On Tue, Sep 4, 2012 at 10:38 AM, Matthew Garrett <mjg@xxxxxxxxxx> wrote: > On Tue, Sep 04, 2012 at 10:30:46AM -0600, Shuah Khan wrote: >> On Tue, Sep 4, 2012 at 9:55 AM, Matthew Garrett <mjg@xxxxxxxxxx> wrote: >> > From: Josh Boyer <jwboyer@xxxxxxxxxx> >> > >> > This option allows userspace to pass the RSDP address to the kernel. This >> > could potentially be used to circumvent the secure boot trust model. >> > We ignore the setting if we don't have the CAP_SECURE_FIRMWARE capability. >> >> Does this mean, acpi_rsdp is disabled on all current platforms that >> don't support CAP_SECURE_FIRMWARE? > > No, if you're not using secure boot then you'll have > CAP_SECURE_FIRMWARE. Gotta say this capability name is confusing. Naming is CAP_PRE_SECURE_BOOT or something along the lines might be a better choice. When I just look at this name, I sure thought this CAP_SECURE_FIRMWARE true means it is a secure boot capable firmware. -- Shuah -- To unsubscribe from this list: send the line "unsubscribe linux-efi" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html