[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] Xen security advisory CVE-2011-1898 - VT-d (PCI passthrough) MSI
Tim Deegan writes ("Re: [Xen-devel] Xen security advisory CVE-2011-1898 - VT-d (PCI passthrough) MSI"): > At 21:48 +0100 on 19 May (1305841716), Cihula, Joseph wrote: > > So how would the user (or installation SW) specify to use the best > > (IOMMU) security available on the platform? > > iommu=on. That pretty much lines up with the current meaining. > > Only iommu=force requires a fully secure IOMMU, and you can > overide that with iommu=force,nointremap. I think this is the best behaviour. Do we have a patch that implements it ? If I'm not confused, the patch further upthread crashes on lack of intremap even with iommu=on. Ian. _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |