Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1757561AbZLDWqp (ORCPT ); Fri, 4 Dec 2009 17:46:45 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1757413AbZLDWqn (ORCPT ); Fri, 4 Dec 2009 17:46:43 -0500 Received: from terminus.zytor.com ([198.137.202.10]:32829 "EHLO terminus.zytor.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1757233AbZLDWqn (ORCPT ); Fri, 4 Dec 2009 17:46:43 -0500 Message-ID: <4B19912B.8050009@zytor.com> Date: Fri, 04 Dec 2009 14:46:03 -0800 From: "H. Peter Anvin" User-Agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.1.4pre) Gecko/20090922 Fedora/3.0-3.9.b4.fc12 Thunderbird/3.0b4 MIME-Version: 1.0 To: Pavel Machek CC: "Cihula, Joseph" , "Wang, Shane" , "Rafael J. Wysocki" , "linux-kernel@vger.kernel.org" , Ingo Molnar , "arjan@linux.intel.com" , "andi@firstfloor.org" , "chrisw@sous-sol.org" , "jmorris@namei.org" , "jbeulich@novell.com" , "peterm@redhat.com" Subject: Re: [PATCH] intel_txt: add s3 userspace memory integrity verification References: <4A9CE0B2.5060608@intel.com> <4ABF2B50.6070106@intel.com> <20091004185801.GC1378@ucw.cz> <037F493892196B458CD3E193E8EBAD4F01F03277DF@pdsmsx502.ccr.corp.intel.com> <20091204081933.GE1540@ucw.cz> <4F65016F6CB04E49BFFA15D4F7B798D9AEDDD4C5@orsmsx506.amr.corp.intel.com> <20091204221553.GD32314@elf.ucw.cz> <4B198C18.7040500@zytor.com> <20091204223913.GG32314@elf.ucw.cz> In-Reply-To: <20091204223913.GG32314@elf.ucw.cz> Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 798 Lines: 20 On 12/04/2009 02:39 PM, Pavel Machek wrote: > > Having "security" technology that silently fails with funny bootloader > is pretty bad, I'd say. > Yes, but this wouldn't be a silent failure -- such a boot loader wouldn't be able to boot tboot itself either, nor would be able to boot 32-bit kernels (which, in fact, not all boot loaders can); the tboot boot process in fact in many ways treats tboot itself as a 32-bit primary kernel, with the Linux kernel as a secondary kernel. So, this particular failure would not be silent by any means. -hpa -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/