diff options
author | Lu Baolu <[email protected]> | 2019-09-06 14:14:52 +0800 |
---|---|---|
committer | Joerg Roedel <[email protected]> | 2019-09-11 12:34:31 +0200 |
commit | cfb94a372f2d4ee226247447c863f8709863d170 (patch) | |
tree | b209631fec06e8a494fd5380ff7b9caf6c236557 /lib/test-string_helpers.c | |
parent | 3b53034c268d550d9e8522e613a14ab53b8840d8 (diff) |
iommu/vt-d: Use bounce buffer for untrusted devices
The Intel VT-d hardware uses paging for DMA remapping.
The minimum mapped window is a page size. The device
drivers may map buffers not filling the whole IOMMU
window. This allows the device to access to possibly
unrelated memory and a malicious device could exploit
this to perform DMA attacks. To address this, the
Intel IOMMU driver will use bounce pages for those
buffers which don't fill whole IOMMU pages.
Cc: Ashok Raj <[email protected]>
Cc: Jacob Pan <[email protected]>
Cc: Kevin Tian <[email protected]>
Signed-off-by: Lu Baolu <[email protected]>
Tested-by: Xu Pengfei <[email protected]>
Tested-by: Mika Westerberg <[email protected]>
Signed-off-by: Joerg Roedel <[email protected]>
Diffstat (limited to 'lib/test-string_helpers.c')
0 files changed, 0 insertions, 0 deletions