Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp2422030imm; Thu, 21 Jun 2018 12:16:26 -0700 (PDT) X-Google-Smtp-Source: ADUXVKL+xUlLSJ6OV2soouWIm0LLiXPqDIoH6sUXj+MAaAp6f69vQXXFXCLHIlOACbrM0NSxZ31s X-Received: by 2002:a17:902:52ee:: with SMTP id a101-v6mr29575606pli.131.1529608586073; Thu, 21 Jun 2018 12:16:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1529608586; cv=none; d=google.com; s=arc-20160816; b=Vi9uQQ+MIBkqDWzxjzcVepauk5+pyq7d2dNW3kpD+yMz5sciK2/ADAE3WG2qrwjEkF +E6ay/Fa9UbZYdtoi7t63FupjW2MNmbuGxEOB08GrjxhTSeHewMxECfXNpaMqaJBzUXO qNbIV5fqm5v9m3VcLcC7yJYoYDmVRD1EPbUj5zAHKuUXy5VDKZ1JV1iO+kUDiqjLorMM mDCbCjOIbGsfvxFyCXIq04eMbWBmfAyv9m7qEoFdk8+tLez7JtPvE8IXVNSmdlmUwIjQ LXbZ1BnW9R+oOyAyEYeKdo/GBI8vEUJSxpqfi/qPnJv7qlUzynYawYO3cPIqzE86wbF5 3YJw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=yuL4AaOdWh/ACz6whqDPDAOMiqsSqyYO1/f5TfvL3f0=; b=d5Z61CjwksMvJ/fOc+obG2kt+EiR31WipKNpodJ5MvxxIkBi2GMT4ihkw3GOd1RoMa tbZ0sWhdlAyITwIHbsRqeL0KaG9Va58wVmh8hUhU9OjOsnzS/n5NRvkZ2rlvv1E0uNCr sXim7Kb2hjzM86DVdwtCDjwWWZNyPIpAhOdMfgebogsuQo8O3Tzwy+kmV1xv+/ZpFgcB 2oBbK0lxiZnkwAuf+vZ+xQDXvBDEa+OejBVSX3rJXs/MsK8ihldn7RBvnMVrP2/8qNNW kTh9+lwvTOR3ylhJulRV0iS42BXrY89WX4CjaiT9h5zAD4enVcnV9nZP10lO6njRlEzz WLcg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u70-v6si4546584pgc.150.2018.06.21.12.16.11; Thu, 21 Jun 2018 12:16:26 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754260AbeFUTOq (ORCPT + 99 others); Thu, 21 Jun 2018 15:14:46 -0400 Received: from atrey.karlin.mff.cuni.cz ([195.113.26.193]:39498 "EHLO atrey.karlin.mff.cuni.cz" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754071AbeFUTOp (ORCPT ); Thu, 21 Jun 2018 15:14:45 -0400 Received: by atrey.karlin.mff.cuni.cz (Postfix, from userid 512) id E9FEC805A3; Thu, 21 Jun 2018 21:14:43 +0200 (CEST) Date: Thu, 21 Jun 2018 21:14:43 +0200 From: Pavel Machek To: "Rafael J. Wysocki" Cc: Chen Yu , Len Brown , "Lee, Chun-Yi" , Borislav Petkov , Linux PM , Linux Kernel Mailing List Subject: Re: [PATCH 0/3][RFC] Introduce the in-kernel hibernation encryption Message-ID: <20180621191443.GB14623@amd> References: <20180621085332.GA21807@amd> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="uQr8t48UFsdbeI+V" Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.23 (2014-03-12) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org --uQr8t48UFsdbeI+V Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Thu 2018-06-21 14:08:40, Rafael J. Wysocki wrote: > On Thu, Jun 21, 2018 at 10:53 AM, Pavel Machek wrote: > > Hi! > > > >> As security becomes more and more important, we add the in-kernel > >> encryption support for hibernation. > > ... > >> There was a discussion on the mailing list on whether this key should > >> be derived in kernel or in user space. And it turns out to be generati= ng > >> the key by user space is more acceptable[1]. So this patch set is divi= ded > >> into two parts: > >> 1. The hibernation snapshot encryption in kernel space, > >> 2. the key derivation implementation in user space. > > > > uswsusp was created so that this kind of stuff could be kept in > > userspace. You get graphical progress bar (etc) too. As you already > > have userspace component for key derivation, I see no advantages to > > uswsusp. > > > > If you have some, please explain. >=20 > Not having to transfer plain text kernel memory to user space is one > IMO. Well, AFAICT in this case userland has the key and encrypted data are on disk. That does not seem to be improvement. > Besides, the user space part of what you are calling uswsusp has not > been actively maintained for years now and honestly I don't know how > many users of it there are. I'd assume distros want progress bars so they still use it? Anyway, there's solution for encrypted hibernation. If Intel wants to invent different solution for that, and put it into kernel, they should explain what the advantages are, relative to existing solution. Best regards, Pavel --=20 (english) http://www.livejournal.com/~pavelmachek (cesky, pictures) http://atrey.karlin.mff.cuni.cz/~pavel/picture/horses/blo= g.html --uQr8t48UFsdbeI+V Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Digital signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iEYEARECAAYFAlsr+SMACgkQMOfwapXb+vKDngCfXJJv3RBXD2AhfIHRs03Y2uhR osYAoJ6Irtf8oJPZDOtvLwfAcgsM1EMA =yyF8 -----END PGP SIGNATURE----- --uQr8t48UFsdbeI+V--