Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx> wrote: > That does bring me to another EFI related point: many of these patches > are x86 specific for no good reason. Note that the sysrq one is awkward since the key chosen *is* arch-specific. SysRq+x can't be arbitrarily assigned to this since some other arches have their own use for it. Anyway, the ones that are x86-specific are: efi: Add EFI_SECURE_BOOT bit efi: Lock down the kernel if booted in secure boot mode Add a sysrq option to exit secure boot mode Copy secure_boot flag in boot params across kexec reboot x86: Lock down IO port access when the kernel is locked down x86: Restrict MSR access when the kernel is locked down asus-wmi: Restrict debugfs interface when the kernel is locked down The first three are dealt with in the five patches I posted later, including making the choice of sysrq key an arch override. The bits that can be moved out to the efi firmware driver have been. The 4th looks to be x86 bootloader protocol specific. The remainder look very x86 specific, apart from one piece in the 5th patch where /dev/port is locked down. David -- To unsubscribe from this list: send the line "unsubscribe linux-efi" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html