From: Michael Ellerman Subject: Re: [PATCH v2 0/6] Appended signatures support for IMA appraisal Date: Tue, 13 Jun 2017 20:18:51 +1000 Message-ID: <87tw3kgph0.fsf@concordia.ellerman.id.au> References: <1496886555-10082-1-git-send-email-bauerman@linux.vnet.ibm.com> <87d1adihhk.fsf@concordia.ellerman.id.au> <87efusyi3s.fsf@linux.vnet.ibm.com> Mime-Version: 1.0 Content-Type: text/plain Cc: linux-security-module@vger.kernel.org, Jessica Yu , linuxppc-dev@lists.ozlabs.org, Rusty Russell , linux-kernel@vger.kernel.org, "David S. Miller" , David Howells , "AKASHI\, Takahiro" , keyrings@vger.kernel.org, linux-crypto@vger.kernel.org, James Morris , Dmitry Kasatkin , linux-ima-devel@lists.sourceforge.net, Herbert Xu , Mimi Zohar , David Woodhouse , "Serge E. Hallyn" To: Thiago Jung Bauermann Return-path: Received: from ozlabs.org ([103.22.144.67]:46415 "EHLO ozlabs.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751895AbdFMKSz (ORCPT ); Tue, 13 Jun 2017 06:18:55 -0400 In-Reply-To: <87efusyi3s.fsf@linux.vnet.ibm.com> Sender: linux-crypto-owner@vger.kernel.org List-ID: Thiago Jung Bauermann writes: > Michael Ellerman writes: > >> Thiago Jung Bauermann writes: >> >>> On the OpenPOWER platform, secure boot and trusted boot are being >>> implemented using IMA for taking measurements and verifying signatures. >> >> I still want you to implement arch_kexec_kernel_verify_sig() as well :) > > Yes, I will implement it! We are still working on loading the public > keys for kernel signing from the firmware into a kernel keyring, so > there's not much point in implementing arch_kexec_kernel_verify_sig > without having that first. OK. What's the ETA on those patches? cheers