From: Vivek Goyal <vgoyal@redhat.com>
To: "H. Peter Anvin" <hpa@zytor.com>
Cc: "xen-devel@lists.xensource.com" <xen-devel@lists.xensource.com>,
Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
Andrew Cooper <andrew.cooper3@citrix.com>,
Daniel Kiper <daniel.kiper@oracle.com>,
"x86@kernel.org" <x86@kernel.org>,
"kexec@lists.infradead.org" <kexec@lists.infradead.org>,
"linux-kernel@vger.kernel.org" <linux-kernel@vger.kernel.org>,
"virtualization@lists.linux-foundation.org"
<virtualization@lists.linux-foundation.org>,
"mingo@redhat.com" <mingo@redhat.com>,
"Eric W. Biederman" <ebiederm@xmission.com>,
Jan Beulich <JBeulich@suse.com>,
"maxim.uvarov@oracle.com" <maxim.uvarov@oracle.com>,
"tglx@linutronix.de" <tglx@linutronix.de>,
David Woodhouse <dwmw2@infradead.org>
Subject: Re: [Xen-devel] [PATCH v3 00/11] xen: Initial kexec/kdump implementation
Date: Fri, 11 Jan 2013 15:43:18 -0500 [thread overview]
Message-ID: <20130111204317.GB17126@redhat.com> (raw)
In-Reply-To: <50F07588.90902@zytor.com>
On Fri, Jan 11, 2013 at 12:26:48PM -0800, H. Peter Anvin wrote:
> >
> >And there is nothing fancy to be done for EFI and SecureBoot? Or is
> >that something that the kernel has to handle on its own (so somehow
> >passing some certificates to somewhere).
> >
>
> For EFI, no... other than passing the EFI parameters, which
> apparently is *not* currently done (David Woodhouse is working on
> it.) Secure boot is still a work in progress.
For secureboot, as a first step in that direction, I just wrote some code
to sign elf executable and be able to verify it in kernel upon exec(). I
am soon planning to post RFC code (most likely next week).
Hopefully we will be able to sign statically signed /sbin/kexec, give
it extra capability (upon signature verification) to be able to call
sys_exec().
Thanks
Vivek
_______________________________________________
kexec mailing list
kexec@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/kexec
WARNING: multiple messages have this Message-ID (diff)
From: Vivek Goyal <vgoyal@redhat.com>
To: "H. Peter Anvin" <hpa@zytor.com>
Cc: "xen-devel@lists.xensource.com" <xen-devel@lists.xensource.com>,
Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
Andrew Cooper <andrew.cooper3@citrix.com>,
Daniel Kiper <daniel.kiper@oracle.com>,
"x86@kernel.org" <x86@kernel.org>,
"kexec@lists.infradead.org" <kexec@lists.infradead.org>,
"linux-kernel@vger.kernel.org" <linux-kernel@vger.kernel.org>,
"virtualization@lists.linux-foundation.org"
<virtualization@lists.linux-foundation.org>,
"mingo@redhat.com" <mingo@redhat.com>,
"Eric W. Biederman" <ebiederm@xmission.com>,
Jan Beulich <JBeulich@suse.com>,
"maxim.uvarov@oracle.com" <maxim.uvarov@oracle.com>,
"tglx@linutronix.de" <tglx@linutronix.de>,
David Woodhouse <dwmw2@infradead.org>
Subject: Re: [Xen-devel] [PATCH v3 00/11] xen: Initial kexec/kdump implementation
Date: Fri, 11 Jan 2013 15:43:18 -0500 [thread overview]
Message-ID: <20130111204317.GB17126@redhat.com> (raw)
In-Reply-To: <50F07588.90902@zytor.com>
On Fri, Jan 11, 2013 at 12:26:48PM -0800, H. Peter Anvin wrote:
> >
> >And there is nothing fancy to be done for EFI and SecureBoot? Or is
> >that something that the kernel has to handle on its own (so somehow
> >passing some certificates to somewhere).
