From mboxrd@z Thu Jan 1 00:00:00 1970 From: Gleb Natapov Subject: Re: interrupt remapping support Date: Wed, 14 Nov 2012 19:06:11 +0200 Message-ID: <20121114170611.GE13385@redhat.com> References: <20121113092940.GA13385@redhat.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: Abhinav Srivastava , "kvm@vger.kernel.org" To: emdel Return-path: Received: from mx1.redhat.com ([209.132.183.28]:37313 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932188Ab2KNRGP (ORCPT ); Wed, 14 Nov 2012 12:06:15 -0500 Content-Disposition: inline In-Reply-To: Sender: kvm-owner@vger.kernel.org List-ID: On Wed, Nov 14, 2012 at 05:46:45PM +0100, emdel wrote: > On Tue, Nov 13, 2012 at 10:29 AM, Gleb Natapov wrote: > > > KVM does not implement VT-d spec if this is your question. Any help with > > this will be appreciated. > > > > Hello everybody, > following this link [1] it looks like that we can configure pass-through > devices for KVM guests, > so if it is the case and as you said KVM doesn't implement any Vt-d > specification, > are there any protections in place for DMA attacks? > > KVM uses VT-d on a host for device assignment. Guest running inside KVM will not see VT-d though since KVM does not emulate it. -- Gleb.