efi: Lock down the kernel if booted in secure boot mode
authorBen Hutchings <ben@decadent.org.uk>
Tue, 10 Sep 2019 10:54:28 +0000 (11:54 +0100)
committerSalvatore Bonaccorso <carnil@debian.org>
Tue, 6 May 2025 19:33:52 +0000 (21:33 +0200)
commit548722d614aebcc8883cd6269a88b76a531de997
treeffb3e0a92b1e8661cb493393159a130c8475adad
parent53656e3ded4121da771a61a840c1a75136606afc
efi: Lock down the kernel if booted in secure boot mode

Based on an earlier patch by David Howells, who wrote the following
description:

> UEFI Secure Boot provides a mechanism for ensuring that the firmware will
> only load signed bootloaders and kernels.  Certain use cases may also
> require that all kernel modules also be signed.  Add a configuration option
> that to lock down the kernel - which includes requiring validly signed
> modules - if the kernel is secure-booted.

Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
[Salvatore Bonaccorso: After fixing https://bugs.debian.org/956197 the
help text for LOCK_DOWN_IN_EFI_SECURE_BOOT was adjusted to mention that
lockdown is triggered in integrity mode (https://bugs.debian.org/1025417)]
Signed-off-by: Salvatore Bonaccorso <carnil@debian.org>
Gbp-Pq: Topic features/all/lockdown
Gbp-Pq: Name efi-lock-down-the-kernel-if-booted-in-secure-boot-mo.patch
arch/x86/kernel/setup.c
drivers/firmware/efi/secureboot.c
include/linux/security.h
security/lockdown/Kconfig
security/lockdown/lockdown.c