm -Uvh kernel-5.11.6_expSEHDsec-cgroupvirtio.x86_64.rpm
rpm -Uvh kernel-headers-5.11.6_expSEHDsec-cgroupvirtio.x86_64.rpm
rpm -Uvh kernel-devel_5.11.6_expSEHDsec-cgroupvirtio.x86_64.rpm 


grub2-mkconfig -o /boot/efi/EFI/fedora/grub.cfg
grub2-mkconfig -o /boot/grub2/grub.cfg


for iwlwifi

yum reinstall iwl*-firmware
cd /usr/lib/firmware
unxz iwlwifi-*.xz
cd /usr/lib
cp -rf firmware /lib/
rmmod -f iwlwifi
modprobe iwlwifi

or
reboot

current kernel recommended to build inside of docker containers for most projects whether they are c++ projects or based on other languages due to newer security functions enabled with spinlocks, mutex, stack hardening, and other glibc compiler protection it is recommened to build in docker guest environments for isolated builds to build the code seperate from the host by using working data directories to a docker guest, see the following :

  • docker for graphical IDEs, use:
-----------------------------------------
-v /sys/fs/cgroup:/sys/fs/cgroup:ro -e "DISPLAY=${DISPLAY:-:0.0}" -v /tmp/.X11-unix:/tmp/.X11-unix
  • for docker directories linked from the host use:
 -v    host    :      guest
--------------------------------------------------
-v /opt/your-dir:/opt/another-dir 
  • use caution when having to run docker guest environments as --privileged with /usr/sbin/init for docker guests that are capables of running full fledged docker guest also (docker running inside of docker or "nested" docker)

  • update 04-24-2021

  • note had a problem with MUTEX had to change MUTEX debug flags to recompile NVIDIA-Linux-x86_64-460.56.run for current updated running kernel

  • this version still seems working as it did with 5.11.6 (Even though this is the same base and not a kernel subversion up

releases RPMs

for the complete changes to the current .config https://raw.githubusercontent.com/c4pt000/kernel-5.11.6-expSEHDsec-cgroup-virtio/master/config-5.11.6-expSEHDsec-cgroupvirtio

also changed build from source script https://raw.githubusercontent.com/c4pt000/kernel-5.11.6-expSEHDsec-cgroup-virtio/master/build-kernel.sh

nested docker for running docker inside of docker on the same host

docker run -it --privileged -d  c4pt/fedora:34 /usr/sbin/init

CONFIG_BLK_CGROUP_IOLATENCY=y
CONFIG_BLK_CGROUP_IOCOST=y

SYSTEM SPLASH doesnt account for all cores in a system my system is 24 cores but the loading penguin splash only shows 18 cores, htop reveals how many cores total your system has, your amount of cores will vary based on system, less than 16 cores is visible in the penguin splash as accurate core count more than 12 or 16 cores depending on core count will not display with loading splash screen

s1

also disabled onboard PC speaker module,
(an attempt to silence the terminal bell without a gui instead of setting a .bashrc bell-type disable


CONFIG_INIT_ON_FREE_DEFAULT_ON:                                                                               
                                                                                                                
   This has the effect of setting "init_on_free=1" on the kernel                                                
   command line. This can be disabled with "init_on_free=0".           


CONFIG_INIT_ON_ALLOC_DEFAULT_ON:                                                                                                                                                                                                                                        
   This has the effect of setting "init_on_alloc=1" on the kernel                                    
   command line. This can be disabled with "init_on_alloc=0".                                       
   When "init_on_alloc" is enabled, all page allocator and slab   


  |*| Enable memcg SLUB sysfs support by default                                                                
  |*| Disable heap randomization     
  |*|   ACRN Guest support                                                                           

 TSX is enabled on TSX capable HW that is believed to be safe against                               
   side channel attacks- equals the tsx=auto command line parameter.  

  |*| Software Guard eXtensions (SGX)                                                               
  |*| Disable the 32-bit vDSO (needed for glibc 2.3.3)                                             

