Re: [kvm-devel] [Xen-devel] More virtio users

2007-06-12 Thread Arnd Bergmann
On Sunday 10 June 2007, Avi Kivity wrote: > > - PCI (or your favorite HW bus) passthrough, for your favorite oddball > >   device (e.g., crypto-accelerators). > >   > Won't all high-bandwidth traffic be through dma, bypassing virtio? It can be done, but you'd also need a passthrough for the IOMMU

RE: [kvm-devel] [Xen-devel] More virtio users

2007-06-12 Thread Caitlin Bestler
[EMAIL PROTECTED] wrote: > On Sunday 10 June 2007, Avi Kivity wrote: >>> - PCI (or your favorite HW bus) passthrough, for your favorite >>> oddball   device (e.g., crypto-accelerators). >>> >> Won't all high-bandwidth traffic be through dma, bypassing virtio? > > It can be done, but you'd also ne

Re: [kvm-devel] [Xen-devel] More virtio users

2007-06-12 Thread Arnd Bergmann
On Wednesday 13 June 2007, Caitlin Bestler wrote: > > > It can be done, but you'd also need a passthrough for the > > IOMMU in that case, and you get a potential security hole: if > > a malicious guest is smart enough to figure out IOMMU > > mappings from the device to memory owned by the host. >

Re: [kvm-devel] [Xen-devel] More virtio users

2007-06-12 Thread Muli Ben-Yehuda
On Wed, Jun 13, 2007 at 01:54:26AM +0200, Arnd Bergmann wrote: > On Wednesday 13 June 2007, Caitlin Bestler wrote: > > > > > It can be done, but you'd also need a passthrough for the > > > IOMMU in that case, and you get a potential security hole: if > > > a malicious guest is smart enough to figu

RE: [kvm-devel] [Xen-devel] More virtio users

2007-06-14 Thread Caitlin Bestler
[EMAIL PROTECTED] wrote: > On Wednesday 13 June 2007, Caitlin Bestler wrote: >> >>> It can be done, but you'd also need a passthrough for the IOMMU in >>> that case, and you get a potential security hole: if a malicious >>> guest is smart enough to figure out IOMMU mappings from the device >>> to

Re: [kvm-devel] [Xen-devel] More virtio users

2007-06-14 Thread Arnd Bergmann
On Thursday 14 June 2007, Caitlin Bestler wrote: > > Why not simply adopt the policy that if the IOMMU does not meet > the security requirements of the Hypervisor then it is not an > IOMMU as far as the Hypervisor is concerned? > > More specificially, the Hypervisor should enable direct access >

RE: [kvm-devel] [Xen-devel] More virtio users

2007-06-15 Thread Caitlin Bestler
Arnd Bergmann wrote: > On Thursday 14 June 2007, Caitlin Bestler wrote: >> >> Why not simply adopt the policy that if the IOMMU does not meet the >> security requirements of the Hypervisor then it is not an IOMMU as >> far as the Hypervisor is concerned? >> >> More specificially, the Hypervisor s