From mboxrd@z Thu Jan 1 00:00:00 1970 From: Andy Lutomirski Subject: Re: [PATCH V31 10/25] PCI: Lock down BAR access when the kernel is locked down Date: Tue, 26 Mar 2019 13:55:39 -0700 Message-ID: References: <20190326182742.16950-1-matthewgarrett@google.com> <20190326182742.16950-11-matthewgarrett@google.com> Mime-Version: 1.0 Content-Type: text/plain; charset="UTF-8" Return-path: In-Reply-To: <20190326182742.16950-11-matthewgarrett@google.com> Sender: linux-kernel-owner@vger.kernel.org To: Matthew Garrett Cc: James Morris , LSM List , LKML , David Howells , Linux API , Andrew Lutomirski , Matthew Garrett , Matthew Garrett , Bjorn Helgaas , linux-pci@vger.kernel.org List-Id: linux-api@vger.kernel.org On Tue, Mar 26, 2019 at 11:28 AM Matthew Garrett wrote: > > From: Matthew Garrett > > Any hardware that can potentially generate DMA has to be locked down in > order to avoid it being possible for an attacker to modify kernel code, > allowing them to circumvent disabled module loading or module signing. > Default to paranoid - in future we can potentially relax this for > sufficiently IOMMU-isolated devices. Does this break vfio? --Andy