All of lore.kernel.org
 help / color / mirror / Atom feed
From: "H. Peter Anvin" <hpa@zytor.com>
To: Vivek Goyal <vgoyal@redhat.com>
Cc: "xen-devel@lists.xensource.com" <xen-devel@lists.xensource.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	Daniel Kiper <daniel.kiper@oracle.com>,
	"x86@kernel.org" <x86@kernel.org>,
	"kexec@lists.infradead.org" <kexec@lists.infradead.org>,
	"linux-kernel@vger.kernel.org" <linux-kernel@vger.kernel.org>,
	"virtualization@lists.linux-foundation.org"
	<virtualization@lists.linux-foundation.org>,
	David Howells <dhowells@redhat.com>,
	"mingo@redhat.com" <mingo@redhat.com>,
	"Eric W. Biederman" <ebiederm@xmission.com>,
	Jan Beulich <JBeulich@suse.com>,
	"maxim.uvarov@oracle.com" <maxim.uvarov@oracle.com>,
	"tglx@linutronix.de" <tglx@linutronix.de>
Subject: Re: [Xen-devel] [PATCH v3 00/11] xen: Initial kexec/kdump implementation
Date: Fri, 11 Jan 2013 13:03:41 -0800	[thread overview]
Message-ID: <50F07E2D.6010602@zytor.com> (raw)
In-Reply-To: <20130111205232.GC17126@redhat.com>

On 01/11/2013 12:52 PM, Vivek Goyal wrote:
> 
> Eric,
> 
> In a private conversation, David Howells suggested why not pass kernel
> signature in a segment to kernel and kernel can do the verification.
> 
> /sbin/kexec signature is verified by kernel at exec() time. Then
> /sbin/kexec just passes one signature segment (after regular segment) for
> each segment being loaded. The segments which don't have signature,
> are passed with section size 0. And signature passing behavior can be
> controlled by one new kexec flag.
> 
> That way /sbin/kexec does not have to worry about doing any verification
> by itself. In fact, I am not sure how it can do the verification when
> crypto libraries it will need are not signed (assuming they are not
> statically linked in).
> 
> What do you think about this idea?
> 

A signed /sbin/kexec would realistically have to be statically linked,
at least in the short term; otherwise the libraries and ld.so would need
verification as well.

Now, that *might* very well have some real value -- there are certainly
users out there who would very much want only binaries signed with
specific keys to get run on their system.

	-hpa



_______________________________________________
kexec mailing list
kexec@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/kexec

WARNING: multiple messages have this Message-ID (diff)
From: "H. Peter Anvin" <hpa@zytor.com>
To: Vivek Goyal <vgoyal@redhat.com>
Cc: "Eric W. Biederman" <ebiederm@xmission.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
	Daniel Kiper <daniel.kiper@oracle.com>,
	"xen-devel@lists.xensource.com" <xen-devel@lists.xensource.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	"x86@kernel.org" <x86@kernel.org>,
	"kexec@lists.infradead.org" <kexec@lists.infradead.org>,
	"linux-kernel@vger.kernel.org" <linux-kernel@vger.kernel.org>,
	"virtualization@lists.linux-foundation.org" 
	<virtualization@lists.linux-foundation.org>,
	"mingo@redhat.com" <mingo@redhat.com>,
	Jan Beulich <JBeulich@suse.com>,
	"maxim.uvarov@oracle.com" <maxim.uvarov@oracle.com>,
	"tglx@linutronix.de" <tglx@linutronix.de>,
	David Howells <dhowells@redhat.com>
Subject: Re: [Xen-devel] [PATCH v3 00/11] xen: Initial kexec/kdump implementation
Date: Fri, 11 Jan 2013 13:03:41 -0800	[thread overview]
Message-ID: <50F07E2D.6010602@zytor.com> (raw)
In-Reply-To: <20130111205232.GC17126@redhat.com>

