From mboxrd@z Thu Jan 1 00:00:00 1970 From: "H. Peter Anvin" Subject: Re: Trusted kernel patchset for Secure Boot lockdown Date: Thu, 13 Mar 2014 14:28:01 -0700 Message-ID: <532222E1.2020405@zytor.com> References: <1393445473-15068-1-git-send-email-matthew.garrett@nebula.com> <1394686919.25122.2.camel@x230> <1394726363.25122.16.camel@x230> <20140313212450.67f1de8e@alan.etchedpixels.co.uk> Mime-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: <20140313212450.67f1de8e@alan.etchedpixels.co.uk> Sender: linux-security-module-owner@vger.kernel.org To: One Thousand Gnomes , Matthew Garrett Cc: "jmorris@namei.org" , "linux-kernel@vger.kernel.org" , "keescook@chromium.org" , "linux-security-module@vger.kernel.org" , "akpm@linux-foundation.org" , "jwboyer@fedoraproject.org" , "linux-efi@vger.kernel.org" , "gregkh@linuxfoundation.org" List-Id: linux-efi@vger.kernel.org On 03/13/2014 02:24 PM, One Thousand Gnomes wrote: > > If I have CAP_SYS_RAWIO I can make arbitary ring 0 calls from userspace, > trivially and in a fashion well known and documented. > ... and once we eliminate CAP_SYS_RAWIO a bunch of the patches become redundant. -hpa