Received: by 10.213.65.68 with SMTP id h4csp710283imn; Wed, 4 Apr 2018 06:04:27 -0700 (PDT) X-Google-Smtp-Source: AIpwx48z+DnIrwd1OZfxjqGTB1BtTZbUfBIrzetblRhOuiKyK0+8oTv+BXR+NA3hlYRMtXzthIru X-Received: by 10.99.180.6 with SMTP id s6mr11713340pgf.81.1522847067862; Wed, 04 Apr 2018 06:04:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1522847067; cv=none; d=google.com; s=arc-20160816; b=CnML64j0pt0iqjZ4uYaHLjT9zgjSTb+yqqgi3inSoaLLrOHnKSLTPYBbZ8dYe6I/aT JAi7615c821+eSex0VZtkw4t70ApHX3f4tA2jRWtUFzxSEoi64yFOoFqKYkqab/IwxeV mubDfM/kTNe/gp6qjAZHtxRQiPdXXctqmvw7kW7ZLCXDM+9rtEG5ESQju9fHV2aUhNo5 8BmqNuAJIsDGQG2WX0/KEhGU0xXdvjgP8w/1gOhLP9b6SsoPhFrYq404tFKWA8VHzPkr RTFwfOtwJQaFbnR/KV9OKQMlPiampNMdfhOym1hpePS4y7rDmlaf7uSRwzGfyUhKkMCM yJag== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:to :from:date:arc-authentication-results; bh=CYgm3Ggm4rL5fcEE6hb1DdgnQtHjihsLdA2b+IQ8H/g=; b=V8w4ZjwFk+M0K5n5wxN6wUQiOwyRpmqUsufPoeNbdROvhaOHxNBrnmqJuSU36l/nh5 b8oH2kjeL2IAukmE5tRLlIx5zAJbvlsYCUusS8jbs4MUY22oEfwb7yegboZl/laEc44h TyUORMv2K2efWhZwS/4Qghe9V2WkhSJO5s0MYOV3HoPh3KezYY8ck5zwz5xeqYnDj3ZZ HczdRKCkUbbrdKfbg17ULmYXcDB8BBiqGtAUInNVlXwW5v2YAT10qInEOIvcpCV2VKkh 8SA5Wp61TysJ7e90w/+NMY1Ec+C9XSnRdcmSFuq8nSSA0WWUOr1a/J5vix7TILdNLxjJ 1ykg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f3-v6si3433972plm.433.2018.04.04.06.04.13; Wed, 04 Apr 2018 06:04:27 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751326AbeDDNCh (ORCPT + 99 others); Wed, 4 Apr 2018 09:02:37 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:40562 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750853AbeDDNCf (ORCPT ); Wed, 4 Apr 2018 09:02:35 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 671EBC1C; Wed, 4 Apr 2018 13:02:33 +0000 (UTC) Date: Wed, 4 Apr 2018 15:02:33 +0200 From: Greg Kroah-Hartman To: "Theodore Y. Ts'o" , Matthew Garrett , Linus Torvalds , luto@kernel.org, David Howells , Ard Biesheuvel , jmorris@namei.org, Alan Cox , Linux Kernel Mailing List , jforbes@redhat.com, linux-man@vger.kernel.org, jlee@suse.com, LSM List , linux-api@vger.kernel.org, Kees Cook , linux-efi Subject: Re: [GIT PULL] Kernel lockdown for secure boot Message-ID: <20180404130233.GA24008@kroah.com> References: <20180404125743.GB16242@thunk.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180404125743.GB16242@thunk.org> User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Apr 04, 2018 at 08:57:43AM -0400, Theodore Y. Ts'o wrote: > On Wed, Apr 04, 2018 at 04:30:18AM +0000, Matthew Garrett wrote: > > What I'm afraid of is this turning into a "security" feature that ends up > > being circumvented in most scenarios where it's currently deployed - eg, > > module signatures are mostly worthless in the non-lockdown case because you > > can just grab the sig_enforce symbol address and then kexec a preamble that > > flips it back to N regardless of the kernel config. > > Whoa. Why doesn't lockdown prevent kexec? Put another away, why > isn't this a problem for people who are fearful that Linux could be > used as part of a Windows boot virus in a Secure UEFI context? Because no one is afraid of that :) greg k-h