> >
>
> For EFI, no... other than passing the EFI parameters, which
> apparently is *not* currently done (David Woodhouse is working on
> it.) Secure boot is still a work in progress.
For secureboot, as a first step in that direction, I just wrote some code
to sign elf executable and be able to verify it in kernel upon exec(). I
am soon planning to post RFC code (most likely next week).
Hopefully we will be able to sign statically signed /sbin/kexec, give
it extra capability (upon signature verification) to be able to call
sys_exec().
Thanks
Vivek
WARNING: multiple messages have this Message-ID (diff)
From: Vivek Goyal <vgoyal@redhat.com>
To: "H. Peter Anvin" <hpa@zytor.com>
Cc: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
"Eric W. Biederman" <ebiederm@xmission.com>,
Daniel Kiper <daniel.kiper@oracle.com>,
"xen-devel@lists.xensource.com" <xen-devel@lists.xensource.com>,
Andrew Cooper <andrew.cooper3@citrix.com>,
"x86@kernel.org" <x86@kernel.org>,
"kexec@lists.infradead.org" <kexec@lists.infradead.org>,
"linux-kernel@vger.kernel.org" <linux-kernel@vger.kernel.org>,
"virtualization@lists.linux-foundation.org"
<virtualization@lists.linux-foundation.org>,
"mingo@redhat.com" <mingo@redhat.com>,
Jan Beulich <JBeulich@suse.com>,
"maxim.uvarov@oracle.com" <maxim.uvarov@oracle.com>,
"tglx@linutronix.de" <tglx@linutronix.de>,
David Woodhouse <dwmw2@infradead.org>
Subject: Re: [Xen-devel] [PATCH v3 00/11] xen: Initial kexec/kdump implementation
Date: Fri, 11 Jan 2013 15:43:18 -0500 [thread overview]
Message-ID: <20130111204317.GB17126@redhat.com> (raw)
In-Reply-To: <50F07588.90902@zytor.com>
On Fri, Jan 11, 2013 at 12:26:48PM -0800, H. Peter Anvin wrote:
> >
> >And there is nothing fancy to be done for EFI and SecureBoot? Or is
> >that something that the kernel has to handle on its own (so somehow
> >passing some certificates to somewhere).
> >
>
> For EFI, no... other than passing the EFI parameters, which
> apparently is *not* currently done (David Woodhouse is working on
> it.) Secure boot is still a work in progress.
For secureboot, as a first step in that direction, I just wrote some code
to sign elf executable and be able to verify it in kernel upon exec(). I
am soon planning to post RFC code (most likely next week).
Hopefully we will be able to sign statically signed /sbin/kexec, give
it extra capability (upon signature verification) to be able to call
sys_exec().
Thanks
Vivek
next prev parent reply other threads:[~2013-01-11 20:43 UTC|newest]
Thread overview: 187+ messages / expand[flat|nested] mbox.gz Atom feed top
2012-12-27 2:18 [PATCH v3 00/11] xen: Initial kexec/kdump implementation Daniel Kiper
2012-12-27 2:18 ` Daniel Kiper
