WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

RE: [Xen-devel] [PATCH][RFC] Support more Capability Structures andDevic

To: "Alan Cox" <alan@xxxxxxxxxxxxxxxxxxx>, "Ian Jackson" <Ian.Jackson@xxxxxxxxxxxxx>
Subject: RE: [Xen-devel] [PATCH][RFC] Support more Capability Structures andDevice Specific
From: "Dong, Eddie" <eddie.dong@xxxxxxxxx>
Date: Thu, 3 Jul 2008 09:46:49 +0800
Cc: Yuji Shimada <shimada-yxb@xxxxxxxxxxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxx, "Dong, Eddie" <eddie.dong@xxxxxxxxx>, Keir Fraser <keir.fraser@xxxxxxxxxxxxx>
Delivery-date: Wed, 02 Jul 2008 18:48:09 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <20080702121745.3893f852@xxxxxxxxxxxxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
References: <20080630131728.F30A.SHIMADA-YXB@xxxxxxxxxxxxxxx><10EA09EFD8728347A513008B6B0DA77A035FC20B@xxxxxxxxxxxxxxxxxxxxxxxxxxxx><20080701163646.C0E3.SHIMADA-YXB@xxxxxxxxxxxxxxx><18537.65217.267922.698490@xxxxxxxxxxxxxxxxxxxxxxxx><10EA09EFD8728347A513008B6B0DA77A035FC6EA@xxxxxxxxxxxxxxxxxxxxxxxxxxxx><18539.22704.112555.841467@xxxxxxxxxxxxxxxxxxxxxxxx> <20080702121745.3893f852@xxxxxxxxxxxxxxxxxxx>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
Thread-index: AcjcN7g3otwiTD5yRtudnu23IflkEwAddhgQ
Thread-topic: [Xen-devel] [PATCH][RFC] Support more Capability Structures andDevice Specific
Alan Cox wrote:
>> I think it is fine to have a passthrough option which
>> doesn't properly protect the host from the guest - this
>> is a useful setup in many situations.  But it should not
>> be enabled by default, surely ? 
> 
> Agreed entirely. Note also that some implementations of
> an IOMMU will not save you as they don't fence between
> individual PCI devices (PCIE is obviously a bit easier).

IOMMU, at least Intel's IOMMU, doesn't support pure PCI device, only
PCIe devices can be DMA protected.

> Not fencing between devices allows you for example to use
> a fairly flexible SCSI controller to reprogram another
> device. 

Again, at least for Intel IOMMU, devices under root endpoint can never
escape from IOMMU DMA protection, right now we don't support PCIe
devices under a switch to do assignement, but with future ATS or ACS is
implemented, we can assign devices under a switch, where ether the
switch disable peer to peer transaction or always pass up "untranslated"
traffic to upstream.

So your concern is a not real IMO, not? Or do u mean AMD IOMMU may have
different implementation? 

> 
> In the general case there are also some really nasty
> dirty attacks you can't stop with an IOMMU one of which
> is to reflash the BIOS of the graphics card to which you
> were given unrestricted access so that you compromise the
> entire system next boot. These attacks appear well
> understood except by IOMMU marketing people ;) 

Same with above, this is already protected by IOMMU, peer to peer DMA is
not supported right now.

> 
> IOMMU is great for system correctness and flexibility,
> using it for safely providing hardware direct access is a
> very very hairy business with a complex device.
> 
Agree, that is why we are here :)

Thx, eddie


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel