Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp6893238imm; Tue, 24 Jul 2018 05:07:14 -0700 (PDT) X-Google-Smtp-Source: AAOMgpeCnbfpICfVx9OBbMVc9UENEdMjUi6a5xbB9nq2DQ3QTHkWfbwBdWg2Fr8qvCaWrkOw/tQf X-Received: by 2002:a17:902:1a9:: with SMTP id b38-v6mr16573510plb.89.1532434033974; Tue, 24 Jul 2018 05:07:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1532434033; cv=none; d=google.com; s=arc-20160816; b=crWaeyzWvEYe00W2Ijf6gGVqTX4l0LoIB0coNfLLt6XAkm4d1dhmopG9tBKsVlVroO nJ6N4pPXL2NMpdBboDuGbFRlH2UTi8ZcmkAfK+hv8imXlNnvhSrRkItb8ZGWg7PTve2Y 2mDBm2f9ADtONCjbPYrmgf/Cw13uhIpUwzT7N51bF7SvFIH3SVE0hVESYxLwvV1IzGBI 3iMCIi8+MtOyvjHHOhO1TQoPZBXeL0+sHTcAl6rPn8LIYdNIokP1TkCTlV4ehH2PzCgq Hi0sbNz6UZNHalp5qZEa0G8+G+CGsowoW+mRiqncuzTaLo4BnHALaUgqc9aHYuVBhm0+ hOyA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=mk/VRue28v8/177VWgICqguFAYexqVbRg+7UW3lSXIg=; b=bkPMA/5WLFO7TGVIunMxffbXcsrzYgd/3tyqPF5EOnMatra1AAA9ZZ7/dHfLVMJIA/ he3DpZKnvXARE4fzAH4ttnJug1xLUoASU4x4MQYAIiPV7brnzu8Iev1x2uXgCjVerzyG rMevA6ftJ5PmaJchDOYmrNoqydDO3HpHqi5B2Gdilq9WOwYix/y42i2LHGU7bThIwZQq wqBfAa+M7gCoYjqtbEqKZYrJanVPAAgMOiLHgMuVxGRyPusBCP8g34TnevAW/DeyUfxV MpShjsFo2Rkgex6CV2qwNcDvkat1GuCWjbO6jvV3FQvctpoaLSSiPGRhhLfQggJ0JmBY v3Cg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t16-v6si11383484pga.442.2018.07.24.05.06.59; Tue, 24 Jul 2018 05:07:13 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388486AbeGXNLy (ORCPT + 99 others); Tue, 24 Jul 2018 09:11:54 -0400 Received: from atrey.karlin.mff.cuni.cz ([195.113.26.193]:52289 "EHLO atrey.karlin.mff.cuni.cz" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388289AbeGXNLy (ORCPT ); Tue, 24 Jul 2018 09:11:54 -0400 Received: by atrey.karlin.mff.cuni.cz (Postfix, from userid 512) id 40B4C80558; Tue, 24 Jul 2018 14:05:42 +0200 (CEST) Date: Tue, 24 Jul 2018 14:05:41 +0200 From: Pavel Machek To: Yu Chen Cc: Oliver Neukum , "Rafael J . Wysocki" , Eric Biggers , "Lee, Chun-Yi" , Theodore Ts o , Stephan Mueller , Denis Kenzior , linux-pm@vger.kernel.org, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, "Gu, Kookoo" , "Zhang, Rui" Subject: Re: [PATCH 0/4][RFC v2] Introduce the in-kernel hibernation encryption Message-ID: <20180724120541.GE26036@amd> References: <20180718202235.GA4132@amd> <20180718235851.GA22170@sandybridge-desktop> <20180719110149.GA4679@amd> <20180719132003.GA30981@sandybridge-desktop> <20180720102532.GA20284@amd> <1532346156.3057.11.camel@suse.com> <20180723122227.GA30092@amd> <20180723163848.GB4503@sandybridge-desktop> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="PPYy/fEw/8QCHSq3" Content-Disposition: inline In-Reply-To: <20180723163848.GB4503@sandybridge-desktop> User-Agent: Mutt/1.5.23 (2014-03-12) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org --PPYy/fEw/8QCHSq3 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Hi! > > > Yes. But you are objecting to encryption in kernel space at all, > > > aren't you? > >=20 > > I don't particulary love the idea of doing hibernation encryption in > > the kernel, correct. > >=20 > > But we have this weird thing called secure boot, some people seem to > > want. So we may need some crypto in the kernel -- but I'd like > > something that works with uswsusp, too. Plus, it is mandatory that > > patch explains what security guarantees they want to provide against > > what kinds of attacks... > >=20 > > Lee, Chun-Yi's patch seemed more promising. Pavel > >=20 > The only difference between Chun-Yi's hibernation encrytion solution > and our solution is that his strategy encrypts the snapshot from sratch,= =20 > and ours encryts each page before them going to block device. The benefit > of his solution is that the snapshot can be encrypt in kernel first > thus the uswsusp is allowed to read it to user space even kernel > is lock down. And I had a discussion with Chun-Yi that we can use > his snapshot solution to make uswsusp happy, and we share the crypto > help code and he can also use our user provided key for his signature. > >From this point of view, our code are actually the same, except that > we can help clean up the code and also enhance some encrytion process > for his solution. I don't know why you don't like encryption in kernel,= =20 > because from my point of view, without encryption hibernation in kernel, > uswsusp could not be enabled if kernel is lock down : -) Or do I miss som= ething? We can do encryption in kernel if really needed, but I don't have to like it, do I? :-). I understand what Chun-Yi's code is trying to do. I can't say the same about yours. Pavel --=20 (english) http://www.livejournal.com/~pavelmachek (cesky, pictures) http://atrey.karlin.mff.cuni.cz/~pavel/picture/horses/blo= g.html --PPYy/fEw/8QCHSq3 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Digital signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iEYEARECAAYFAltXFhUACgkQMOfwapXb+vLnWwCeJAvOynLyjmdkzUL2tSyyomge OtoAn1Q7/LfOdO5IWHWO83ULyQXgfb4p =bAyw -----END PGP SIGNATURE----- --PPYy/fEw/8QCHSq3--