2012-12-27 2:18 ` [PATCH v3 01/11] kexec: introduce kexec firmware support Daniel Kiper
2012-12-27 2:18 ` Daniel Kiper
2012-12-27 2:18 ` Daniel Kiper
2012-12-27 2:18 ` [PATCH v3 02/11] x86/kexec: Add extra pointers to transition page table PGD, PUD, PMD and PTE Daniel Kiper
2012-12-27 2:18 ` Daniel Kiper
2012-12-27 2:18 ` [PATCH v3 03/11] xen: Introduce architecture independent data for kexec/kdump Daniel Kiper
2012-12-27 2:18 ` Daniel Kiper
2012-12-27 2:18 ` [PATCH v3 04/11] x86/xen: Introduce architecture dependent " Daniel Kiper
2012-12-27 2:18 ` Daniel Kiper
2012-12-27 2:18 ` Daniel Kiper
2012-12-27 2:18 ` [PATCH v3 05/11] x86/xen: Register resources required by kexec-tools Daniel Kiper
2012-12-27 2:18 ` Daniel Kiper
2012-12-27 2:18 ` [PATCH v3 06/11] x86/xen: Add i386 kexec/kdump implementation Daniel Kiper
2012-12-27 2:18 ` Daniel Kiper
2012-12-27 2:18 ` [PATCH v3 07/11] x86/xen: Add x86_64 " Daniel Kiper
2012-12-27 2:18 ` Daniel Kiper
2012-12-27 2:18 ` [PATCH v3 08/11] x86/xen: Add kexec/kdump Kconfig and makefile rules Daniel Kiper
2012-12-27 2:18 ` Daniel Kiper
2012-12-27 2:18 ` [PATCH v3 09/11] x86/xen/enlighten: Add init and crash kexec/kdump hooks Daniel Kiper
2012-12-27 2:18 ` Daniel Kiper
2012-12-27 2:18 ` Daniel Kiper
2012-12-27 2:18 ` [PATCH v3 10/11] drivers/xen: Export vmcoreinfo through sysfs Daniel Kiper
2012-12-27 2:18 ` Daniel Kiper
2012-12-27 2:18 ` Daniel Kiper
2012-12-27 2:19 ` [PATCH v3 11/11] x86: Add Xen kexec control code size check to linker script Daniel Kiper
2012-12-27 2:19 ` Daniel Kiper
2012-12-27 2:19 ` Daniel Kiper
2012-12-27 18:53 ` [PATCH v3 09/11] x86/xen/enlighten: Add init and crash kexec/kdump hooks H. Peter Anvin
2012-12-27 18:53 ` H. Peter Anvin
2012-12-27 18:53 ` H. Peter Anvin
2012-12-27 2:18 ` [PATCH v3 08/11] x86/xen: Add kexec/kdump Kconfig and makefile rules Daniel Kiper
2012-12-27 2:18 ` [PATCH v3 07/11] x86/xen: Add x86_64 kexec/kdump implementation Daniel Kiper
2012-12-27 4:00 ` [PATCH v3 06/11] x86/xen: Add i386 " H. Peter Anvin
2012-12-27 4:00 ` H. Peter Anvin
2012-12-27 4:00 ` H. Peter Anvin
2012-12-27 2:18 ` Daniel Kiper
2012-12-27 2:18 ` [PATCH v3 05/11] x86/xen: Register resources required by kexec-tools Daniel Kiper
2012-12-27 2:18 ` [PATCH v3 03/11] xen: Introduce architecture independent data for kexec/kdump Daniel Kiper
2012-12-27 3:33 ` [PATCH v3 02/11] x86/kexec: Add extra pointers to transition page table PGD, PUD, PMD and PTE H. Peter Anvin
2012-12-27 3:33 ` H. Peter Anvin
2013-01-03 9:34 ` Jan Beulich
2013-01-03 9:34 ` Jan Beulich
2013-01-03 9:34 ` Jan Beulich
2013-01-04 15:15 ` Daniel Kiper
2013-01-04 15:15 ` Daniel Kiper
2013-01-04 15:15 ` Daniel Kiper
2013-01-04 16:12 ` Jan Beulich
