[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <3pfl8u1ugprwkcs5xmtjth3l.1363742692541@email.android.com>
Date: Wed, 20 Mar 2013 01:28:06 +0000
From: Matthew Garrett <matthew.garrett@...ula.com>
To: "H. Peter Anvin" <hpa@...or.com>
CC: "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
"linux-security-module@...r.kernel.org"
<linux-security-module@...r.kernel.org>,
"linux-efi@...r.kernel.org" <linux-efi@...r.kernel.org>,
"kexec@...ts.infradead.org" <kexec@...ts.infradead.org>,
"linux-pci@...r.kernel.org" <linux-pci@...r.kernel.org>
Subject: Re: [PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL
Mm. The question is whether we can reliably determine the ranges a device should be able to access without having to trust userspace (and, ideally, without having to worry about whether iommu vendors have done their job). It's pretty important for PCI passthrough, so we do need to care.
--
Matthew Garrett | matthew.garrett@...ula.com
Powered by blists - more mailing lists