All of lore.kernel.org
 help / color / mirror / Atom feed
From: Nayna <nayna@linux.vnet.ibm.com>
To: Michal Suchanek <msuchanek@suse.de>, keyrings@vger.kernel.org
Cc: Mimi Zohar <zohar@linux.ibm.com>,
	David Howells <dhowells@redhat.com>,
	Paul Mackerras <paulus@samba.org>,
	Alexander Gordeev <agordeev@linux.ibm.com>,
	linux-s390@vger.kernel.org,
	Herbert Xu <herbert@gondor.apana.org.au>,
	Baoquan He <bhe@redhat.com>,
	Christian Borntraeger <borntraeger@de.ibm.com>,
	James Morris <jmorris@namei.org>,
	Lakshmi Ramasubramanian <nramas@linux.microsoft.com>,
	Christian Borntraeger <borntraeger@linux.ibm.com>,
	"Serge E. Hallyn" <serge@hallyn.com>,
	Vasily Gorbik <gor@linux.ibm.com>, Rob Herring <robh@kernel.org>,
	Heiko Carstens <hca@linux.ibm.com>,
	linux-crypto@vger.kernel.org,
	Dmitry Kasatkin <dmitry.kasatkin@gmail.com>,
	Hari Bathini <hbathini@linux.ibm.com>,
	Daniel Axtens <dja@axtens.net>, Philipp Rudo <prudo@redhat.com>,
	Frank van der Linden <fllinden@amazon.com>,
	kexec@lists.infradead.org, linux-kernel@vger.kernel.org,
	Luis Chamberlain <mcgrof@kernel.org>,
	Sven Schnelle <svens@linux.ibm.com>,
	linux-security-module@vger.kernel.org,
	Jessica Yu <jeyu@kernel.org>,
	linux-integrity@vger.kernel.org, linuxppc-dev@lists.ozlabs.org,
	"David S. Miller" <davem@davemloft.net>,
	Thiago Jung Bauermann <bauerman@linux.ibm.com>,
	buendgen@de.ibm.com
Subject: Re: [PATCH v2 2/6] powerpc/kexec_file: Add KEXEC_SIG support.
Date: Sat, 11 Dec 2021 18:37:57 -0500	[thread overview]
Message-ID: <bd7e0273-375c-2d67-72b4-d157bac76b42@linux.vnet.ibm.com> (raw)
In-Reply-To: <8b30a3c6a4e845eb77f276298424811897efdebf.1637862358.git.msuchanek@suse.de>

[-- Attachment #1: Type: text/plain, Size: 1282 bytes --]


On 11/25/21 13:02, Michal Suchanek wrote:
> Copy the code from s390x
>
> Signed-off-by: Michal Suchanek<msuchanek@suse.de>
> ---
>   arch/powerpc/Kconfig        | 11 +++++++++++
>   arch/powerpc/kexec/elf_64.c | 36 ++++++++++++++++++++++++++++++++++++
>   2 files changed, 47 insertions(+)
>
> diff --git a/arch/powerpc/Kconfig b/arch/powerpc/Kconfig
> index ac0c515552fd..ecc1227a77f1 100644
> --- a/arch/powerpc/Kconfig
> +++ b/arch/powerpc/Kconfig
> @@ -561,6 +561,17 @@ config KEXEC_FILE
>   config ARCH_HAS_KEXEC_PURGATORY
>   	def_bool KEXEC_FILE
>
> +config KEXEC_SIG
> +	bool "Verify kernel signature during kexec_file_load() syscall"
> +	depends on KEXEC_FILE && MODULE_SIG_FORMAT
> +	help
> +	  This option makes kernel signature verification mandatory for
> +	  the kexec_file_load() syscall.
> +

Since powerpc also supports IMA_ARCH_POLICY for kernel image signature 
verification, please include the following:

"An alternative implementation for the powerpc arch is 
IMA_ARCH_POLICY. It verifies the appended kernel image signature and 
additionally includes both the signed and unsigned file hashes in the 
IMA measurement list, extends the IMA PCR in the TPM, and prevents 
blacklisted binary kernel images from being kexec'd"

Thanks & Regards,

     - Nayna

[-- Attachment #2: Type: text/html, Size: 2442 bytes --]

  parent reply	other threads:[~2021-12-12 23:03 UTC|newest]

