1. Computers
  2. Display Drivers
  3. Graphics Cards
  4. Memory
  5. Motherboards
  6. Processors
  7. Software
  8. Storage
  9. Operating Systems


Facebook RSS Twitter Twitter Google Plus


Phoronix Test Suite

OpenBenchmarking.org

Secure Boot Breaks Kexec, Hibernate Support On Linux

Linux Kernel

Published on 28 January 2013 12:09 PM EST
Written by Michael Larabel in Linux Kernel
17 Comments

A set of "controversial" patches were published by Matthew Garrett this morning for the Linux kernel. One of the patch series will disable the kernel's support for kexec and hibernate support when running in a UEFI Secure Boot environment.

Hibernation power management support needs to be disabled since right now the Linux kernel has no way to verify the resume image when returning from hibernate. With this limitation of the Linux kernel not being able to verify the kernel image upon resume, it compromises the Secure Boot trust model. Ultimately, the Linux kernel will need to be changed so that it can work with signed hibernate images.

The kexec support needs to be disabled when running in Secure Boot since the kernel execution mechanism could be used as an attack vector by a malicious user. Using kexec could bypass the Secure Boot trust model to load a modified kernel. Ultimately, the Linux kernel will need to be improved to support signed kexec payloads.

The kexec and hibernate disabling patches can be found on the Linux kernel mailing list in a patch series entitled by Matthew as Secure Boot: More controversial changes. "These patches break functionality that people rely on without providing any functional equivalent, so I'm not suggesting that they be merged as-is. kexec allows trivial circumvention of the trust model (it's trivially equivalent to permitting module loading, for instance) and hibernation allows similar attacks (disable swap, write a pre-formed resume image to swap, reboot). The hibernation patch also shows up a different issue - some userspace drops all capabilities, resulting in things that userspace expects to work no longer working. This seems like an unsurprising result, but breaking userspace is bad and so it'd be nice to figure out if there's another way to handle this."

Matthew, now working at Nebula rather than Red Hat, also posted a set of 15 patches for Secure Boot policy support. "Secure boot makes it possible to ensure that the on-disk representation of the kernel hasn't been modified. This can be sidestepped if the in-memory representation can be trivially altered. We currently have a large number of interfaces that permit root to perform effectively arbitrary modifications to the kernel, so this patchset introduces a new capability ("CAP_COMPROMISE_KERNEL") that controls whether or not these features are available. The aim is for this to be useful in any other situations where kernel integrity can be assured by some other mechanism rather than special casing UEFI."

About The Author
Michael Larabel is the principal author of Phoronix.com and founded the web-site in 2004 with a focus on enriching the Linux hardware experience and being the largest web-site devoted to Linux hardware reviews, particularly for products relevant to Linux gamers and enthusiasts but also commonly reviewing servers/workstations and embedded Linux devices. Michael has written more than 10,000 articles covering the state of Linux hardware support, Linux performance, graphics hardware drivers, and other topics. Michael is also the lead developer of the Phoronix Test Suite, Phoromatic, and OpenBenchmarking.org automated testing software. He can be followed via and or contacted via .
Latest Articles & Reviews
  1. Samsung 850 EVO SSD Linux Benchmarks
  2. Kubuntu 15.04 Is Turning Out Quite Nice, Good Way To Try Out The Latest KDE
  3. 5-Way Linux Distribution Comparison On The Core i3 NUC
  4. OCZ ARC 100 Linux SSD Benchmarks
  5. Lenovo ThinkPad X1 Carbon Works Great As A Linux Ultrabook
  6. Transcend SSD370 256GB
Latest Linux News
  1. AMD Will Release Mantle Programming Guide, API Reference This Month
  2. Unreal Engine Made Free By Epic Games
  3. Qt 5.5 Alpha Is Getting Close, But Still Behind Schedule
  4. OpenBSD Sponsors Work For Better Browser Security
  5. Improved ODF Reading Support Comes To KDE's Calligra
  6. Another Step Closer On The New Linux Benchmarking Test Farm
  7. Confirmed: Vulkan Is The Next-Gen Graphics API
  8. Kdenlive Ported To Qt5/KF5, Coming To KDE Applications 15.04
  9. HTC & Valve Partnered Up For The Steam VR Headset
  10. 8cc: A Small C11 Compiler
Most Viewed News This Week
  1. Screenshots Of The GNOME 3.16 Changes
  2. More Proof That Allwinner Is Violating The GPL
  3. The Tremendous Features Of Fedora 22
  4. Krita 2.9 Released, Their Biggest Release Ever
  5. A Single UEFI Executable With The Linux Kernel, Initrd & Command Line
  6. Linux 4.0 Doesn't Have The Weirdest Codename
  7. Canonical Comes Up With Its Own FUSE Filesystem For Linux Containers
  8. Firefox 36 Brings Full HTTP/2 Support
%%CLICK_URL_UNESC%%