On Thu, 1 Nov 2012, James Bottomley wrote: > The point I'm making is that given that the majority of exploits will > already be able to execute arbitrary code in-kernel, there's not much > point trying to consider features like this as attacker prevention. We > should really be focusing on discussing why we'd want to prevent a > legitimate local root from writing to the suspend partition in a secure > boot environment. Well, this is being repeated over and over again when talking about secure boot, right? My understanding is that we are not trying to protect against root exploiting the kernel. We are trying to protect against root tampering with the kernel code and data through legitimate use of kernel-provided facilitiies (/dev/mem, ioperm, reprogramming devices to DMA to arbitrary memory locations, resuming from hibernation image that has been tampered with, etc). Or perhaps I just misunderstood the point you were trying to make? Thanks, -- Jiri Kosina SUSE Labs -- To unsubscribe from this list: send the line "unsubscribe linux-efi" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html