Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp1646637ybx; Thu, 31 Oct 2019 13:45:18 -0700 (PDT) X-Google-Smtp-Source: APXvYqyCI+Or3ZxyrISLy3WLQS2kBasHRDmXOwANyacbQSdRNOqqzgtAgbM2JpUIJnfNdoeh0eRD X-Received: by 2002:a05:6402:2d4:: with SMTP id b20mr8865058edx.103.1572554718203; Thu, 31 Oct 2019 13:45:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1572554718; cv=none; d=google.com; s=arc-20160816; b=Hs2o+AFs2zvKoy94HRGBKoVynByJ+TsOJCPsG+aYp1yPeJq0c4XlzCK6C9SAnNrNG+ wJdTmKNOczC0+3Whc/rla0wJ/mbVz7i+fogjM7dzp9BtV6kQ8HWjRmC7IHfNLIydyjrp AGQG0DHHAf9JTJOh7L0svWN20gqDhGy8UmbYoX5Jza3H73dyCGtMdDvHB4K/6ahcaW6b ZIHU3UvXEIYdJSLdhkkcvANHJONCgZr1g5T9xAyAJ94OpZ9oCvim171dMfOBSJ0pldA6 W9uEWf34SzJZBZCR0oBBz3s9tdM1FJtxEtHOmHsg2IO70fPTZR2p2sKtPQm+E1+CYYJL g46A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=vOJqq9wkfv8g2WmlyPyp/kH7++vMuNeeESHrt5K4Kiw=; b=wD1t3Nn8ywiTGK4KuTt02Lp8ytzG/eNmJ/kFxD6qnRxHYqQs91svhwS+yWr/SgJZc7 MGOpCvtu4hvX1Ti0LFRn+qCqprjrbgmg37sVAgdEvx9i06E4kkTAquVQbs/K6xoXY/sX xFW0XgaZMVV8sUsOoAN66idyqxn2jSuRZ226Kye+Z4XDiMRrHLVEiPs3e0PG+nww8Dhi b25MdpbvWUmM/AWX4g3atjSrg9+EDLf9EUOQcvNG/8o9rSmf7Od9wDUz3nN6y+wJg8Qb 4YSRrZEHNA2PWlbQMPtao28hUMPIUX4cHIRvBY31IsSFZcZ9Hko5+udBzCqfTswkr5fE c3RA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=fAHP+83S; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g6si6162537edk.210.2019.10.31.13.44.54; Thu, 31 Oct 2019 13:45:18 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=fAHP+83S; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728323AbfJaP1e (ORCPT + 99 others); Thu, 31 Oct 2019 11:27:34 -0400 Received: from mail.kernel.org ([198.145.29.99]:47914 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726664AbfJaP1e (ORCPT ); Thu, 31 Oct 2019 11:27:34 -0400 Received: from localhost (unknown [91.217.168.176]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 9DC7620873; Thu, 31 Oct 2019 15:27:32 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1572535653; bh=+yVZ1MjIGAdWwgwwfL8MAh8Z053rKZd9qegV46RGdoM=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=fAHP+83SfGYxiTmv7PduCRvKVUCHWGYmqh5FQAzyAv4HTcZASqjRHoGCFIU23INqG uZi0J4/VSFeOL63l83GmPejEx2UVwEfaEmISV3bKXx6FKwLp9CbBtlX1OAa2CFTIs2 llGGloPfo1CWC2oBqX/PRTrBbJtN/zXSVI+T7Ivo= Date: Thu, 31 Oct 2019 11:27:30 -0400 From: Sasha Levin To: Lakshmi Ramasubramanian Cc: Mimi Zohar , dhowells@redhat.com, matthewgarrett@google.com, jamorris@linux.microsoft.com, linux-kernel@vger.kernel.org, linux-integrity@vger.kernel.org, linux-security-module@vger.kernel.org, keyrings@vger.kernel.org, prsriva@linux.microsoft.com Subject: Re: [PATCH v3 1/9] KEYS: Defined an IMA hook to measure keys on key create or update Message-ID: <20191031152730.GQ1554@sasha-vm> References: <20191031011910.2574-1-nramas@linux.microsoft.com> <20191031011910.2574-2-nramas@linux.microsoft.com> <1572523831.5028.43.camel@linux.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1; format=flowed Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Oct 31, 2019 at 08:08:48AM -0700, Lakshmi Ramasubramanian wrote: >On 10/31/19 5:10 AM, Mimi Zohar wrote: > >>On Wed, 2019-10-30 at 18:19 -0700, Lakshmi Ramasubramanian wrote: >>>Asymmetric keys used for verifying file signatures or certificates >>>are currently not included in the IMA measurement list. >>> >>>This patch defines a new IMA hook namely ima_post_key_create_or_update() >>>to measure asymmetric keys. >> >>It's not enough for the kernel to be able to compile the kernel after >>applying all the patches in a patch set. ?After applying each patch, >>the kernel should build properly, otherwise it is not bi-sect safe. >> ?Refer to "3) Separate your changes" of >>"Documentation/process/submitting-patches.rst. > >I started with kernel version 5.3 for this patch set. >I applied Nayna's process_buffer_measurement() patch and then built my >changes on top of that. >This patch has no other dependency as far as I know. > >Are you seeing a build break after applying this patch alone? > >(PATCH v3 1/9) KEYS: Defined an IMA hook to measure keys on key create >or update I couldn't even apply this patch: Nayna's series (v10) doesn't apply on top of 5.3 to begin with, and while it does apply on mainline, this first patch wouldn't apply on top. -- Thanks, Sasha