lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 4 Sep 2013 20:12:09 +0000 From: Matthew Garrett <matthew.garrett@...ula.com> To: "jerry.hoemann@...com" <jerry.hoemann@...com> CC: "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>, "linux-efi@...r.kernel.org" <linux-efi@...r.kernel.org>, "keescook@...omium.org" <keescook@...omium.org>, "hpa@...or.com" <hpa@...or.com>, kexec <kexec@...ts.infradead.org>, "vgoyal@...hat.com" <vgoyal@...hat.com> Subject: Re: [PATCH V3 08/11] kexec: Disable at runtime if the kernel enforces module loading restrictions On Wed, 2013-09-04 at 14:09 -0600, jerry.hoemann@...com wrote: > On Tue, Sep 03, 2013 at 07:50:15PM -0400, Matthew Garrett wrote: > > kexec permits the loading and execution of arbitrary code in ring 0, which > > is something that module signing enforcement is meant to prevent. It makes > > sense to disable kexec in this situation. > > > > Signed-off-by: Matthew Garrett <matthew.garrett@...ula.com> > > > Matthew, > > Disabling kexec will disable kdump, correct? Yes. > Are there plans to enable kdump on a system where secure > boot is enabled? Yes, Vivek Goyal (cc:ed) is working on that. -- Matthew Garrett <matthew.garrett@...ula.com>
Powered by blists - more mailing lists