Skip to content
Commit eb627e17 authored by Matthew Garrett's avatar Matthew Garrett Committed by James Morris
Browse files

PCI: Lock down BAR access when the kernel is locked down



Any hardware that can potentially generate DMA has to be locked down in
order to avoid it being possible for an attacker to modify kernel code,
allowing them to circumvent disabled module loading or module signing.
Default to paranoid - in future we can potentially relax this for
sufficiently IOMMU-isolated devices.

Signed-off-by: default avatarDavid Howells <dhowells@redhat.com>
Signed-off-by: default avatarMatthew Garrett <mjg59@google.com>
Acked-by: default avatarBjorn Helgaas <bhelgaas@google.com>
Reviewed-by: default avatarKees Cook <keescook@chromium.org>
cc: linux-pci@vger.kernel.org
Signed-off-by: default avatarJames Morris <jmorris@namei.org>
parent 38bd94b8
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment