From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751176AbbBULba (ORCPT ); Sat, 21 Feb 2015 06:31:30 -0500 Received: from mail-wg0-f51.google.com ([74.125.82.51]:57180 "EHLO mail-wg0-f51.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750939AbbBULb3 (ORCPT ); Sat, 21 Feb 2015 06:31:29 -0500 From: Pali =?utf-8?q?Roh=C3=A1r?= To: Stefan Richter , linux1394-devel@lists.sourceforge.net, linux-kernel@vger.kernel.org Subject: linux firewire implementation & DMA attack Date: Sat, 21 Feb 2015 12:31:26 +0100 User-Agent: KMail/1.13.7 (Linux/3.13.0-45-generic; KDE/4.14.2; x86_64; ; ) MIME-Version: 1.0 Content-Type: multipart/signed; boundary="nextPart27400606.AohD6IcR04"; protocol="application/pgp-signature"; micalg=pgp-sha1 Content-Transfer-Encoding: 7bit Message-Id: <201502211231.26090@pali> Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org --nextPart27400606.AohD6IcR04 Content-Type: Text/Plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Hello, I would like to know if current firewire implementation in Linux=20 kernel v3.19 still have security problems like DMA attack. If yes are there any prevention for it (maybe with intel_iommu)? =2D-=20 Pali Roh=C3=A1r pali.rohar@gmail.com --nextPart27400606.AohD6IcR04 Content-Type: application/pgp-signature; name=signature.asc Content-Description: This is a digitally signed message part. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) iEYEABECAAYFAlTobI4ACgkQi/DJPQPkQ1J70ACff9YcN968Rk2idQJ9b8rS0u38 zo4AoJS+jaknoAtlGHFta4Sum4E1dAKc =a1Fu -----END PGP SIGNATURE----- --nextPart27400606.AohD6IcR04--