Received: by 10.213.65.68 with SMTP id h4csp3716558imn; Tue, 3 Apr 2018 09:32:00 -0700 (PDT) X-Google-Smtp-Source: AIpwx4/r3pnZ+sDt03PTJGqKIcQ/le9Yp5tu0fs98k9wGTZtvhUdz1/erEmc5S36KnLVApnXwMfP X-Received: by 2002:a17:902:143:: with SMTP id 61-v6mr15042033plb.345.1522773120181; Tue, 03 Apr 2018 09:32:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1522773120; cv=none; d=google.com; s=arc-20160816; b=BOK16W4mlZaYZVNKkei5PqQX7p44R5gjMXvU14UhaQIgXbSUtD2+nT26vijrf45vlD Yr2tR1PIjdxg2QWrIjjFsOFusfmRfA/90NDMi5699Rp5jJYED8WdJzK9g5vV/8xh12jU bTans4OaBwQ2o3A/GRUek4Kq+J1kSBxcdg2nkfmiGT1L7HpARgf8ix1sJ55+6seUUQ/8 dlVLrA2XuduFx62ZgjYUanDGAKvHkQlguTq90sJIMvn92Yerf+Jox4SWo4u49JSnPOZZ z0ebLvgoRFju4qxKhRuMF5D+rGQaBXoqHZG/e7tdDo+zXDY6u2ULCym9zWdZGus3mHQ4 iFtQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature :arc-authentication-results; bh=fkiQEkqOKaEu8g4qwVlLXZ19D04P2dd0altJKl1FPrk=; b=snbfcfLpiijc7YkugBpqXbcqAP3yn51KcG4LnQik8SkeHM6a3x3J7yvszbDl17JPjv B+QsCmGYWyt2HbkkjuDUmDn60xKCMDN/t/tcOI8jJGW55f4ybAToin09OU4siI84x9Mr gamIc8She184lns7/w61Qm8kWmb8IZWJLeU7mwLLDXq8MMst3Tokh7GwEGuvHNumpGNO Zk08I836Rujqodp9zRBYf0twcIVlMeINovRe5EseLGwDPurUc0HahvW4v22aNqKp7DUU jCO7JiPxveeHM89KlujtKnVwXX/ljbIW4uS78GbDykr2oZBd74p1LZdHr2x5c7z2MymR 5HfA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=uJt/Ga0c; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y14-v6si916034plr.296.2018.04.03.09.31.46; Tue, 03 Apr 2018 09:32:00 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=uJt/Ga0c; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752727AbeDCQaC (ORCPT + 99 others); Tue, 3 Apr 2018 12:30:02 -0400 Received: from mail-it0-f68.google.com ([209.85.214.68]:37225 "EHLO mail-it0-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752216AbeDCQ37 (ORCPT ); Tue, 3 Apr 2018 12:29:59 -0400 Received: by mail-it0-f68.google.com with SMTP id 71-v6so21616967ith.2 for ; Tue, 03 Apr 2018 09:29:59 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=fkiQEkqOKaEu8g4qwVlLXZ19D04P2dd0altJKl1FPrk=; b=uJt/Ga0cO6gZhhFMsQX6WtGXmcSoieZ4phk8Rb2465lfdEgPQpgJk2xUvQWrWSfq/s 82Ap7Dj+O8kPzAh2YRQ6e/2jqZwBmMvGmpsCQcDMTSN+ahJIBWtYGPIWwsYFXsGS+lh5 5In/ydKiXmlWxktqONXmCAs+0KzzcRfPuZYB5xDjaN7raUpv8vtqX+uLZwG9HpRNMxFV G1pJewB9DpG6sHCy5Y+Z6KvGQk5RqQq0ZUzKzgVFCFsHy1GumoBPwdeVp0qxD/9jCVmV 1ShI6QQ4FDd/6tyy3uE9QYFdno6+bi/HaieiDpnGsW2Fd0cAM/EsraP1nrg/kOUJ5lgr EGTw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=fkiQEkqOKaEu8g4qwVlLXZ19D04P2dd0altJKl1FPrk=; b=sDk2v+5DGs7FWfeERIufQRQw6lCO77GgaK4A0cDTnM9kuPGgIwIXR5j4Oirr4XKNah 0C6aeXb11aSOFqUf8dwIjXbyC3gGHEjW1OnIBW/mdsUx/CDW9cIbDBf36MBDPVphUM3L EqsYQ8W0rljUh5aKB2EHpnAIM97xV2HPjOKjC74Pyatsx0s/BNkahiRM4WSDkS1y6HHG D+bsKLxBbAm3a2YqWmJD42mIVJqCH/C07jSTs6X0/Btc/Lf7GPWVmTTGqmDiPmj2QnkP vyjqgDgGpLeb99u7A+KROt9b9PDmO9rsdeXhj4CzlXSdJAtf5oOfTJUrsd9PVmhF/G71 XFQg== X-Gm-Message-State: AElRT7HYHDCPJhJcpVM27ylVxYZ1A+DD2WyTE7kPPR0iwrFGtk8UoYse wTMfnAUfkpgR/4LakmJuZeNtdfMj9eyr7hcrR62ajA== X-Received: by 2002:a24:530f:: with SMTP id n15-v6mr5567881itb.123.1522772998854; Tue, 03 Apr 2018 09:29:58 -0700 (PDT) MIME-Version: 1.0 References: <4136.1522452584@warthog.procyon.org.uk> <186aeb7e-1225-4bb8-3ff5-863a1cde86de@kernel.org> <30459.1522739219@warthog.procyon.org.uk> In-Reply-To: From: Matthew Garrett Date: Tue, 03 Apr 2018 16:29:48 +0000 Message-ID: Subject: Re: [GIT PULL] Kernel lockdown for secure boot To: luto@kernel.org Cc: David Howells , Ard Biesheuvel , jmorris@namei.org, Alan Cox , Linus Torvalds , Greg Kroah-Hartman , Linux Kernel Mailing List , jforbes@redhat.com, linux-man@vger.kernel.org, jlee@suse.com, LSM List , linux-api@vger.kernel.org, Kees Cook , linux-efi Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Apr 3, 2018 at 8:11 AM Andy Lutomirski wrote: > Can you explain that much more clearly? I'm asking why booting via > UEFI Secure Boot should enable lockdown, and I don't see what this has > to do with kexec. And "someone blacklist[ing] your key in the > bootloader" sounds like a political issue, not a technical issue. A kernel that allows users arbitrary access to ring 0 is just an overfeatured bootloader. Why would you want secure boot in that case?