[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20180301231511.4dd1e79f@canb.auug.org.au>
Date: Thu, 1 Mar 2018 23:15:11 +1100
From: Stephen Rothwell <sfr@...b.auug.org.au>
To: David Howells <dhowells@...hat.com>
Cc: jmorris@...ei.org, jforbes@...hat.com, mjg59@...gle.com,
linux-security-module@...r.kernel.org, linux-efi@...r.kernel.org,
linux-kernel@...r.kernel.org, mtk.manpages@...il.com
Subject: Re: linux-next: UEFI Secure boot lockdown patchset
Hi David,
On Thu, 01 Mar 2018 11:06:55 +0000 David Howells <dhowells@...hat.com> wrote:
>
> Can you pull the following branch into linux-next please? It does three
> things:
>
> (1) It restricts various accesses userspace may make upon the kernel when the
> kernel is locked down.
>
> (2) It engages the lockdown if UEFI Secure Boot mode is detected.
>
> (3) It passes the UEFI Secure Boot mode indication across kexec.
>
> The restrictions include:
>
> - Enforcing the use of module signatures
> - Enforcing the use of kexec image signatures
> - Requring IMA to use secure boot rules
> - Disabling:
> - The kexec_load() syscall
> - Use of /dev/{mem,kmem,port,kcore}
> - Hibernation
> - PCI BAR access
> - Direct I/O port access
> - Preventing direct port specification in drivers:
> - SCSI EATA
> - TIOCSSERIAL
> - Module parameters
> - Restricting:
> - MSR access
> - Certain ACPI features
> - kprobes
> - BPF
> - Perf
> - Debugfs
>
> The aim of the restrictions is twofold:
>
> (1) Prevent userspace from altering the kernel image directly (eg. by
> /dev/mem) or indirectly (eg. by manipulating a device to do DMA);
>
> (2) Prevent userspace from accessing crypto data stored in the kernel
> (eg. filesystem keys).
>
> A warning is logged if a restriction is triggered for which I've written a
> manpage that is referenced in the message (see attached).
Added from tomorrow. I actually used this url:
git://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs.git#efi-lock-down
Thanks for adding your subsystem tree as a participant of linux-next. As
you may know, this is not a judgement of your code. The purpose of
linux-next is for integration testing and to lower the impact of
conflicts between subsystems in the next merge window.
You will need to ensure that the patches/commits in your tree/series have
been:
* submitted under GPL v2 (or later) and include the Contributor's
Signed-off-by,
* posted to the relevant mailing list,
* reviewed by you (or another maintainer of your subsystem tree),
* successfully unit tested, and
* destined for the current or next Linux merge window.
Basically, this should be just what you would send to Linus (or ask him
to fetch). It is allowed to be rebased if you deem it necessary.
--
Cheers,
Stephen Rothwell
sfr@...b.auug.org.au
Content of type "application/pgp-signature" skipped
Powered by blists - more mailing lists