Received: by 10.223.185.116 with SMTP id b49csp1055991wrg; Fri, 16 Feb 2018 11:36:25 -0800 (PST) X-Google-Smtp-Source: AH8x2254m83yPYknUv+ytITq1ZlNSUzMP61UYUEbps5ecTm8/wqI3NQesCZlLSVlViaJwXO82NWY X-Received: by 10.99.109.77 with SMTP id i74mr5830314pgc.73.1518809785090; Fri, 16 Feb 2018 11:36:25 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1518809785; cv=none; d=google.com; s=arc-20160816; b=Q2fQ7aHivap805wv9yWgCoD5yf6CKfuPY7iXRtORC/lBYljfCF93AGP0VunpVfeaYH O4CC+sXIf8TEpDA0XBsZkw1sObglcBIWeR1+4VMXCOgRd/G3IUu8K/u8uuXPSNPTjxSI Sv6XepPr955CyrVl5EZfnUv4SDszaHH1d+kmlNVHJM2+w0KOABaiCDwTAxVuHZu8dA09 MvYxvuqdD7fSpNT3/w2WwEaQgh/AUu3cwqADM7aNo7p2KZRLzw3nm9l9VQqTXvy5+hEh M/1QRxzWyJMvisVqskkELljL33eDtD2KasEzezXbD3s9R5K5TY00HeajdxMGJ3OC+L9C 82/Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=Ht3V4OcNNCzRchlslnavVLI1a7wO5en3qfYSnUAYFd8=; b=sSELolgKAZ0lwJ5DHgQwV+iPjhV0p3Fdf1kGXW+jFuJHUb/3/PkS0nCZicqMfaIZby brHYP2giCSngoZNVdFuLnJyh7NLh3ndCUtKx4kT7dr8QkxMoUOT3m7hO6v2SU8gKJO0/ gC7zX3LSreRTU/IwSltibAzFcPjR+scGd+p63fQyPQyxzo+D4xtd1KiIaFr7U4+KjqFX SzKCnwo4JQNuVnPX7T+tYJy9hx//JcoiYZTMtgw7xTkZYhaObZq8pbP0vDCv58MFnlSP EMMkk+zZELRyYYNjMl1z9exxX34ZddO+K1+323qhGj7ibshXNtazXMbwFnA8kjx2/Bu8 pMLA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a23si565862pfn.161.2018.02.16.11.36.10; Fri, 16 Feb 2018 11:36:25 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752395AbeBPS7F (ORCPT + 99 others); Fri, 16 Feb 2018 13:59:05 -0500 Received: from mail.skyhub.de ([5.9.137.197]:41042 "EHLO mail.skyhub.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750907AbeBPS7D (ORCPT ); Fri, 16 Feb 2018 13:59:03 -0500 X-Virus-Scanned: Nedap ESD1 at mail.skyhub.de Received: from mail.skyhub.de ([127.0.0.1]) by localhost (blast.alien8.de [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id BKILQjy0WF2q; Fri, 16 Feb 2018 19:59:01 +0100 (CET) Received: from pd.tnic (p200300EC2BCAF7004CA5CE08379D95D3.dip0.t-ipconnect.de [IPv6:2003:ec:2bca:f700:4ca5:ce08:379d:95d3]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.skyhub.de (SuperMail on ZX Spectrum 128k) with ESMTPSA id 47F6F1EC025A; Fri, 16 Feb 2018 19:59:01 +0100 (CET) Date: Fri, 16 Feb 2018 19:58:56 +0100 From: Borislav Petkov To: Joe Konno Cc: Ard Biesheuvel , Matthew Garrett , Ingo Molnar , Andy Lutomirski , linux-efi@vger.kernel.org, Linux Kernel Mailing List , Jeremy Kerr , Andi Kleen , Tony Luck , Benjamin Drung , Peter Jones Subject: Re: [PATCH 0/2] efivars: reading variables can generate SMIs Message-ID: <20180216185856.GE29042@pd.tnic> References: <20180215182208.35003-1-joe.konno@linux.intel.com> <20180216105548.GA29042@pd.tnic> <20180216110821.GB29042@pd.tnic> <20180216184832.sqreq5zhar3jqdae@jbkonno-saint14> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20180216184832.sqreq5zhar3jqdae@jbkonno-saint14> User-Agent: Mutt/1.9.3 (2018-01-21) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Feb 16, 2018 at 10:48:32AM -0800, Joe Konno wrote: > We may see some other patches or RFCs about caching and/or shadowing > variable values in efivarfs to reduce the number of direct EFI reads, > with the goal of reducing how many SMIs are generated. So if you do the caching scheme, the question about narrowing permissions becomes moot... > Any obvious EFI variables that userspace tools have come to depend on-- > those which normal, unprivileged users need to read-- are helpful inputs > to this discussion. ... which solves the aspect of not breaking userspace nicely. -- Regards/Gruss, Boris. Good mailing practices for 400: avoid top-posting and trim the reply.