CONFIG_COMPAT_VDSO=y
CONFIG_HAVE_GENERIC_VDSO=y
CONFIG_GENERIC_VDSO_TIME_NS=y

CONFIG_LEGACY_VSYSCALL_XONLY:                                                                                                                                                                                                                                         
   The kernel traps and emulates calls into the fixed vsyscall                                    
   address mapping and does not allow reads.  This                                                                                                        
   configuration is recommended when userspace might use the                                                                                              
   legacy vsyscall area but support for legacy binary                                                                                                     
   instrumentation of legacy code is not needed.  It mitigates                                                                                            
  certain uses of the vsyscall area as an ASLR-bypassing                                                                                                 
   buffer.                                   



 |*|   Timer events oriented (TEO) governor (for tickless systems)                                            
 |*|   Haltpoll governor (for virtualized systems)   

 [ ] Enable core dump support  <- disabled for security 
 
 CONFIG_HWPOISON_INJECT is not set <- same here

 


CONFIG_Z3FOLD:                                                                                                                                         
                                                                                                                                                    
   A special purpose allocator for storing compressed pages.                                                                                         
   It is designed to store up to three compressed pages per physical                                                                                 
   page. It is a ZBUD derivative so the simplicity and determinism are                                                                               
   still there.  



  |*|   Enable the compressed cache for swap pages by default                                                   





 CONFIG_CMA:                                                                                                   
                                                                                                              
   This enables the Contiguous Memory Allocator which allows other                                           
   subsystems to allocate big physically-contiguous blocks of memory.                                                                                     
   CMA reserves a region of memory and allows only movable pages to                                                                                       
   be allocated from it. This way, the kernel can use the memory for                                                                                      
   pagecache and when a subsystem requests for contiguous area, the                                                                                       
   allocated pages are migrated away to serve the contiguous request.         



|*|   XFS Realtime subvolume support                                                                         
|*|   XFS online metadata check support                                                                      
|*|     XFS online metadata repair support                                                                   
|*]   XFS Verbose Warnings      



 <M>   Virtio Filesystem                                                                                     
 |*|     Virtio Filesystem Direct Host Memory Access support (NEW)         





 <M>   VirtualBox guest shared folder (vboxsf) support                                                         


# more font support

  |*| Select compiled-in fonts                                                                                 
  |*|   VGA 8x8 font                                                                                          
  -*-   VGA 8x16 font                                                                                          
  |*|   Mac console 6x11 font (not supported by all drivers)                                                  
  |*|   console 7x14 font (not supported by all drivers)                                                       
  |*|   Pearl (old m68k) console 8x8 font                                                                     
  |*|   Acorn console 8x8 font                                                                                
  |*|   Mini 4x6 font                                                                                          
  |*|   Medium-size 6x10 font                                                                                  
  |*|   console 10x18 font (not supported by all drivers)                                                      
  |*| Sparc console 8x16 font                                                                                  
  |*| Sparc console 12x22 font (not supported by all drivers)                                                 
  |*| Terminus 16x32 font (not supported by all drivers)                                                       
  |*| OLED 6x8 font        


CONFIG_PRINTK_TIME:

Selecting this option causes time stamps of the printk()
messages to be added to the output of the syslog() system
call and at the console.

The timestamp is always recorded internally, and exported
to /dev/kmsg. This flag just specifies if the timestamp should
be included, not that the timestamp is recorded.

disable of printk->syslog to /etc/default/grub option

The behavior is also controlled by the kernel command line
parameter printk.time=1. See

|| Lock debugging: prove locking correctness
|
| Enable raw_spinlock - spinlock nesting checks

CONFIG_RT_MUTEXES=y CONFIG_MUTEX_SPIN_ON_OWNER=y

CONFIG_DEBUG_RT_MUTEXES is not set CONFIG_DEBUG_MUTEXES is not set CONFIG_DEBUG_WW_MUTEX_SLOWPATH is not set CONFIG_WW_MUTEX_SELFTEST is not set

















SOURCE build based on 5.11.6 with .config changes for expSEHDsec penguin_logo, hid-xpadneo joystick module

(or docker run -it -d fedora:33)
mkdir -p /opt/kernel-build
cd /opt/kernel-build
yum install -y
wget https://raw.githubusercontent.com/c4pt000/kernel-5.11.0-expSEHDsec/master/build-kernel.sh
source build-kernel.sh













  • RPMs from now on only debian/ubuntu/kali users should use the packages 'dpkg and alien to convert RPMs to DEBs on their systems'
alien --scripts *.rpm

