1
0
mirror of https://github.com/PrivSec-dev/privsec.dev synced 2024-10-17 22:35:14 -04:00

Fix IOMMU kernel param

Signed-off-by: Tommy <contact@tommytran.io>
This commit is contained in:
Tommy 2023-12-05 16:36:50 -07:00
parent 5eba54b16a
commit 7c5c2081e1
No known key found for this signature in database
GPG Key ID: D30DEC268D3FEB17

View File

@ -320,7 +320,7 @@ Further reading:
##### DMA mitigations ##### DMA mitigations
``` ```
intel_iommu=on amd_iommu=on efi=disable_early_pci_dma iommu.passthrough=0 iommu.strict=1 intel_iommu=on amd_iommu=force_isolation efi=disable_early_pci_dma iommu=force iommu.passthrough=0 iommu.strict=1
``` ```
[Direct memory access (DMA) attacks](https://en.wikipedia.org/wiki/DMA_attack) can be mitigated via IOMMU and [disabling certain kernel modules](#kernel-modules). Furthermore, [strict enforcement of IOMMU TLB invalidation](https://github.com/Kicksecure/security-misc/blob/master/etc/default/grub.d/40_enable_iommu.cfg) should be applied so devices will never be able to access stale data contents. [Direct memory access (DMA) attacks](https://en.wikipedia.org/wiki/DMA_attack) can be mitigated via IOMMU and [disabling certain kernel modules](#kernel-modules). Furthermore, [strict enforcement of IOMMU TLB invalidation](https://github.com/Kicksecure/security-misc/blob/master/etc/default/grub.d/40_enable_iommu.cfg) should be applied so devices will never be able to access stale data contents.