LWN: Comments on "Controlling device peer-to-peer access from user space" https://lwn.net/Articles/782489/ This is a special feed containing comments posted to the individual LWN article titled "Controlling device peer-to-peer access from user space". en-us Thu, 02 Oct 2025 22:11:54 +0000 Thu, 02 Oct 2025 22:11:54 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net Controlling device peer-to-peer access from user space https://lwn.net/Articles/834885/ https://lwn.net/Articles/834885/ imMute <div class="FormattedComment"> It&#x27;s the same vulnerability. To sum it up: PCIe devices can initiated read and write commands. Typically, those commands target system RAM (this is how DMA works). Devices can just as easily target Memory or I/O space in other devices.<br> The solution is the same: IOMMUs as firewalls between devices you want to segregate.<br> <p> <font class="QuotedText">&gt;could a rogue device read and transmit an entire drive with nothing on the system aware of it? </font><br> Yes. It&#x27;s exactly the same hole as reading and transmitting system RAM without the CPU noticing (except that it&#x27;s typically more involved to access disk data than it is to access RAM).<br> </div> Wed, 21 Oct 2020 17:50:09 +0000 Controlling device peer-to-peer access from user space https://lwn.net/Articles/783485/ https://lwn.net/Articles/783485/ ScottMinster <div class="FormattedComment"> <font class="QuotedText">&gt; He mentioned a number of possible use cases, including one device controlling another device's command queue. An example of this situation is a network card accessing a block device command queue so that it can submit storage transactions without the CPU's involvement.</font><br> <p> This sounds like it could really enhance those Thunderclap vulnerabilities (<a href="https://lwn.net/Articles/782381/">https://lwn.net/Articles/782381/</a>). A network adapter that could send read (or write) commands to the storage device without any mediation from the main system seems dangerous. While things would be fine with a well behaving device, could a rogue device read and transmit an entire drive with nothing on the system aware of it? Or some other nefarious behavior writing to the drive.<br> <p> What sort of security precautions are there to mitigate a rogue device, especially one plugged into an external port?<br> </div> Tue, 19 Mar 2019 16:11:21 +0000