03-14-2021
* CVE-2021-27365: heap buffer overflow (Local Privilege Escalation, Information Leak, Denial of Service)
* CVE-2021-27363: kernel pointer leak (Information Leak)
* CVE-2021-27364: out-of-bounds read (Information Leak, Denial of Service)
https://www.bleepingcomputer.com/news/security/15-year-old-linux-kernel-bugs-let-attackers-gain-root-privileges/



penguin_hfs-5.11.6_expSEHDsec+T.xen.tar.gz
https://drive.google.com/file/d/1E8UfuHtr5O-NBtQtnWE1m3lOS8uLmAbx/view?usp=sharing
All three vulnerabilities are patched as of 5.11.4, 5.10.21, 5.4.103, 4.19.179, 4.14.224, 4.9.260, and 4.4.260, and patches became available in mainline Linux kernel on March 7th. No patches will be released for EOL unsupported kernels versions like 3.x and 2.6.23.

  • 03-04-2021 update penguin-expSEHDsec-5.11.0 -> (NVIDIA-Linux-x86_64-460.56.run)
  • improvements for Xen, still supporting KVM + Docker

03-14-2021 link removed due to newer CVE effecting root escalation


(CVE-2021-26708) (CVE-2021-26708) (CVE-2021-26708) (CVE-2021-26708) (CVE-2021-26708) (CVE-2021-26708) (CVE-2021-26708) (CVE-2021-26708)
* 01-09-2021 update penguin-expSEHDsec-5.9.16 -> (NVIDIA-Linux-x86_64-450.80.02.run not supported NVIDIA users use NVIDIA-Linux-x86_64-460.32.03.run)
* 0-11-2021 improvements for Xen, still supporting KVM + Docker
link removed due to CVE discovery of VF_SOCK



(CVE-2021-26708) (CVE-2021-26708) (CVE-2021-26708) (CVE-2021-26708) (CVE-2021-26708) (CVE-2021-26708) (CVE-2021-26708)

  • 12-30-2020 update for penguin-expSEHDsec-4.18 -> added support for HFS volumes to mount read/write removed for CVE discovery




cat /boot/config-5.9.16-penguin-expSEHDsec+T | grep TICK_CPU_ACC
CONFIG_TICK_CPU_ACCOUNTING=y
$ cat /boot/config-5.9.16-penguin-expSEHDsec+T | grep CONFIG_IRQ_TIME_ACCOUNTING=y 
CONFIG_IRQ_TIME_ACCOUNTING=y
  • fixed -> 9:38am UTC no IPTABLES for docker -> KVM., see previous kernel for docker / kvm WIP ->>
  • for centos 8 / rhel 8 red hat is moving toward nftables, best suggestion for KVM / DOCKER / libvirt networking -> disabled firewalld / disable nftables -> seek UFW for firewall or other firewall variants, changing firewalld.conf "nftables" to "iptables" (since nftables is a newer solution for iptables as an improved iptables via RHEL bug report https://bugzilla.redhat.com/show_bug.cgi?id=1623868#c7 noticing libvirtd networking breaks in F29 and CENTOS 8 ? as discovered from my own use in the last 24 hrs notice ? CVE ? or BUG report here on libvirtd https://bugzilla.redhat.com/show_bug.cgi?id=1623868

also within the last 8 hours accidentally disabled "NF_NAT in the kernel config by accidentally hitting a keyboard button disabling "M" to load NAT based firewall as one of many options for NAT based firewalling in the kernel

/etc/firewalld/firewalld.conf
------------------------
FirewallBackend=iptables                from (nftables)
  • 01-30-2020 -> (CVE-2021-26708)
 sudo -i
 cd /usr/src/kernels/4.18.0-penguin-expSEHDsec+T/drivers/net/wireless/realtek/rtl8821ce/
 make -j16
 make install
 modprobe 8821ce
cd /usr/src/kernels/4.18.0-penguin-expSEHDsec+T/drivers/net/wireless/realtek/rtl8xxxu-mod
make -j16
make install
modprobe 8812au






* update 01-30-2020
monitor mode for interfaces fixed for "no wireless extensions" in ifconfig / iwconfig wifite + kali + kismet support etc
CONFIG_CFG80211_WEXT=y











