Re: [qubes-devel] Potential IOMMU bypass from peripherals

2019-02-27 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Wed, Feb 27, 2019 at 08:30:33AM +0100, David Hobach wrote: > Dear devs, > > [1] claims full IOMMU bypass from malicious peripherals using any of > a) racing conditions during boot. There is not much Qubes can do until Qubes is loaded. So,

[qubes-devel] Potential IOMMU bypass from peripherals

2019-02-27 Thread David Hobach
Dear devs, [1] claims full IOMMU bypass from malicious peripherals using any of a) racing conditions during boot. b) enabled ATS (apparently the default with Linux < 4.21; I'm not sure about Xen). What's the Qubes OS view on that? Is ATS enabled/disabled? Were you included in the