[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1533636259.7912.2.camel@suse.com>
Date: Tue, 07 Aug 2018 12:04:19 +0200
From: Oliver Neukum <oneukum@...e.com>
To: Yu Chen <yu.c.chen@...el.com>
Cc: Pavel Machek <pavel@....cz>,
"Rafael J . Wysocki" <rafael.j.wysocki@...el.com>,
Eric Biggers <ebiggers@...gle.com>,
"Lee, Chun-Yi" <jlee@...e.com>, Theodore Ts o <tytso@....edu>,
Stephan Mueller <smueller@...onox.de>,
Denis Kenzior <denkenz@...il.com>, linux-pm@...r.kernel.org,
linux-crypto@...r.kernel.org, linux-kernel@...r.kernel.org,
"Gu, Kookoo" <kookoo.gu@...el.com>,
"Zhang, Rui" <rui.zhang@...el.com>
Subject: Re: [PATCH 0/4][RFC v2] Introduce the in-kernel hibernation
encryption
On Di, 2018-08-07 at 15:38 +0800, Yu Chen wrote:
> > As STD affects the whole machine it must require root rights.
> > So I cannot see how you can talk about a session belonging
> > to a user. Please explain.
> >
>
> The case is for physical access, not the 'user' in OS.
Well, yes, but Secure Boot does not guard against anybody
booting or halting the machine. It limits what you can
boot by a chain of trust.
I think you are trying to add a feature to Secure Boot.
Regards
Oliver
Powered by blists - more mailing lists