Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp26738ybl; Tue, 7 Jan 2020 13:23:51 -0800 (PST) X-Google-Smtp-Source: APXvYqz91u4S3OFbgarz+9aH6XziwAivMRGPhQ4qUhXUkGj/NvwocklEaoYEIS3adTa/4D5mUz8f X-Received: by 2002:a05:6830:1e37:: with SMTP id t23mr1768396otr.16.1578432231437; Tue, 07 Jan 2020 13:23:51 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1578432231; cv=none; d=google.com; s=arc-20160816; b=IugTPApEd+T7DTvL0nvInBNnYP9dApXjEmNg64ldaPjbbPKUpJKgoH0Zwy59I8XZ40 QL/F5opdKZEvNMhqQ1P3Zs8Q+oxxKlaehZ1Df1dxbmNuuQryGO4oA69DDdSRgzdFNEAe ZuAhZPSApn3Rh9fv5SrKzz2ry6v9wlCkrslBfyKew6Vxb7XgwNIWhvjK0M5oTtqqVsxq b69Vo5SNvH6/0bBVbyMMF+ouhG5v3MC2wq/cbHwcSd+41IFQwoVfO3rArVaQ5qIXAHb+ 8BdCiqw4m+2SqQCIFi2Eejs1CSu0a5bAxvJBSKa0EzZbLCyRgm6N3BqsdT94goKnpBF+ Xarw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:date:cc:to:from:subject:message-id :dkim-signature:dkim-signature; bh=T5+8tIwHQUqLf5u0f9wWRALgFtNzZh4ySy7SgGcNTrY=; b=fRG6X+ZrfUXjFItMc7j0pd7ezbNjms/ajKKZg3nh82j+WbW0q/jk7hdHWYIyM+ccA+ UoDQ5HTIYTRJUTZdy75YXwNCa2CT7Pe2FwkoxrVA40JONXgUz4CxcFZqsw1DhyTkcaID FyReedJvA5eAV1a/103hNE8193blm7ltJdbock2TUKIn1v0u5yy9RT3FzEE+YgJqdIu5 172+92OhozzqkkGZq8E59E8cFbUTmyQ7nX9w6rbPaTEVbVlqRAZ/xhQKq0gANbJpCe4W RFc5dtlpnNCHwZb37pzoKC+iR/JvDfFMUsUfmPhq5WOyab/xem2Y1MfVDwAOMN5Dk3XF BglA== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@hansenpartnership.com header.s=20151216 header.b=dJP4nyfS; dkim=fail header.i=@hansenpartnership.com header.s=20151216 header.b=dJP4nyfS; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=hansenpartnership.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w2si584150otq.31.2020.01.07.13.23.38; Tue, 07 Jan 2020 13:23:51 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@hansenpartnership.com header.s=20151216 header.b=dJP4nyfS; dkim=fail header.i=@hansenpartnership.com header.s=20151216 header.b=dJP4nyfS; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=hansenpartnership.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727335AbgAGVXe (ORCPT + 99 others); Tue, 7 Jan 2020 16:23:34 -0500 Received: from bedivere.hansenpartnership.com ([66.63.167.143]:51488 "EHLO bedivere.hansenpartnership.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728521AbgAGVBR (ORCPT ); Tue, 7 Jan 2020 16:01:17 -0500 Received: from localhost (localhost [127.0.0.1]) by bedivere.hansenpartnership.com (Postfix) with ESMTP id 5F18A8EE105; Tue, 7 Jan 2020 13:01:16 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=hansenpartnership.com; s=20151216; t=1578430876; bh=5nkpePHUcSUhoPkX858UIhz0z07V7G0lUgNBG3ZeUKE=; h=Subject:From:To:Cc:Date:In-Reply-To:References:From; b=dJP4nyfSqEMdbel5HbM1+ys5w61xBuazOrWII0ss4Jjqy5OHi5dsbTf88scjxZ1MW ++vUvHuuRwZZMdW999ecyDAebpSRrrSbWjbHL/C6wEhZTuWt2Y0YOJuqaut0CUiotI xXf9zLynZpT4Y/NdswGb79UiN7KJBPXG6W8SBLf0= Received: from bedivere.hansenpartnership.com ([127.0.0.1]) by localhost (bedivere.hansenpartnership.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vgHvvARI9W0c; Tue, 7 Jan 2020 13:01:16 -0800 (PST) Received: from jarvis.lan (unknown [50.35.76.230]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by bedivere.hansenpartnership.com (Postfix) with ESMTPSA id 7EE488EE0F8; Tue, 7 Jan 2020 13:01:15 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=hansenpartnership.com; s=20151216; t=1578430876; bh=5nkpePHUcSUhoPkX858UIhz0z07V7G0lUgNBG3ZeUKE=; h=Subject:From:To:Cc:Date:In-Reply-To:References:From; b=dJP4nyfSqEMdbel5HbM1+ys5w61xBuazOrWII0ss4Jjqy5OHi5dsbTf88scjxZ1MW ++vUvHuuRwZZMdW999ecyDAebpSRrrSbWjbHL/C6wEhZTuWt2Y0YOJuqaut0CUiotI xXf9zLynZpT4Y/NdswGb79UiN7KJBPXG6W8SBLf0= Message-ID: <1578430874.4288.2.camel@HansenPartnership.com> Subject: Re: [PATCH] ima: make ASYMMETRIC_PUBLIC_KEY_SUBTYPE 'bool' From: James Bottomley To: Arnd Bergmann , David Howells , Herbert Xu , "David S. Miller" , Lakshmi Ramasubramanian , Mimi Zohar Cc: keyrings@vger.kernel.org, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org Date: Tue, 07 Jan 2020 13:01:14 -0800 In-Reply-To: <20200107203041.843060-1-arnd@arndb.de> References: <20200107203041.843060-1-arnd@arndb.de> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.26.6 Mime-Version: 1.0 Content-Transfer-Encoding: 7bit Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Tue, 2020-01-07 at 21:30 +0100, Arnd Bergmann wrote: > The asymmetric key subtype is only used by the key subsystem that > cannot itself be a loadable module, so when > ASYMMETRIC_PUBLIC_KEY_SUBTYPE is set to =m, it just does not get > used. It also produces a compile-time > warning: > > WARNING: modpost: missing MODULE_LICENSE() in > security/integrity/ima/ima_asymmetric_keys.o > > Make this a 'bool' symbol to avoid both problems. > > Fixes: 88e70da170e8 ("IMA: Define an IMA hook to measure keys") > Signed-off-by: Arnd Bergmann > --- > crypto/asymmetric_keys/Kconfig | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/crypto/asymmetric_keys/Kconfig > b/crypto/asymmetric_keys/Kconfig > index 1f1f004dc757..f2846293e4d5 100644 > --- a/crypto/asymmetric_keys/Kconfig > +++ b/crypto/asymmetric_keys/Kconfig > @@ -11,7 +11,7 @@ menuconfig ASYMMETRIC_KEY_TYPE > if ASYMMETRIC_KEY_TYPE > > config ASYMMETRIC_PUBLIC_KEY_SUBTYPE > - tristate "Asymmetric public-key crypto algorithm subtype" > + bool "Asymmetric public-key crypto algorithm subtype" I believe the crypto guys do like stuff to be modular. However, we've already implemented this solution: https://lore.kernel.org/linux-integrity/20200107194350.3782-2-nramas@linux.microsoft.com/ To solve the problem via an intermediate boolean config variable. James