Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp1286100imm; Wed, 15 Aug 2018 14:59:21 -0700 (PDT) X-Google-Smtp-Source: AA+uWPx4KMpX5Q+v+laCpprPoHqLkGr3dC8+xxOlbnB70WGXbEjq8qGmCrSGpT/ItiJansenh1lu X-Received: by 2002:a63:4d06:: with SMTP id a6-v6mr26281992pgb.408.1534370361171; Wed, 15 Aug 2018 14:59:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1534370361; cv=none; d=google.com; s=arc-20160816; b=fg2BI40B1VArurdCS/sUg9DEYS1UAuVQUeKKnfQ/Nefi5Na5pv75BezURAsv88loPx 8wIWfa9VRQtdOOpYFXPK7nCgmrCCpX891GVz57a9hVtuSuCCCDPHbY2eQyfD8hp6K5XW 9RUX340y3Rvq3vAeA7t8o/hlZQurPAZqeJYcBdz2UIUJDRN0/AXNDL2WjLZ1cW1dwTDw lofOQRQWdXLlVMWoO9fIjZDXphynZQ0ANE1/Z+qkp9ICNr22DcfXcqgJ254xv3Aqi6zU o7zBpcGsbOzr5wLhsIrYj2IewBKpPG3hXLPRigwgecyvU9w8SQ2TxockRlBJ+Q+L3Bsa 7uuQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=AOn/gvpHhrTE87racKN299ihE9voJHFdcVNrkix6Qm4=; b=AL0MGtarzDEfYPOPOQ4RqJtHET7Rv7IwWzTuJiiBgyuhAbg/1OI+8SUNqZVtoHK+09 FftXAUiN5thwsLbPyY61F5PJzAFpy9vcYlK/3NgFnTjMiMiXYU5la17XTZ7eSW8Ygeva +kCZU1C+YS7W+icNXiNEtRFHX1xSi4rsV4soCQCkTitwvM03dK7fFWFJSc2Ijc70Yksz /OhDBIiusBeWJCsy8Nx2Kf+67F4wkakD7TuAjF/+2cRZ+xXztI9OpKKEmK9OzwRun4BY aH4I1M2G+OooKoYnGUuwcpc/D84jXmLYMKqQiOZHGP2b1mEd7r4SUF63BzyGVal5o5jP gZqQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 1-v6si10677418plh.339.2018.08.15.14.59.05; Wed, 15 Aug 2018 14:59:21 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727726AbeHPAvZ (ORCPT + 99 others); Wed, 15 Aug 2018 20:51:25 -0400 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:49484 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1727126AbeHPAvY (ORCPT ); Wed, 15 Aug 2018 20:51:24 -0400 Received: from smtp.corp.redhat.com (int-mx06.intmail.prod.int.rdu2.redhat.com [10.11.54.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id E393C87A85; Wed, 15 Aug 2018 21:57:22 +0000 (UTC) Received: from horse.redhat.com (ovpn-121-49.rdu2.redhat.com [10.10.121.49]) by smtp.corp.redhat.com (Postfix) with ESMTP id BE71B2156712; Wed, 15 Aug 2018 21:57:18 +0000 (UTC) Received: by horse.redhat.com (Postfix, from userid 10451) id 5830E22425E; Wed, 15 Aug 2018 17:57:18 -0400 (EDT) Date: Wed, 15 Aug 2018 17:57:18 -0400 From: Vivek Goyal To: Yannik Sembritzki Cc: James Bottomley , Linus Torvalds , David Howells , Thomas Gleixner , Ingo Molnar , Peter Anvin , the arch/x86 maintainers , Linux Kernel Mailing List , Dave Young , Baoquan He , Justin Forbes , Peter Jones , Matthew Garrett Subject: Re: [PATCH] Fix kexec forbidding kernels signed with custom platform keys to boot Message-ID: <20180815215718.GB15952@redhat.com> References: <654fbafb-69da-cd9a-b176-7b03401e71c5@sembritzki.me> <20180815174247.GB29541@redhat.com> <20180815185812.GC29541@redhat.com> <20180815194932.GD29541@redhat.com> <1ca6772b-46e0-9d93-0e15-7cf73a0b7b3f@sembritzki.me> <1534367597.4049.21.camel@HansenPartnership.com> <2872b945-60e7-b5d1-1f20-1ae6ecfd3967@sembritzki.me> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <2872b945-60e7-b5d1-1f20-1ae6ecfd3967@sembritzki.me> User-Agent: Mutt/1.9.1 (2017-09-22) X-Scanned-By: MIMEDefang 2.78 on 10.11.54.6 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.1]); Wed, 15 Aug 2018 21:57:23 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.1]); Wed, 15 Aug 2018 21:57:23 +0000 (UTC) for IP:'10.11.54.6' DOMAIN:'int-mx06.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'vgoyal@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Aug 15, 2018 at 11:31:27PM +0200, Yannik Sembritzki wrote: > On 15.08.2018 23:13, James Bottomley wrote: > > Consider a UEFI system for which a user has taken ownership, but which > > has some signed ROMs which are UEFI secure boot verified. Simply to > > get their system to boot the user will be forced to add the ODM key to > > the UEFI db ... and I'm sure in that situation the user wouldn't want > > to trust the ODM key further than booting. > I definitely agree with this point. > > Is there any solution, except from building your own kernel, to the > scenario I described? > I think there should be. > (I've personally run into this with VirtualBox, which I IIRC couldn't > load, even though I provisioned my own PK, and signed both kernel and > VirtualBox module with my own key. I could've compiled my own kernel > with my //own key, but that is pretty impractical for most users.) Aha.., so that's your real problem. You are trying to load VirtualBox module and that will not load even if you take ownership of platform by adding your key and sign module with that key. So this patch still will not fix the problem you are facing. It is still good to fix the case of kexec/kdump broken on Fedora on secureboot machines. Thanks Vivek