2013-01-04 16:12 ` Jan Beulich
2013-01-04 16:12 ` Jan Beulich
2013-01-04 17:25 ` Daniel Kiper
2013-01-04 17:25 ` Daniel Kiper
2013-01-04 17:25 ` Daniel Kiper
2013-01-07 9:48 ` Jan Beulich
2013-01-07 9:48 ` Jan Beulich
2013-01-07 9:48 ` Jan Beulich
2013-01-07 12:52 ` Daniel Kiper
2013-01-07 12:52 ` Daniel Kiper
2013-01-07 12:52 ` Daniel Kiper
2013-01-07 13:05 ` Jan Beulich
2013-01-07 13:05 ` Jan Beulich
2013-01-07 13:05 ` Jan Beulich
2013-01-09 18:42 ` Daniel Kiper
2013-01-09 18:42 ` Daniel Kiper
2013-01-09 18:42 ` Daniel Kiper
2013-01-10 14:07 ` [Xen-devel] " David Vrabel
2013-01-10 14:07 ` David Vrabel
2013-01-10 14:07 ` David Vrabel
2013-01-11 13:36 ` Daniel Kiper
2013-01-11 13:36 ` Daniel Kiper
2013-01-11 13:36 ` Daniel Kiper
2012-12-27 2:18 ` Daniel Kiper
2012-12-27 4:46 ` [PATCH v3 01/11] kexec: introduce kexec firmware support Eric W. Biederman
2012-12-27 4:46 ` Eric W. Biederman
2012-12-27 4:46 ` Eric W. Biederman
2012-12-27 4:02 ` [PATCH v3 00/11] xen: Initial kexec/kdump implementation H. Peter Anvin
2012-12-27 4:02 ` H. Peter Anvin
2012-12-27 4:02 ` H. Peter Anvin
2012-12-27 7:53 ` Eric W. Biederman
2012-12-27 7:53 ` Eric W. Biederman
2012-12-27 7:53 ` Eric W. Biederman
2012-12-27 14:18 ` Andrew Cooper
2012-12-27 14:18 ` Andrew Cooper
2012-12-27 14:18 ` Andrew Cooper
2012-12-27 18:02 ` Eric W. Biederman
2012-12-27 18:02 ` Eric W. Biederman
2012-12-27 18:02 ` Eric W. Biederman
2013-01-02 11:26 ` [Xen-devel] " Andrew Cooper
2013-01-02 11:26 ` Andrew Cooper
2013-01-02 11:26 ` Andrew Cooper
2013-01-02 11:47 ` Eric W. Biederman
2013-01-02 11:47 ` Eric W. Biederman
2013-01-02 11:47 ` Eric W. Biederman
2013-01-03 9:31 ` Jan Beulich
2013-01-03 9:31 ` Jan Beulich
2013-01-03 9:31 ` Jan Beulich
2013-01-04 14:22 ` Daniel Kiper
2013-01-04 14:22 ` Daniel Kiper
2013-01-04 14:22 ` Daniel Kiper
2013-01-04 14:34 ` Konrad Rzeszutek Wilk
2013-01-04 14:34 ` Konrad Rzeszutek Wilk
2013-01-04 14:34 ` Konrad Rzeszutek Wilk
2013-01-04 14:34 ` Ian Campbell
2013-01-04 14:34 ` Ian Campbell
2013-01-04 14:34 ` Ian Campbell
2013-01-04 14:38 ` David Vrabel
2013-01-04 14:38 ` David Vrabel
2013-01-04 17:01 ` Daniel Kiper
2013-01-04 17:01 ` Daniel Kiper
2013-01-04 17:01 ` Daniel Kiper
2013-01-10 14:19 ` David Vrabel
2013-01-10 14:19 ` David Vrabel
2013-01-10 14:19 ` David Vrabel
2013-01-11 13:22 ` Daniel Kiper
2013-01-11 13:22 ` Daniel Kiper
2013-01-11 13:22 ` Daniel Kiper
2013-01-11 15:22 ` David Vrabel
2013-01-11 15:22 ` David Vrabel
2013-01-11 15:22 ` David Vrabel
2013-01-11 17:34 ` Daniel Kiper
2013-01-11 17:34 ` Daniel Kiper
2013-01-11 17:34 ` Daniel Kiper
2013-01-11 20:05 ` Eric W. Biederman
2013-01-11 20:05 ` Eric W. Biederman
2013-01-11 20:05 ` Eric W. Biederman
