[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <alpine.LFD.2.20.1710210322320.9435@t440>
Date: Sat, 21 Oct 2017 03:22:41 +0400 (+04)
From: James Morris <james.l.morris@...cle.com>
To: David Howells <dhowells@...hat.com>
cc: linux-security-module@...r.kernel.org, gnomes@...rguk.ukuu.org.uk,
linux-efi@...r.kernel.org, matthew.garrett@...ula.com,
gregkh@...uxfoundation.org, linux-kernel@...r.kernel.org,
jforbes@...hat.com
Subject: Re: [PATCH 05/27] kexec: Disable at runtime if the kernel is locked
down
On Thu, 19 Oct 2017, David Howells wrote:
> From: Matthew Garrett <matthew.garrett@...ula.com>
>
> kexec permits the loading and execution of arbitrary code in ring 0, which
> is something that lock-down is meant to prevent. It makes sense to disable
> kexec in this situation.
>
> This does not affect kexec_file_load() which can check for a signature on the
> image to be booted.
>
> Signed-off-by: Matthew Garrett <matthew.garrett@...ula.com>
> Signed-off-by: David Howells <dhowells@...hat.com>
> Acked-by: Dave Young <dyoung@...hat.com>
> cc: kexec@...ts.infradead.org
Reviewed-by: James Morris <james.l.morris@...cle.com>
--
James Morris
<james.l.morris@...cle.com>
Powered by blists - more mailing lists