Re: Do not allow MSR or Embedded Controller writes from userspace in secure boot case

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, 07 Nov 2012 23:51:06 +0100
"H. Peter Anvin" <hpa@xxxxxxxxx> wrote:

> On 11/07/2012 10:54 PM, Matthew Garrett wrote:
> > Is there a case where modifying MSRs or EC registers can cause arbitrary 
> > code execution?
> 
> For MSRs we could have a whitelist of permitted MSRs, but allowing
> general MSR access... no.

Far safer to just block it and expect people to use MSRs accessed via
drivers that provide functionality. Otherwise your blacklist in some
cases will get fiendishly complicated and sometimes depend upon the exact
chip and the values in other MSRs as to whether they are safe.

Alan
--
To unsubscribe from this list: send the line "unsubscribe linux-efi" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux