Not to generate hashes for initrd or modules if module.sig_enforce=1 …#294
Open
persmule wants to merge 1 commit intolinuxboot:masterfrom
Open
Not to generate hashes for initrd or modules if module.sig_enforce=1 …#294persmule wants to merge 1 commit intolinuxboot:masterfrom
persmule wants to merge 1 commit intolinuxboot:masterfrom
Conversation
Collaborator
|
The kernel option prevents How would you see this working in practice? What are the tools like for manipulating those signatures? |
Contributor
Author
|
The option Debian has a sub-project to release its kernel image in this form. The project however seems to be experimental currently, though it once released in Jessie. |
…is present Digital signatures could be embedded into linux kernel modules, and a kernel with a certificate embedded in can load them only if their signature is valid, when booted with parameter "module.sig_enforce=1" present. In such situation, for bootloader (e.g. Heads) to verify the hashes of initrd or modules may become unnecessary, and leaving them to the kernel may ease the updating of initrd from GNU/Linux OSes. Option CONFIG_BOOT_RESPECT_MOD_SIG_ENFORCE is used to enable this feature. Test passed on my x230 atop flammit's coreboot-4.6 branch.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
…is present
Digital signatures could be embedded into linux kernel modules, and a kernel
with a certificate embedded in can load them only if their signature is valid,
when booted with parameter "module.sig_enforce=1" present.
In such situation, for bootloader (e.g. Heads) to verify the hashes of initrd
or modules may become unnecessary, and leaving them to the kernel may ease the
updating of initrd from GNU/Linux OSes.
Option CONFIG_BOOT_RESPECT_MOD_SIG_ENFORCE is used to enable this feature.
Test passed on my x230 atop flammit's coreboot-4.6 branch.