Jeremi Piotrowski 8393a4cf4b sys-kernel/coreos-sources: Add secure-boot-lockdown patches
Shim signing for secure boot requires enforcing lockdown. There are three ways
we can do this:

1. setting CONFIG_LOCK_DOWN_KERNEL_FORCE_INTEGRITY=y. This unconditionally
   prevents loading unsigned kernel modules.
2. setting lockdown=integrity on the kernel cmdline from a signed Grub
   configuration. This would be OK, but Grub is not updated in the field right
   now, so we'd be stuck.
3. incorporate the secure-boot-lockdown patches that other major distros are using.

We're going to go with 3, because this only enforces lockdown when secure boot
is actually enabled and lets us change approach later on.

These patches are sourced from Debian:
https://sources.debian.org/src/linux/6.6.13-1~bpo12%2B1/debian/patches/features/all/lockdown/.

Signed-off-by: Jeremi Piotrowski <jpiotrowski@microsoft.com>
2024-09-17 11:01:06 +02:00
..