|
|
|
|
|
|
|
|
|
|
xen-devel
RE: [Xen-devel] [PATCH][RFC] Support more Capability StructuresandDevice
To: |
"Ian Jackson" <Ian.Jackson@xxxxxxxxxxxxx> |
Subject: |
RE: [Xen-devel] [PATCH][RFC] Support more Capability StructuresandDevice Specific |
From: |
"Dong, Eddie" <eddie.dong@xxxxxxxxx> |
Date: |
Fri, 4 Jul 2008 07:03:34 +0800 |
Cc: |
Yuji Shimada <shimada-yxb@xxxxxxxxxxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxx, "Dong, Eddie" <eddie.dong@xxxxxxxxx>, Keir Fraser <keir.fraser@xxxxxxxxxxxxx>, Alan Cox <alan@xxxxxxxxxxxxxxxxxxx> |
Delivery-date: |
Thu, 03 Jul 2008 16:05:05 -0700 |
Envelope-to: |
www-data@xxxxxxxxxxxxxxxxxxx |
In-reply-to: |
<18540.41194.765152.994836@xxxxxxxxxxxxxxxxxxxxxxxx> |
List-help: |
<mailto:xen-devel-request@lists.xensource.com?subject=help> |
List-id: |
Xen developer discussion <xen-devel.lists.xensource.com> |
List-post: |
<mailto:xen-devel@lists.xensource.com> |
List-subscribe: |
<http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe> |
List-unsubscribe: |
<http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe> |
References: |
<20080630131728.F30A.SHIMADA-YXB@xxxxxxxxxxxxxxx><10EA09EFD8728347A513008B6B0DA77A035FC20B@xxxxxxxxxxxxxxxxxxxxxxxxxxxx><20080701163646.C0E3.SHIMADA-YXB@xxxxxxxxxxxxxxx><18537.65217.267922.698490@xxxxxxxxxxxxxxxxxxxxxxxx><10EA09EFD8728347A513008B6B0DA77A035FC6EA@xxxxxxxxxxxxxxxxxxxxxxxxxxxx><18539.22704.112555.841467@xxxxxxxxxxxxxxxxxxxxxxxx><20080702121745.3893f852@xxxxxxxxxxxxxxxxxxx><10EA09EFD8728347A513008B6B0DA77A0363AC7D@xxxxxxxxxxxxxxxxxxxxxxxxxxxx> <18540.41194.765152.994836@xxxxxxxxxxxxxxxxxxxxxxxx> |
Sender: |
xen-devel-bounces@xxxxxxxxxxxxxxxxxxx |
Thread-index: |
Acjc8laL+pbxudG0TsOwIdZl6ZSz9gAbnl3Q |
Thread-topic: |
[Xen-devel] [PATCH][RFC] Support more Capability StructuresandDevice Specific |
Ian Jackson wrote:
> Dong, Eddie writes ("RE: [Xen-devel] [PATCH][RFC] Support
> more Capability Structures andDevice Specific"):
>> Alan Cox wrote:
>>> In the general case there are also some really nasty
>>> dirty attacks you can't stop with an IOMMU one of which
>>> is to reflash the BIOS of the graphics card to which you
>>> were given unrestricted access so that you compromise
>>> the entire system next boot. These attacks appear well
>>> understood except by IOMMU marketing people ;)
>>
>> Same with above, this is already protected by IOMMU,
>> peer to peer DMA is not supported right now.
>
> You have evidently completely misunderstood Alan's point.
>
> I was going to explain it again but I'm not sure I know
> how to say it
> more clearly. Alan's scenario doesn't involve any peer
> to peer DMA.
>
> Ian.
>
Ok, if it means guest direct MMIO to flash bios, then yes. But it is not
related with our discussion, i.e. no matter we pass through CFGS
registers or not, it may happen.
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|
|
|
|
|