From mboxrd@z Thu Jan 1 00:00:00 1970 From: Alex Williamson Subject: Re: [PATCH V31 10/25] PCI: Lock down BAR access when the kernel is locked down Date: Tue, 26 Mar 2019 15:19:03 -0600 Message-ID: <20190326151903.257724d5@x1.home> References: <20190326182742.16950-1-matthewgarrett@google.com> <20190326182742.16950-11-matthewgarrett@google.com> Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: Sender: linux-kernel-owner@vger.kernel.org To: Andy Lutomirski Cc: Matthew Garrett , James Morris , LSM List , LKML , David Howells , Linux API , Matthew Garrett , Matthew Garrett , Bjorn Helgaas , linux-pci@vger.kernel.org List-Id: linux-api@vger.kernel.org On Tue, 26 Mar 2019 13:55:39 -0700 Andy Lutomirski wrote: > On Tue, Mar 26, 2019 at 11:28 AM Matthew Garrett > wrote: > > > > From: Matthew Garrett > > > > Any hardware that can potentially generate DMA has to be locked down in > > order to avoid it being possible for an attacker to modify kernel code, > > allowing them to circumvent disabled module loading or module signing. > > Default to paranoid - in future we can potentially relax this for > > sufficiently IOMMU-isolated devices. > > Does this break vfio? No, vfio provides its own interface to pci config space. Thanks, Alex