summaryrefslogtreecommitdiffstats
path: root/fs/jbd2/commit.c
diff options
context:
space:
mode:
authorLu Baolu <baolu.lu@linux.intel.com>2019-03-01 11:23:10 +0800
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2019-04-05 22:34:25 +0200
commit87f8ad583c7942cc185e7d51da163112d534f79f (patch)
tree608b97cb759c94351a761188b3f9cf45c37ffdc2 /fs/jbd2/commit.c
parentb39898beee9da20b279c3daf073b42045b3d35d6 (diff)
downloadtalos-obmc-linux-87f8ad583c7942cc185e7d51da163112d534f79f.tar.gz
talos-obmc-linux-87f8ad583c7942cc185e7d51da163112d534f79f.zip
iommu/vt-d: Disable ATS support on untrusted devices
[ Upstream commit d8b8591054575f33237556c32762d54e30774d28 ] Commit fb58fdcd295b9 ("iommu/vt-d: Do not enable ATS for untrusted devices") disables ATS support on the devices which have been marked as untrusted. Unfortunately this is not enough to fix the DMA attack vulnerabiltiies because IOMMU driver allows translated requests as long as a device advertises the ATS capability. Hence a malicious peripheral device could use this to bypass IOMMU. This disables the ATS support on untrusted devices by clearing the internal per-device ATS mark. As the result, IOMMU driver will block any translated requests from any device marked as untrusted. Cc: Jacob Pan <jacob.jun.pan@linux.intel.com> Cc: Mika Westerberg <mika.westerberg@linux.intel.com> Suggested-by: Kevin Tian <kevin.tian@intel.com> Suggested-by: Ashok Raj <ashok.raj@intel.com> Fixes: fb58fdcd295b9 ("iommu/vt-d: Do not enable ATS for untrusted devices") Signed-off-by: Lu Baolu <baolu.lu@linux.intel.com> Signed-off-by: Joerg Roedel <jroedel@suse.de> Signed-off-by: Sasha Levin <sashal@kernel.org>
Diffstat (limited to 'fs/jbd2/commit.c')
0 files changed, 0 insertions, 0 deletions
OpenPOWER on IntegriCloud