public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* RFC: Tainting the kernel on raw I/O access
@ 2014-09-03 21:20 H. Peter Anvin
  2014-09-03 22:15 ` Matthew Garrett
                   ` (3 more replies)
  0 siblings, 4 replies; 10+ messages in thread
From: H. Peter Anvin @ 2014-09-03 21:20 UTC (permalink / raw)
  To: Linux Kernel Mailing List
  Cc: Peter Zijlstra, Ingo Molnar, Thomas Gleixner, Matthew Garrett

In a meeting earlier today, we discussed MSR access and that it could be
used to do bad things.  The same applies to other forms of raw I/O
(/dev/mem, /dev/port, ioperm, iopl, etc.)

This is basically the same problem with which the secure boot people
have been struggling.

Peter Z. suggested we should taint the kernel on raw I/O access, and I
tend to concur.

So what I would like to suggest is that we create a new kernel helper
function which can return an error in secure boot mode and otherwise
taints the kernel with a raw I/O taint.

What do people think?

	-hpa


^ permalink raw reply	[flat|nested] 10+ messages in thread

end of thread, other threads:[~2014-09-04 16:48 UTC | newest]

Thread overview: 10+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2014-09-03 21:20 RFC: Tainting the kernel on raw I/O access H. Peter Anvin
2014-09-03 22:15 ` Matthew Garrett
2014-09-03 22:20 ` One Thousand Gnomes
2014-09-03 22:25   ` H. Peter Anvin
2014-09-04 15:56     ` One Thousand Gnomes
2014-09-03 23:46 ` Andi Kleen
2014-09-04 14:10   ` Austin S Hemmelgarn
2014-09-04 16:43     ` One Thousand Gnomes
2014-09-04  5:07 ` Ingo Molnar
2014-09-04 16:47   ` One Thousand Gnomes

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox