Re: [PATCH v1] mpt3sas: Add support for Non-secure Aero and Sea PCI IDs

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Sreekanth,

> Broadcom adapters participate in a Secure Boot process, where every
> piece of FW is digitally signed by Broadcom and is checked for a valid
> signature.  If any piece of our adapter FW fails this signature check,
> it is possible the FW has been tampered with and the adapter should
> not be used.  Our driver should not make any additional access to the
> “invalid/tampered” adapter because the FW is not valid (could be
> malicious FW). This type of detection is added into latest Aero and
> Sea family adapters h/w.

While I appreciate the intent, I would still like there to be an option
to permit using the adapter. I am concerned about users being unable to
boot their system due to this if, for whatever reason, these validation
checks fail. Maybe there is limited risk of that happening since this is
restricted to Aero and Sea adapters. But I am still concerned about
enforcing policy decisions like this in the kernel.

-- 
Martin K. Petersen	Oracle Linux Engineering




[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [SCSI Target Devel]     [Linux SCSI Target Infrastructure]     [Kernel Newbies]     [IDE]     [Security]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux ATA RAID]     [Linux IIO]     [Samba]     [Device Mapper]

  Powered by Linux