Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752670AbdLGB7X (ORCPT ); Wed, 6 Dec 2017 20:59:23 -0500 Received: from smtp.nue.novell.com ([195.135.221.5]:60031 "EHLO smtp.nue.novell.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752379AbdLGB7V (ORCPT ); Wed, 6 Dec 2017 20:59:21 -0500 Date: Thu, 7 Dec 2017 09:59:03 +0800 From: Gary Lin To: Ingo Molnar Cc: Josh Boyer , x86 , "Linux-Kernel@Vger. Kernel. Org" , "linux-efi@vger.kernel.org" , "linux-arm-kernel@lists.infradead.org" , "H. Peter Anvin" , Thomas Gleixner , Ard Biesheuvel , Ingo Molnar , Matt Fleming , Catalin Marinas , Will Deacon , Joey Lee Subject: Re: [RFC v3 PATCH 0/2] Introduce Security Version to EFI Stub Message-ID: <20171207015903.jaos5siysggzz4nc@GaryWorkstation> References: <20171205100148.5757-1-glin@suse.com> <20171206032437.pifxxcewgozlghfs@GaryWorkstation> <20171206183734.xmgecyrd5suiurm6@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20171206183734.xmgecyrd5suiurm6@gmail.com> User-Agent: NeoMutt/20170912 (1.9.0) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1927 Lines: 40 On Wed, Dec 06, 2017 at 07:37:34PM +0100, Ingo Molnar wrote: > > * Gary Lin wrote: > > > On Tue, Dec 05, 2017 at 04:14:26PM -0500, Josh Boyer wrote: > > > On Tue, Dec 5, 2017 at 5:01 AM, Gary Lin wrote: > > > > The series of patches introduce Security Version to EFI stub. > > > > > > > > Security Version is a monotonically increasing number and designed to > > > > prevent the user from loading an insecure kernel accidentally. The > > > > bootloader maintains a list of security versions corresponding to > > > > different distributions. After fixing a critical vulnerability, the > > > > distribution kernel maintainer bumps the "version", and the bootloader > > > > updates the list automatically. When the user tries to load a kernel > > > > with a lower security version, the bootloader shows a warning prompt > > > > to notify the user the potential risk. > > > > > > If a distribution releases a kernel with a higher security version and > > > that it automatically updated on boot, what happens if that kernel > > > contains a different bug that causes it to fail to boot or break > > > critical functionality? At that point, the user's machine would be in > > > a state where the higher security version is enforced but the only > > > kernel that provides that is broken. Wouldn't that make a bad > > > situation even worse by now requiring manual acceptance of the older > > > SV kernel boot physically at the machine? > > > > > > I feel like I'm missing a detail here or something. > > > > > If the new kernel fails to boot, then the user has to choose the kernel > > manually anyway, and there will be an option in the warning prompt to > > lower SV. > > And what if the firmware does not support a lowering of the SV? > The SV list is manipulated by the bootloader, and the firmware only provides the interface to the storage, i.e. non-volatile flash. Cheers, Gary Lin