Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp3083772imu; Fri, 18 Jan 2019 04:37:16 -0800 (PST) X-Google-Smtp-Source: ALg8bN4ACy7BgAQy9V/fe9b4UPz40cCctqMd1i5AV2VHxY2ucA667CcjIOQ71eMgWvsyDUcQw+7E X-Received: by 2002:a63:66c6:: with SMTP id a189mr17531677pgc.167.1547815036315; Fri, 18 Jan 2019 04:37:16 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1547815036; cv=none; d=google.com; s=arc-20160816; b=SkhQA7b0HGh4nsyQnIh5Tceim3gWm5v6IFfDmtO9ebFss6tlBBY3oajxjOU5M7FXSc hyopPejc2o/p55m9F8Ndw9JCPLW3E5/K0YA69OSwQoap7FQlDwCRbIW/DF3Ze4oJCZfv Zs+e+7nLu0DCFwNU8MikalfylM3duYxuun+fxZEqy8xAqfO6cw5zDpYNi+qcKWu72w8o VmOQSPC25A2rx51UNUmgNGzahE3a0ifmO3trqw/ua3HSfnLrXX9IojM+DAvhhgVOhiUX Q62DlWgl0iykvsCOF/b0UQdcFwuNM56cEAmOBfP0dowqBl+S1AHep6M21AEzNwlWhq4L CfvQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=hsklqiQ3YhEB+4xJ3aMmEKWX7zURQWrbgKHJAiZKgJE=; b=Iw0gprUvIoyy0pMPqR/0iLNDus6sif6sNfnOgmYnx7bp7PtLYaIjy5mXqUF+mL7Dqj 3qG1tklVlc5MDqvrxU31EkxECbJm1vfs8wc95sGLyRXi2NV9Y7YnnG+2FedJidyJA3Ia xLCq7TFswh8VyK49+lIvMLKMkJaIAWKLFB4VXhbR6w8me1gWFmnCSBV6BN2+G3oI64Df JUXL82T1MzeyFnTx9olZAVZilCFOiwoN1gFuNIRp7SBTmY0eSUZMwqFur3DWQ+P36IMb E6vrApZdBGuRVkucDWIqEClMrZT4tFUEomO2JohiCwN506+W0k4a2uIpg40oBeiTL9BB /WwA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u13si4278677plq.268.2019.01.18.04.37.00; Fri, 18 Jan 2019 04:37:16 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727675AbfARMet (ORCPT + 99 others); Fri, 18 Jan 2019 07:34:49 -0500 Received: from mx1.redhat.com ([209.132.183.28]:50384 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726065AbfARMet (ORCPT ); Fri, 18 Jan 2019 07:34:49 -0500 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.phx2.redhat.com [10.5.11.13]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 9DE8289AE6; Fri, 18 Jan 2019 12:34:47 +0000 (UTC) Received: from dhcp-128-65.nay.redhat.com (ovpn-12-21.pek2.redhat.com [10.72.12.21]) by smtp.corp.redhat.com (Postfix) with ESMTPS id E80D3608C1; Fri, 18 Jan 2019 12:34:41 +0000 (UTC) Date: Fri, 18 Jan 2019 20:34:37 +0800 From: Dave Young To: Mimi Zohar Cc: Kairui Song , linux-kernel@vger.kernel.org, dhowells@redhat.com, dwmw2@infradead.org, jwboyer@fedoraproject.org, keyrings@vger.kernel.org, jmorris@namei.org, serge@hallyn.com, bauerman@linux.ibm.com, ebiggers@google.com, nayna@linux.ibm.com, linux-integrity@vger.kernel.org, kexec@lists.infradead.org Subject: Re: [PATCH v4 0/2] let kexec_file_load use platform keyring to verify the kernel image Message-ID: <20190118123437.GA30929@dhcp-128-65.nay.redhat.com> References: <20190118091733.29940-1-kasong@redhat.com> <1547812432.3982.55.camel@linux.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <1547812432.3982.55.camel@linux.ibm.com> User-Agent: Mutt/1.9.5 (2018-04-13) X-Scanned-By: MIMEDefang 2.79 on 10.5.11.13 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.26]); Fri, 18 Jan 2019 12:34:48 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 01/18/19 at 06:53am, Mimi Zohar wrote: > On Fri, 2019-01-18 at 17:17 +0800, Kairui Song wrote: > > This patch series adds a .platform_trusted_keys in system_keyring as the > > reference to .platform keyring in integrity subsystem, when platform > > keyring is being initialized it will be updated. So other component could > > use this keyring as well. > > Kairui, when people review patches, the comments could be specific, > but are normally generic. ?My review included a couple of generic > suggestions - not to use "#ifdef" in C code (eg. is_enabled), use the > term "preboot" keys, and remove any references to "other components". > > After all the wording suggestions I've made, you are still saying, "So > other components could use this keyring as well".??Really?! ?How the > platform keyring will be used in the future, is up to you and others > to convince Linus. ?At least for now, please limit its usage to > verifying the PE signed kernel image. ?If this patch set needs to be > reposted, please remove all references to "other components". > > Dave/David, are you ok with Kairui's usage of "#ifdef's"? ?Dave, you > Acked the original post. ?Can I include it? ?Can we get some > additional Ack's on these patches? It is better to update patch to use IS_ENABLED in patch 1/2 as well. Other than that, for kexec part I'm fine with an ack. Thanks Dave