> -----Original Message-----
> From: Andy Lutomirski [mailto:[email protected]]
> Sent: Thursday, April 13, 2017 12:44 PM
> To: Limonciello, Mario <[email protected]>
> Cc: Darren Hart <[email protected]>; Andrew Lutomirski <[email protected]>;
> Michał Kępień <[email protected]>; Rafael J. Wysocki <[email protected]>; Len
> Brown <[email protected]>; Pali Rohár <[email protected]>; Corentin
> Chary <[email protected]>; Andy Shevchenko
> <[email protected]>; [email protected]; platform-
> [email protected]; [email protected]
> Subject: Re: RFC: WMI Enhancements
> 
> On Thu, Apr 13, 2017 at 10:39 AM,  <[email protected]> wrote:
> >> -----Original Message-----
> >> From: Darren Hart [mailto:[email protected]]
> >> Sent: Thursday, April 13, 2017 12:06 PM
> >> To: Limonciello, Mario <[email protected]>
> >> Cc: [email protected]; [email protected]; [email protected];
> >> [email protected]; [email protected]; [email protected];
> >> [email protected]; [email protected]; platform-
> >> [email protected]; [email protected]
> >> Subject: Re: RFC: WMI Enhancements
> >>
> 
> > Well the "most" interesting to me is the SMBIOS calling interface on the
> > regular Dell GUID (WMBA IIRC).  That's what is used to manipulate keyboard
> > LED timeouts in dell-laptop (although through direct SMI today).
> >
> > It's also what is used for other SMBIOS calls like changing random BIOS 
> > settings
> > that shouldn't be generically exposed in sysfs but should be controlled by
> > manageability tools.
> >
> > Example: turning on/off legacy option ROM or changing legacy boot order.
> >
> 
> IIUC we basically can't expose the SMI--based interface to this entry
> point to userspace because of its use of physical addressing.  It is
> reasonably safe to expose the WMI version?  (IOW should be expect that
> it doesn't enable kernel-mode or SMM code execution?)

The SMI based entry is already exposed using dcdbas.

The WMI version when executing a call that would be run as a SMI 
will copy the buffer to an area of memory that the BIOS has already 
been marked reserved to execute the SMI and copy the result out.

> 
> TBH, I've occasionally considered writing a driver to expose SMM code
> execution on systems with a known reliable exploit :)

On Dell HW?  I'm sure our security folks would be very interested in this.

Reply via email to