Thread overview: 68+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2021-11-25 18:02 [PATCH v2 0/6] KEXEC_SIG with appended signature Michal Suchanek
2021-11-25 18:02 ` Michal Suchanek
2021-11-25 18:02 ` Michal Suchanek
2021-11-25 18:02 ` [PATCH v2 1/6] s390/kexec_file: Don't opencode appended signature check Michal Suchanek
2021-11-25 18:02   ` Michal Suchanek
2021-11-25 18:02   ` Michal Suchanek
2021-11-25 18:02 ` [PATCH v2 2/6] powerpc/kexec_file: Add KEXEC_SIG support Michal Suchanek
2021-11-25 18:02   ` Michal Suchanek
2021-11-25 18:02   ` Michal Suchanek
2021-12-09  1:51   ` Nayna
2021-12-09  9:21     ` Michal Suchánek
2021-12-09  9:21       ` Michal Suchánek
2021-12-09  9:21       ` Michal Suchánek
2021-12-09 21:53       ` Nayna
2021-12-09 21:53         ` Nayna
2021-12-09 21:53         ` Nayna
2021-12-11 23:37   ` Nayna [this message]
2021-12-13  0:46   ` Nayna
2021-12-13  0:46     ` Nayna
2021-12-13  0:46     ` Nayna
2021-12-13 18:18     ` Michal Suchánek
2021-12-13 18:18       ` Michal Suchánek
2021-12-13 18:18       ` Michal Suchánek
2021-11-25 18:02 ` [PATCH v2 3/6] kexec_file: Don't opencode appended signature verification Michal Suchanek
2021-11-25 18:02   ` Michal Suchanek
2021-11-25 18:02   ` Michal Suchanek
2021-11-25 18:02 ` [PATCH v2 4/6] module: strip the signature marker in the verification function Michal Suchanek
2021-11-25 18:02   ` Michal Suchanek
2021-11-25 18:02   ` Michal Suchanek
2021-12-07 16:11   ` Philipp Rudo
2021-12-07 16:11     ` Philipp Rudo
2021-12-07 16:11     ` Philipp Rudo
2021-11-25 18:02 ` [PATCH v2 5/6] module: Use key_being_used_for for log messages in verify_appended_signature Michal Suchanek
2021-11-25 18:02   ` Michal Suchanek
2021-11-25 18:02   ` Michal Suchanek
2021-11-25 18:02 ` [PATCH v2 6/6] module: Move duplicate mod_check_sig users code to mod_parse_sig Michal Suchanek
2021-11-25 18:02   ` Michal Suchanek
2021-11-25 18:02   ` Michal Suchanek
2021-12-07 16:10   ` Philipp Rudo
2021-12-07 16:10     ` Philipp Rudo
2021-12-07 16:10     ` Philipp Rudo
2021-12-13 18:06     ` Michal Suchánek
2021-12-13 18:06       ` Michal Suchánek
2021-12-13 18:06       ` Michal Suchánek
2021-11-30 15:28 ` [PATCH v2 0/6] KEXEC_SIG with appended signature Heiko Carstens
2021-11-30 15:28   ` Heiko Carstens
2021-11-30 15:28   ` Heiko Carstens
2021-12-01  2:37 ` Baoquan He
2021-12-01  2:37   ` Baoquan He
2021-12-01  2:37   ` Baoquan He
2021-12-01 11:48   ` Michal Suchánek
2021-12-01 11:48     ` Michal Suchánek
2021-12-01 11:48     ` Michal Suchánek
2021-12-07 16:10 ` Philipp Rudo
2021-12-07 16:10   ` Philipp Rudo
2021-12-07 16:10   ` Philipp Rudo
2021-12-07 17:32   ` Michal Suchánek
2021-12-07 17:32     ` Michal Suchánek
2021-12-07 17:32     ` Michal Suchánek
2021-12-08  9:54     ` Philipp Rudo
2021-12-08  9:54       ` Philipp Rudo
2021-12-08  9:54       ` Philipp Rudo
2021-12-09  1:50 ` Nayna
2021-12-09  1:50   ` Nayna
2021-12-09  1:50   ` Nayna
2021-12-09 14:57   ` Michal Suchánek
2021-12-09 14:57     ` Michal Suchánek
2021-12-09 14:57     ` Michal Suchánek

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=bd7e0273-375c-2d67-72b4-d157bac76b42@linux.vnet.ibm.com \
    --to=nayna@linux.vnet.ibm.com \
    --cc=agordeev@linux.ibm.com \
    --cc=bauerman@linux.ibm.com \
    --cc=bhe@redhat.com \
    --cc=borntraeger@de.ibm.com \
    --cc=borntraeger@linux.ibm.com \
    --cc=buendgen@de.ibm.com \
    --cc=davem@davemloft.net \
    --cc=dhowells@redhat.com \
    --cc=dja@axtens.net \
    --cc=dmitry.kasatkin@gmail.com \
    --cc=fllinden@amazon.com \
    --cc=gor@linux.ibm.com \
    --cc=hbathini@linux.ibm.com \
    --cc=hca@linux.ibm.com \
    --cc=herbert@gondor.apana.org.au \
    --cc=jeyu@kernel.org \
    --cc=jmorris@namei.org \
    --cc=kexec@lists.infradead.org \
    --cc=keyrings@vger.kernel.org \
    --cc=linux-crypto@vger.kernel.org \
    --cc=linux-integrity@vger.kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux-s390@vger.kernel.org \
    --cc=linux-security-module@vger.kernel.org \
    --cc=linuxppc-dev@lists.ozlabs.org \
    --cc=mcgrof@kernel.org \
    --cc=msuchanek@suse.de \
    --cc=nramas@linux.microsoft.com \
    --cc=paulus@samba.org \
    --cc=prudo@redhat.com \
    --cc=robh@kernel.org \
    --cc=serge@hallyn.com \
    --cc=svens@linux.ibm.com \
    --cc=zohar@linux.ibm.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.