summaryrefslogtreecommitdiffstats
path: root/security/smack
diff options
context:
space:
mode:
authorLu Baolu <baolu.lu@linux.intel.com>2019-09-06 14:14:52 +0800
committerJoerg Roedel <jroedel@suse.de>2019-09-11 12:34:31 +0200
commitcfb94a372f2d4ee226247447c863f8709863d170 (patch)
treeb209631fec06e8a494fd5380ff7b9caf6c236557 /security/smack
parent3b53034c268d550d9e8522e613a14ab53b8840d8 (diff)
downloadlinux-cfb94a372f2d4ee226247447c863f8709863d170.tar.gz
linux-cfb94a372f2d4ee226247447c863f8709863d170.tar.bz2
linux-cfb94a372f2d4ee226247447c863f8709863d170.zip
iommu/vt-d: Use bounce buffer for untrusted devices
The Intel VT-d hardware uses paging for DMA remapping. The minimum mapped window is a page size. The device drivers may map buffers not filling the whole IOMMU window. This allows the device to access to possibly unrelated memory and a malicious device could exploit this to perform DMA attacks. To address this, the Intel IOMMU driver will use bounce pages for those buffers which don't fill whole IOMMU pages. Cc: Ashok Raj <ashok.raj@intel.com> Cc: Jacob Pan <jacob.jun.pan@linux.intel.com> Cc: Kevin Tian <kevin.tian@intel.com> Signed-off-by: Lu Baolu <baolu.lu@linux.intel.com> Tested-by: Xu Pengfei <pengfei.xu@intel.com> Tested-by: Mika Westerberg <mika.westerberg@intel.com> Signed-off-by: Joerg Roedel <jroedel@suse.de>
Diffstat (limited to 'security/smack')
0 files changed, 0 insertions, 0 deletions