[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CACdnJuvE-MbD42AJTrio=0RaN8SaWo-RHHt21z=3an1vtjTFhA@mail.gmail.com>
Date: Mon, 24 Jun 2019 17:02:29 -0700
From: Matthew Garrett <mjg59@...gle.com>
To: Mimi Zohar <zohar@...ux.ibm.com>
Cc: Dave Young <dyoung@...hat.com>, James Morris <jmorris@...ei.org>,
Jiri Bohac <jbohac@...e.cz>,
Linux API <linux-api@...r.kernel.org>,
kexec@...ts.infradead.org,
Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
David Howells <dhowells@...hat.com>,
LSM List <linux-security-module@...r.kernel.org>,
Andy Lutomirski <luto@...nel.org>
Subject: Re: [PATCH V31 07/25] kexec_file: Restrict at runtime if the kernel
is locked down
On Mon, Jun 24, 2019 at 2:27 PM Mimi Zohar <zohar@...ux.ibm.com> wrote:
> I agree with Dave. There should be a stub lockdown function to
> prevent enforcing lockdown when it isn't enabled.
Sorry, when what isn't enabled? If no LSMs are enforcing lockdown then
the check will return 0. The goal here is for distributions to be able
to ship a kernel that has CONFIG_KEXEC_SIG=y, CONFIG_KEXEC_SIG_FORCE=n
and at runtime be able to enforce a policy that requires signatures on
kexec payloads.
Powered by blists - more mailing lists