On 01/11/2013 12:52 PM, Vivek Goyal wrote:
> 
> Eric,
> 
> In a private conversation, David Howells suggested why not pass kernel
> signature in a segment to kernel and kernel can do the verification.
> 
> /sbin/kexec signature is verified by kernel at exec() time. Then
> /sbin/kexec just passes one signature segment (after regular segment) for
> each segment being loaded. The segments which don't have signature,
> are passed with section size 0. And signature passing behavior can be
> controlled by one new kexec flag.
> 
> That way /sbin/kexec does not have to worry about doing any verification
> by itself. In fact, I am not sure how it can do the verification when
> crypto libraries it will need are not signed (assuming they are not
> statically linked in).
> 
> What do you think about this idea?
> 

A signed /sbin/kexec would realistically have to be statically linked,
at least in the short term; otherwise the libraries and ld.so would need
verification as well.

Now, that *might* very well have some real value -- there are certainly
users out there who would very much want only binaries signed with
specific keys to get run on their system.

	-hpa



  parent reply	other threads:[~2013-01-11 21:04 UTC|newest]

Thread overview: 187+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2012-12-27  2:18 [PATCH v3 00/11] xen: Initial kexec/kdump implementation Daniel Kiper
2012-12-27  2:18 ` Daniel Kiper
2012-12-27  2:18 ` [PATCH v3 01/11] kexec: introduce kexec firmware support Daniel Kiper
2012-12-27  2:18 ` Daniel Kiper
2012-12-27  2:18   ` Daniel Kiper
2012-12-27  2:18   ` [PATCH v3 02/11] x86/kexec: Add extra pointers to transition page table PGD, PUD, PMD and PTE Daniel Kiper
2012-12-27  2:18   ` Daniel Kiper
2012-12-27  2:18     ` Daniel Kiper
2012-12-27  2:18     ` [PATCH v3 03/11] xen: Introduce architecture independent data for kexec/kdump Daniel Kiper
2012-12-27  2:18       ` Daniel Kiper
2012-12-27  2:18       ` [PATCH v3 04/11] x86/xen: Introduce architecture dependent " Daniel Kiper
2012-12-27  2:18         ` Daniel Kiper
2012-12-27  2:18         ` [PATCH v3 05/11] x86/xen: Register resources required by kexec-tools Daniel Kiper
2012-12-27  2:18           ` Daniel Kiper
2012-12-27  2:18           ` [PATCH v3 06/11] x86/xen: Add i386 kexec/kdump implementation Daniel Kiper
2012-12-27  2:18             ` Daniel Kiper
2012-12-27  2:18             ` [PATCH v3 07/11] x86/xen: Add x86_64 " Daniel Kiper
2012-12-27  2:18             ` Daniel Kiper
2012-12-27  2:18               ` Daniel Kiper
2012-12-27  2:18               ` [PATCH v3 08/11] x86/xen: Add kexec/kdump Kconfig and makefile rules Daniel Kiper
2012-12-27  2:18               ` Daniel Kiper
2012-12-27  2:18                 ` Daniel Kiper
2012-12-27  2:18                 ` [PATCH v3 09/11] x86/xen/enlighten: Add init and crash kexec/kdump hooks Daniel Kiper
2012-12-27  2:18                 ` Daniel Kiper
2012-12-27  2:18                   ` Daniel Kiper
2012-12-27  2:18                   ` [PATCH v3 10/11] drivers/xen: Export vmcoreinfo through sysfs Daniel Kiper
2012-12-27  2:18                   ` Daniel Kiper
2012-12-27  2:18                     ` Daniel Kiper
2012-12-27  2:19                     ` [PATCH v3 11/11] x86: Add Xen kexec control code size check to linker script Daniel Kiper
2012-12-27  2:19                       ` Daniel Kiper
2012-12-27  2:19                     ` Daniel Kiper
2012-12-27 18:53                   ` [PATCH v3 09/11] x86/xen/enlighten: Add init and crash kexec/kdump hooks H. Peter Anvin
