Received: by 2002:a05:6a10:1a4d:0:0:0:0 with SMTP id nk13csp1786667pxb; Wed, 9 Feb 2022 04:36:19 -0800 (PST) X-Google-Smtp-Source: ABdhPJyWbzdJCJPQW2gVm4yMCz4naAaXh5WGNJDefXXGbXdqep+Qss7yIxSq0/VCHSpmNELcykEh X-Received: by 2002:a17:903:1212:: with SMTP id l18mr1894018plh.45.1644410179427; Wed, 09 Feb 2022 04:36:19 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1644410179; cv=none; d=google.com; s=arc-20160816; b=GAq9VzmmRDUHeCmR2jfDhdojTVoql2UjHzXGOQzn0chscy7hoggsGoi5nZNBI8ulPs N31ItC5YoFmFv1EAB70Ts4vmoJAZ6NpFTkJCwP+rl2b12RN5nQAINAG/W+VlfhlSMz+4 cvsPE8u+DwjEhn5PR9piihMk8ONxqcljEpY2JpdYoxdQnMZ5RzfeMQ2xDJO9E7rCD/Gr 69I5uYHagDTvo4O1gJxLRy8TJ2stfRoNVrT8u3gFMtIyhulj8WKiI9RB1xSVIaxLRV5C 3L8pknc0ZSaBp+ykMafwe+hYDEJmbXK5j9BU+VXbLFmSAZY+pg4zpHULOjUlSWLu9x+M VgwQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:message-id:date:references :in-reply-to:subject:cc:to:from:dkim-signature; bh=4LBu3b4sqV42JJCmT2RvLfUf47/jOabbpGeO17DWNxg=; b=DSGq7gqpQhWOdnRFvLbfR4dJlay6Jv/CTSvce+fkN8DwaMQsZ4dV1Y3rFZZwlcGu8S VgHDpzhTndhUaKpLarTtDYUzVtnSMTet+ZOliPUT/peLGHfOu2jYYpWfypLQi+YsrjPO lcKSmYiWV3wr93IX4qJgSpiMsqR2BSGx9g7HbdYJ5tVq91EJDMfWXXfo9ezcNGm1WWg2 OBojBxw/hjspimgweTllZaTA3AaN4Y9H3b2EMyBWXGb7kNVv7/P2Pi9WitxyG27LJwyA Q/0Vh2aAd5cZmKSsQLbe1aNvgDpd1+VGO+2HKZ74I5hb0MxW9hsFLr+ZZ0DExjZ2+E4r P1oA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ellerman.id.au header.s=201909 header.b=VpsRKjTO; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id t3si1895675pgf.267.2022.02.09.04.36.18 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 09 Feb 2022 04:36:19 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@ellerman.id.au header.s=201909 header.b=VpsRKjTO; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 34C8DE0984F9; Wed, 9 Feb 2022 02:23:32 -0800 (PST) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230243AbiBIFOg (ORCPT + 99 others); Wed, 9 Feb 2022 00:14:36 -0500 Received: from gmail-smtp-in.l.google.com ([23.128.96.19]:43416 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230197AbiBIEqF (ORCPT ); Tue, 8 Feb 2022 23:46:05 -0500 Received: from gandalf.ozlabs.org (mail.ozlabs.org [IPv6:2404:9400:2221:ea00::3]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 0DBB3C061578; Tue, 8 Feb 2022 20:46:09 -0800 (PST) Received: from authenticated.ozlabs.org (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mail.ozlabs.org (Postfix) with ESMTPSA id 4JtnQ60Fbjz4xNq; Wed, 9 Feb 2022 15:46:06 +1100 (AEDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ellerman.id.au; s=201909; t=1644381966; bh=4LBu3b4sqV42JJCmT2RvLfUf47/jOabbpGeO17DWNxg=; h=From:To:Cc:Subject:In-Reply-To:References:Date:From; b=VpsRKjTOAuTL4YVFAXqLwlQNTVN2PnFaRNMaDdmekioS+Axih9wqxwuuZXvgF38GV BtlQrTRz2IAQ9QmpujmvPxeEPJBOCKQODVTttnlXUqTA3LNbZRxgAs7FMDYFW7UAzp hNZMjJnJRRBuEQsm/scDVGFl3F1CnxD/UQBFK7HXqfl2FNQM9xzVfhzm6vaSQz1Oui eoQoylhJFl+fMdpPBEWkx0gW9z1nkkfG9Ee4wjyAlpTXz2FASBp3lrsVq34UIp87iV WiyxUBkfMXtIWN/O5RXzGc5uFFcCQQWtagfWwXYs+Xzz/Ci/ixvZSY69tgrW3wLzm6 VxO4WOGIITJUw== From: Michael Ellerman To: Luis Chamberlain , Michal Suchanek , David Howells , Aaron Tomlin Cc: keyrings@vger.kernel.org, linux-crypto@vger.kernel.org, linux-integrity@vger.kernel.org, kexec@lists.infradead.org, Philipp Rudo , Mimi Zohar , Nayna , Rob Herring , linux-s390@vger.kernel.org, Vasily Gorbik , Lakshmi Ramasubramanian , Heiko Carstens , Jessica Yu , linux-kernel@vger.kernel.org, David Howells , Christian Borntraeger , Paul Mackerras , Hari Bathini , Alexander Gordeev , linuxppc-dev@lists.ozlabs.org, Frank van der Linden , Thiago Jung Bauermann , Daniel Axtens , buendgen@de.ibm.com, Benjamin Herrenschmidt , Christian Borntraeger , Herbert Xu , "David S. Miller" , Dmitry Kasatkin , James Morris , "Serge E. Hallyn" , Sven Schnelle , Baoquan He , linux-security-module@vger.kernel.org Subject: Re: [PATCH v5 0/6] KEXEC_SIG with appended signature In-Reply-To: References: Date: Wed, 09 Feb 2022 15:46:05 +1100 Message-ID: <87pmnwlkaa.fsf@mpe.ellerman.id.au> MIME-Version: 1.0 Content-Type: text/plain X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Luis Chamberlain writes: > On Tue, Jan 11, 2022 at 12:37:42PM +0100, Michal Suchanek wrote: >> Hello, >> >> This is a refresh of the KEXEC_SIG series. >> >> This adds KEXEC_SIG support on powerpc and deduplicates the code dealing >> with appended signatures in the kernel. >> >> powerpc supports IMA_KEXEC but that's an exception rather than the norm. >> On the other hand, KEXEC_SIG is portable across platforms. >> >> For distributions to have uniform security features across platforms one >> option should be used on all platforms. >> >> Thanks >> >> Michal >> >> Previous revision: https://lore.kernel.org/linuxppc-dev/cover.1637862358.git.msuchanek@suse.de/ >> Patched kernel tree: https://github.com/hramrach/kernel/tree/kexec_sig >> >> Michal Suchanek (6): >> s390/kexec_file: Don't opencode appended signature check. >> powerpc/kexec_file: Add KEXEC_SIG support. >> kexec_file: Don't opencode appended signature verification. >> module: strip the signature marker in the verification function. >> module: Use key_being_used_for for log messages in >> verify_appended_signature >> module: Move duplicate mod_check_sig users code to mod_parse_sig > > What tree should this go through? I'd prefer if over through modules > tree as it can give a chance for Aaron Tomlin to work with this for his > code refactoring of kernel/module*.c to kernel/module/ Yeah that's fine by me, the arch changes are pretty minimal and unlikely to conflict much. cheers