/etc/modprobe.d/kvm.conf
options kvm_intel nested=1
options kvm ignore_msrs=1
options vfio_iommu_type1 allow_unsafe_interrupts=1
options kvm_intel emulate_invalid_guest_state=0




after rhgb....
/etc/default/grub

iommu=pt vga=0x37f intel_iommu=on cgroup_enable=memory,namespace systemd.unified_cgroup_hierarchy=0 pcie_acs_override=downstream


or


iommu=pt vga=792 intel_iommu=on cgroup_enable=memory,namespace systemd.unified_cgroup_hierarchy=0 pcie_acs_override=downstream

* WIP







rtl8821ce added
* with support for monitor mode (airodump-ng, wifite) working with managed mode
rtl8821ce.tar.exp-monitor.mode.tar.gz
RTL88XXau added
RTL88XXau.tar.gz


(* note regarding wifite for kali users ongoing problem between wifite versions, without enabling monitor mode beforehand wifite can lead to major problems in terms of stability)
iwconfig wlo1 mode monitor       #where wlo1 is the wifi 





  • 09-16-2019

  • SSD support

  • partial XFS support

  • Intel 620/630 HD gfx (stability for framebuffer / gfx acceleration)

  • xpad ONE

  • KVM functional (pci-e passthrough untested)

  • overlooked .config file settings for default "docker" kernel, building IP_NAT etc.

  • basic docker functionality (*wip docker loading)

* Docker Server Version: 19.03.5 -> 4.18.0

  • /etc/default/grub

  • add after rhgb :

  • (vga mode -> 1366x768 hp-dw0045nr)

  • rhgb vga=0x37F intel_iommu=on iommu=pt cgroup_enable=memory,namespace systemd.unified_cgroup_hierarchy=0"

  • overlay2 storage drivers here -> /etc/docker/docker.json

 {
   "storage-driver": "overlay2"
 }
  • docker.service must exist as -> /etc/systemd/system/multi-user.target.wants/docker.service

systemctl enable --now docker for docker always enabled at startup (optional)

  • /etc/systemd/system/multi-user.target.wants/docker.service

  • change from :

  • ExecStart=/usr/bin/dockerd -H fd:// --containerd=/run/containerd/containerd.sock

  • to:

  • ExecStart=/usr/bin/dockerd --storage-driver=overlay2

* /etc/fstab

  • for /etc/default/grub config -> cgroup -> grub.cfg

cgroup2 /sys/fs/cgroup cgroup2 defaults,blkio,net_cls,freezer,devices,cpuacct,cpu,cpuset,memory,clone_children 0 0













  • conflicts between incorporating both rtl8821ce and rtl8812au into current running kernel based on design of custom header files between modules, both modules calling a few different rtl88XX models using different addressing based between similar headers

  • see wifi-4.14.tar.gz in this repo https://github.com/c4pt000/kernel-4.4.167expSEHDsec/blob/master/wifi-4.14.tar.gz

  • rtl8821ce for hp dw0045nr model laptops by default (wifi)

  • rtl8812au (rtl88XXau) Alfa 802.11ac support

-> todo: elan based touchpad enable functionality

(virtual intel graphics device *pci-e passthrough "kvm/xen") see config CONFIG_DRM_I915_GVT=y https://wiki.archlinux.org/index.php/Intel_GVT-g





* updated 11-09-2019 -> fedora 31 (CentOS 8 repos still need to catch up)



rtl8821ce rtl8812au seperate builds here not bundled conflict between rtl8821ce + rtl8812au 4.18 xfs is buggy don't rely on xfs -> ext4 over xfs

todo -> trackpad support (hp dw0037nr) (hp dw0045nr)

* penguin logo 4.18 expSEHDsec

  • ssd support

REMOVED for (CVE-2021-26708)







** 09-2019 kernel-5.2.14-expSEHDsec removed

*** PUSH for uvc video support, 05-01-2019, for usb webcam support , what security kernel isnt complete without support for usb video?

