From mboxrd@z Thu Jan 1 00:00:00 1970 From: "H. Peter Anvin" Subject: Re: [PATCH 01/12] Security: Add CAP_COMPROMISE_KERNEL Date: Wed, 20 Mar 2013 09:45:55 -0700 Message-ID: <5149E7C3.3080707@zytor.com> References: <1363642353-30749-1-git-send-email-matthew.garrett@nebula.com> <51490ABD.3050205@zytor.com> <1363785354.2553.15.camel@x230.sbx07502.somerma.wayport.net> <1363792462.2553.24.camel@x230.sbx07502.somerma.wayport.net> Mime-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: <1363792462.2553.24.camel@x230.sbx07502.somerma.wayport.net> Sender: linux-pci-owner@vger.kernel.org To: Matthew Garrett Cc: "linux-kernel@vger.kernel.org" , "linux-security-module@vger.kernel.org" , "linux-efi@vger.kernel.org" , "kexec@lists.infradead.org" , "linux-pci@vger.kernel.org" List-Id: linux-efi@vger.kernel.org On 03/20/2013 08:14 AM, Matthew Garrett wrote: > On Wed, 2013-03-20 at 08:03 -0700, H. Peter Anvin wrote: >> CAP_SYS_RAWIO is definitely inappropriate there. > > Ok. How do we fix that without breaking userspace that expects > CAP_SYS_RAWIO to be sufficient? > I don't think we can to some way, because when what you have is fundamentally broken, it's hard to fix. However, it is extremely likely that the number of affected applications is vanishingly small. There probably are a handful of apps that do this, and I wouldn't be surprised if most of them simply run as root. -hpa