LWN: Comments on "Safe device assignment with VFIO" https://lwn.net/Articles/474088/ This is a special feed containing comments posted to the individual LWN article titled "Safe device assignment with VFIO". en-us Wed, 27 Aug 2025 14:08:08 +0000 Wed, 27 Aug 2025 14:08:08 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net Kernel ABI https://lwn.net/Articles/474875/ https://lwn.net/Articles/474875/ xav <div class="FormattedComment"> Does that thing provide the famous stable kernel ABI ?<br> </div> Tue, 10 Jan 2012 15:50:14 +0000 Safe device assignment with VFIO https://lwn.net/Articles/474735/ https://lwn.net/Articles/474735/ dwmw2 <div class="FormattedComment"> To be specific: You want interrupt remapping and X2APIC. And beware that there are some crappy BIOSes which explicitly disable X2APIC for reasons I won't go into here because it makes me too grumpy.<br> </div> Mon, 09 Jan 2012 12:26:40 +0000 Safe device assignment with VFIO https://lwn.net/Articles/474596/ https://lwn.net/Articles/474596/ drag <div class="FormattedComment"> Here documents the vulnerabilities inherent in non-Interrupt Remapping (IR, DMAR or whatever):<br> <p> <a href="http://invisiblethingslab.com/resources/2011/Software%20Attacks%20on%20Intel%20VT-d.pdf">http://invisiblethingslab.com/resources/2011/Software%20A...</a><br> </div> Fri, 06 Jan 2012 20:05:36 +0000 Safe device assignment with VFIO https://lwn.net/Articles/474581/ https://lwn.net/Articles/474581/ drag <div class="FormattedComment"> Please keep in mind with this stuff that unless you have support for "DMA Remapping" a malicious software with access to IOMMU (like a compromised Virtual Machine) has the potential for using interrupts and other hardware features for compromising the host system.<br> <p> Unless you are using a new version of Intel's VT-d you can be vulnerable. <br> </div> Fri, 06 Jan 2012 17:55:28 +0000