Skip to content

Commit f2e9332

Browse files
authored
fix: update KARGS.md for change to IOMMU
1 parent d5fbe9d commit f2e9332

1 file changed

Lines changed: 2 additions & 1 deletion

File tree

content/articles/KARGS.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ Stable kargs that are always applied by the `set-kargs-hardening` ujust script.
2525
- `lockdown=confidentiality`: Enable kernel lockdown in the strictest mode.
2626
- `random.trust_cpu=off`: Disable CPU-based entropy sources, as it's not auditable and has resulted in vulnerabilities.
2727
- `random.trust_bootloader=off`: Disable trusting the use of the seed passed by the bootloader.
28-
- `iommu=force`, `intel_iommu=on` and `amd_iommu=force_isolation`: Mitigate DMA attacks by enabling IOMMU.
28+
- `iommu=force` and `intel_iommu=on`: Mitigate DMA attacks by enabling IOMMU.
2929
- `iommu.passthrough=0`: Disable IOMMU bypass.
3030
- `iommu.strict=1`: Synchronously invalidate IOMMU hardware TLBs.
3131
- `pti=on`: Enable kernel page table isolation.
@@ -61,3 +61,4 @@ Sets of additional kargs that can be selectively set alongside the standard karg
6161
- `efi=disable_early_pci_dma`: Fill IOMMU protection gap by setting the BUSMASTER bit during early boot
6262
- `debugfs=off`: Disable debugfs to prevent exposure of sensitive kernel information
6363
- `gather_data_sampling=force`: Mitigate unprivileged speculative access to data by using the microcode mitigation when available, or by disabling AVX on affected systems where the microcode hasn’t been updated to include the mitigation.
64+
- `amd_iommu=force_isolation`: Mitigate DMA attacks by enabling IOMMU.

0 commit comments

Comments
 (0)