2012-12-27 18:53                     ` H. Peter Anvin
2012-12-27 18:53                     ` H. Peter Anvin
2012-12-27  4:00             ` [PATCH v3 06/11] x86/xen: Add i386 kexec/kdump implementation H. Peter Anvin
2012-12-27  4:00               ` H. Peter Anvin
2012-12-27  4:00               ` H. Peter Anvin
2012-12-27  2:18           ` Daniel Kiper
2012-12-27  2:18         ` [PATCH v3 05/11] x86/xen: Register resources required by kexec-tools Daniel Kiper
2012-12-27  2:18       ` [PATCH v3 04/11] x86/xen: Introduce architecture dependent data for kexec/kdump Daniel Kiper
2012-12-27  2:18     ` [PATCH v3 03/11] xen: Introduce architecture independent " Daniel Kiper
2012-12-27  3:33     ` [PATCH v3 02/11] x86/kexec: Add extra pointers to transition page table PGD, PUD, PMD and PTE H. Peter Anvin
2012-12-27  3:33       ` H. Peter Anvin
2013-01-03  9:34     ` Jan Beulich
2013-01-03  9:34       ` Jan Beulich
2013-01-03  9:34       ` Jan Beulich
2013-01-04 15:15       ` Daniel Kiper
2013-01-04 15:15         ` Daniel Kiper
2013-01-04 15:15         ` Daniel Kiper
2013-01-04 16:12         ` Jan Beulich
2013-01-04 16:12           ` Jan Beulich
2013-01-04 16:12           ` Jan Beulich
2013-01-04 17:25           ` Daniel Kiper
2013-01-04 17:25             ` Daniel Kiper
2013-01-04 17:25             ` Daniel Kiper
2013-01-07  9:48             ` Jan Beulich
2013-01-07  9:48               ` Jan Beulich
2013-01-07 12:52               ` Daniel Kiper
2013-01-07 12:52                 ` Daniel Kiper
2013-01-07 12:52                 ` Daniel Kiper
2013-01-07 13:05                 ` Jan Beulich
2013-01-07 13:05                   ` Jan Beulich
2013-01-07 13:05                   ` Jan Beulich
2013-01-09 18:42                   ` Daniel Kiper
2013-01-09 18:42                   ` Daniel Kiper
2013-01-09 18:42                     ` Daniel Kiper
2013-01-07  9:48             ` Jan Beulich
2013-01-10 14:07         ` [Xen-devel] " David Vrabel
2013-01-10 14:07           ` David Vrabel
2013-01-10 14:07           ` David Vrabel
2013-01-11 13:36           ` Daniel Kiper
2013-01-11 13:36             ` Daniel Kiper
2013-01-11 13:36             ` Daniel Kiper
2012-12-27  4:46   ` [PATCH v3 01/11] kexec: introduce kexec firmware support Eric W. Biederman
2012-12-27  4:46     ` Eric W. Biederman
2012-12-27  4:46     ` Eric W. Biederman
2012-12-27  4:02 ` [PATCH v3 00/11] xen: Initial kexec/kdump implementation H. Peter Anvin
2012-12-27  4:02   ` H. Peter Anvin
2012-12-27  4:02   ` H. Peter Anvin
2012-12-27  7:53   ` Eric W. Biederman
2012-12-27  7:53     ` Eric W. Biederman
2012-12-27  7:53     ` Eric W. Biederman
2012-12-27 14:18     ` Andrew Cooper
2012-12-27 14:18       ` Andrew Cooper
2012-12-27 14:18       ` Andrew Cooper
2012-12-27 18:02       ` Eric W. Biederman
2012-12-27 18:02         ` Eric W. Biederman
2012-12-27 18:02         ` Eric W. Biederman
2013-01-02 11:26         ` [Xen-devel] " Andrew Cooper
2013-01-02 11:26           ` Andrew Cooper
2013-01-02 11:26           ` Andrew Cooper
2013-01-02 11:47           ` Eric W. Biederman
2013-01-02 11:47             ` Eric W. Biederman
2013-01-02 11:47             ` Eric W. Biederman
2013-01-03  9:31           ` Jan Beulich
2013-01-03  9:31             ` Jan Beulich
2013-01-03  9:31             ` Jan Beulich
2013-01-04 14:22           ` Daniel Kiper
2013-01-04 14:22             ` Daniel Kiper
2013-01-04 14:22             ` Daniel Kiper
2013-01-04 14:34             ` Konrad Rzeszutek Wilk
2013-01-04 14:34               ` Konrad Rzeszutek Wilk