  • moon logo

(logo pulled from ios7 theme used with "clover bootloader" for booting ext4 drives)

  • penguin logo

  • penguin logo boot

* update support for loading 88XXau module for USB wifi (Alfa usb wifi wardriving cards) "Alfa AWUS036AC"


  • to select video modes @boot
  • add:
  • GRUB_CMDLINE_LINUX="vga=0x000
  • rebuild grub.cfg

* MOON LOGO

uvc device support http://www.ideasonboard.org/uvc/



REMOVED for (CVE-2021-26708)

modprobe uvcvideo
modprobe hid_xpadneo
*updated for the moon logo
modprobe 88XXau




* PENGUIN LOGO

uvc device support http://www.ideasonboard.org/uvc/




* new 88XXau module support (moonLogo, working for .debs, still need to throughly check threw the 88XXau module loading for the penguin .debs)


RPMs

REMOVED FOR (CVE-2021-26708)

modprobe uvcvideo
modprobe hid_xpadneo
modprobe 88XXau









kernel-4.4.167expSEHDsec

kernel-4.4.167expSEHDsec security kernel, "hardware candy"

Fedora 28 only

nvidia + fglrx (100% working others still un-tested (amdgpu,etc)

compiler issues between gcc34, gcc8.3.1, gcc 4.8.5 only with fedora

to change still WIP,

CONFIG_CC_STACKPROTECTOR_NONE=n

CONFIG_CC_STACKPROTECTOR_REGULAR=y

CONFIG_CC_STACKPROTECTOR_STRONG=n

-fstack-protector-strong for gcc errors

gmp-6.1.2-7.fc28.x86_64.rpm

gmp-4.3.2-3.fc15.x86_64.rpm








* STUCK BOOT PROCESS in Fedora 28+ only

  • (as single user different default kernel)

* sytemctl disable systemd-journald

* mv /usr/lib/systemd/systemd-journald /usr/lib/systemd/systemd-journald.orig

* mv /usr/bin/plymouthd /usr/bin/plymouthd.orig

* remove "resume= " line in grub
* rebuild grub.cfg


* 'untouched'
  • /usr/bin/plymouth

* (plymouth *not* plymouthd might be essential and needed for lightdm or possible gdm (others) to execute)

* FGLRX legacy HD 6XXX/7XXX support, (outside of AMDGPU, AMDGPU-PRO support) patched for 4.4,





























label this as a WIP

*new push for Docker support

same as before RENO for TCP instead of CUBIC, packet generator module, different IPSEC stacks, hardware events, different dyntick, kobject loading, prelimenary stack protection with RAM, different userspace protection from debugging, basic SMACK policies, SELINUX, no TOMOYO, no apparmor by default

  • CONFIG_DEFAULT_SECURITY_SELINUX=y
  • CONFIG_SECURITY_SMACK=y
  • CONFIG_SECURITY_APPARMOR=y
  • --> CONFIG_SECURITY_TOMOYO is not set
  • --> CONFIG_DEFAULT_SECURITY_APPARMOR is not set

for fglrx see FGLRX graphics support patched installer for 4.4

  • CONFIG_DRM_RADEON=m
  • CONFIG_DRM_RADEON_USERPTR=y
  • --> CONFIG_DRM_RADEON_UMS is not set
  • CONFIG_DRM_AMDGPU=m
  • CONFIG_DRM_AMDGPU_CIK=y
  • CONFIG_DRM_AMDGPU_USERPTR=y
  • CONFIG_DRM_NOUVEAU=m
  • CONFIG_NOUVEAU_DEBUG=5
  • CONFIG_NOUVEAU_DEBUG_DEFAULT=3
  • CONFIG_DRM_NOUVEAU_BACKLIGHT=y

RHEL/CentOS/Fedora based RPMS, based on kernel 4.4, for FGLRX graphics, and experimental security functions, moonLogo on boot with grub options, "vga=0x346", also Broadcom TIGON3 gigabit ethernet for hp class machines, and MT7610U usb wifi 802.11ac for wavlink mediatek devices (not 100% working as a kernel module seperate meditatek mt7610u drivers below), https://github.com/c4pt000/mt7610u_wifi_sta_v3002_dpo_20130916

(support for xbox one wired controllers, possibly legacy xbox 360 wired controllers)

modprobe hid_xpadneo

02-07-2019

  • push for i915 support, intel graphics REMOVED for (CVE-2021-26708)

rpms (01-07-2019- push for NBD(qemu-img), OVERLAY-FS, NFS options) *Docker support enabled

REMOVED for (CVE-2021-26708)

FGLRX legacy HD 6XXX/7XXX support, (outside of AMDGPU, AMDGPU-PRO support) patched for 4.4,

(compiz-fusion-plugins-experimental RPM only., since the experimental plugins are more widely available on deb based linux)