2013-01-04 14:38 ` David Vrabel
2013-01-04 14:41 ` Jan Beulich
2013-01-04 14:41 ` Jan Beulich
2013-01-04 14:41 ` Jan Beulich
2013-01-04 17:07 ` Daniel Kiper
2013-01-04 17:07 ` Daniel Kiper
2013-01-04 19:11 ` Konrad Rzeszutek Wilk
2013-01-04 19:11 ` Konrad Rzeszutek Wilk
2013-01-04 19:11 ` Konrad Rzeszutek Wilk
2013-01-07 10:25 ` Ian Campbell
2013-01-07 10:25 ` Ian Campbell
2013-01-07 10:46 ` Andrew Cooper
2013-01-07 10:46 ` Andrew Cooper
2013-01-07 10:46 ` Andrew Cooper
2013-01-07 10:54 ` Ian Campbell
2013-01-07 10:54 ` Ian Campbell
2013-01-07 10:54 ` Ian Campbell
2013-01-07 10:25 ` Ian Campbell
2013-01-07 12:34 ` Daniel Kiper
2013-01-07 12:34 ` Daniel Kiper
2013-01-07 12:34 ` Daniel Kiper
2013-01-07 13:49 ` Ian Campbell
2013-01-07 13:49 ` Ian Campbell
2013-01-07 13:49 ` Ian Campbell
2013-01-11 13:47 ` Daniel Kiper
2013-01-11 13:47 ` Daniel Kiper
2013-01-11 13:47 ` Daniel Kiper
2013-01-07 16:20 ` Konrad Rzeszutek Wilk
2013-01-07 16:20 ` Konrad Rzeszutek Wilk
2013-01-07 16:20 ` Konrad Rzeszutek Wilk
2013-01-11 4:16 ` Eric W. Biederman
2013-01-11 4:16 ` Eric W. Biederman
2013-01-11 4:16 ` Eric W. Biederman
2013-01-11 16:55 ` Konrad Rzeszutek Wilk
2013-01-11 16:55 ` Konrad Rzeszutek Wilk
2013-01-11 16:55 ` Konrad Rzeszutek Wilk
2013-01-11 20:26 ` H. Peter Anvin
2013-01-11 20:26 ` H. Peter Anvin
2013-01-11 20:26 ` H. Peter Anvin
2013-01-11 20:43 ` Vivek Goyal [this message]
2013-01-11 20:43 ` Vivek Goyal
2013-01-11 20:43 ` Vivek Goyal
2013-01-11 20:26 ` Eric W. Biederman
2013-01-11 20:26 ` Eric W. Biederman
2013-01-11 20:26 ` Eric W. Biederman
2013-01-11 20:52 ` Vivek Goyal
2013-01-11 20:52 ` Vivek Goyal
2013-01-11 20:52 ` Vivek Goyal
2013-01-11 21:03 ` H. Peter Anvin
2013-01-11 21:03 ` H. Peter Anvin
2013-01-11 21:03 ` H. Peter Anvin
2013-01-11 21:08 ` Vivek Goyal
2013-01-11 21:08 ` Vivek Goyal
2013-01-11 21:08 ` Vivek Goyal
2013-01-11 21:14 ` H. Peter Anvin
2013-01-11 21:14 ` H. Peter Anvin
2013-01-11 21:14 ` H. Peter Anvin
2013-01-04 17:07 ` Daniel Kiper
2013-01-02 15:27 ` Ian Campbell
2013-01-02 15:27 ` Ian Campbell
2013-01-02 15:27 ` Ian Campbell
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20130111204317.GB17126@redhat.com \
--to=vgoyal@redhat.com \
--cc=JBeulich@suse.com \
--cc=andrew.cooper3@citrix.com \
--cc=daniel.kiper@oracle.com \
--cc=dwmw2@infradead.org \
--cc=ebiederm@xmission.com \
--cc=hpa@zytor.com \
--cc=kexec@lists.infradead.org \
--cc=konrad.wilk@oracle.com \
--cc=linux-kernel@vger.kernel.org \
--cc=maxim.uvarov@oracle.com \
--cc=mingo@redhat.com \
--cc=tglx@linutronix.de \
--cc=virtualization@lists.linux-foundation.org \
--cc=x86@kernel.org \
--cc=xen-devel@lists.xensource.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.