Re: [PATCH for-next 2/2] IB/hfi1: Add diagnostic debugfs interface

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, 2018-09-26 at 16:11 -0600, Jason Gunthorpe wrote:
> Probably the same thing, you can't let user space control a DMA
> engine, so arbitary userspace writes to a PCI bar are totally
> forbidden.
> 
> But, if there is a totally secure region in the BAR that is safe,
> then
> potentially read/write could be OK. But there would need to be a big
> comment explaining the logic around picking the reduced region in the
> BAR, and what the security model is.

Jason,

Your assertion does not make sense to me WRT the scenario below. Would
you mind elaborating or pointing us the discussion related to this?

A 'root' user can certainly unload a device driver and then fully
access the device's BAR through the 'resourceX' sysfs. This allows
userspace to trigger DMA's at will.

How are the options in question supposed to prevent this?

Not to mention that a 'root' user can load a module which exports the
entire BAR to userspace, completely circumventing any protections
available to /dev/mem or 'resourceX'.

-- 
Thank you,
	- Mitko

Attachment: smime.p7s
Description: S/MIME cryptographic signature


[Index of Archives]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Photo]     [Yosemite News]     [Yosemite Photos]     [Linux Kernel]     [Linux SCSI]     [XFree86]

  Powered by Linux