2013-01-04 14:34               ` Konrad Rzeszutek Wilk
2013-01-04 14:34             ` Ian Campbell
2013-01-04 14:34               ` Ian Campbell
2013-01-04 14:34               ` Ian Campbell
2013-01-04 14:38             ` David Vrabel
2013-01-04 14:38               ` David Vrabel
2013-01-04 17:01               ` Daniel Kiper
2013-01-04 17:01                 ` Daniel Kiper
2013-01-04 17:01                 ` Daniel Kiper
2013-01-10 14:19                 ` David Vrabel
2013-01-10 14:19                   ` David Vrabel
2013-01-10 14:19                   ` David Vrabel
2013-01-11 13:22                   ` Daniel Kiper
2013-01-11 13:22                     ` Daniel Kiper
2013-01-11 13:22                     ` Daniel Kiper
2013-01-11 15:22                     ` David Vrabel
2013-01-11 15:22                       ` David Vrabel
2013-01-11 15:22                       ` David Vrabel
2013-01-11 17:34                       ` Daniel Kiper
2013-01-11 17:34                         ` Daniel Kiper
2013-01-11 17:34                         ` Daniel Kiper
2013-01-11 20:05                       ` Eric W. Biederman
2013-01-11 20:05                         ` Eric W. Biederman
2013-01-11 20:05                         ` Eric W. Biederman
2013-01-04 14:38             ` David Vrabel
2013-01-04 14:41             ` Jan Beulich
2013-01-04 14:41               ` Jan Beulich
2013-01-04 14:41               ` Jan Beulich
2013-01-04 17:07               ` Daniel Kiper
2013-01-04 17:07                 ` Daniel Kiper
2013-01-04 19:11                 ` Konrad Rzeszutek Wilk
2013-01-04 19:11                   ` Konrad Rzeszutek Wilk
2013-01-04 19:11                   ` Konrad Rzeszutek Wilk
2013-01-07 10:25                   ` Ian Campbell
2013-01-07 10:25                     ` Ian Campbell
2013-01-07 10:46                     ` Andrew Cooper
2013-01-07 10:46                       ` Andrew Cooper
2013-01-07 10:46                       ` Andrew Cooper
2013-01-07 10:54                       ` Ian Campbell
2013-01-07 10:54                         ` Ian Campbell
2013-01-07 10:54                         ` Ian Campbell
2013-01-07 10:25                   ` Ian Campbell
2013-01-07 12:34                   ` Daniel Kiper
2013-01-07 12:34                     ` Daniel Kiper
2013-01-07 12:34                     ` Daniel Kiper
2013-01-07 13:49                     ` Ian Campbell
2013-01-07 13:49                     ` Ian Campbell
2013-01-07 13:49                       ` Ian Campbell
2013-01-11 13:47                       ` Daniel Kiper
2013-01-11 13:47                         ` Daniel Kiper
2013-01-11 13:47                         ` Daniel Kiper
2013-01-07 16:20                     ` Konrad Rzeszutek Wilk
2013-01-07 16:20                       ` Konrad Rzeszutek Wilk
2013-01-07 16:20                       ` Konrad Rzeszutek Wilk
2013-01-11  4:16                       ` Eric W. Biederman
2013-01-11  4:16                         ` Eric W. Biederman
2013-01-11  4:16                         ` Eric W. Biederman
2013-01-11 16:55                         ` Konrad Rzeszutek Wilk
2013-01-11 16:55                           ` Konrad Rzeszutek Wilk
2013-01-11 16:55                           ` Konrad Rzeszutek Wilk
2013-01-11 20:26                           ` H. Peter Anvin
2013-01-11 20:26                             ` H. Peter Anvin
2013-01-11 20:26                             ` H. Peter Anvin
2013-01-11 20:43                             ` Vivek Goyal
2013-01-11 20:43                               ` Vivek Goyal
2013-01-11 20:43                               ` Vivek Goyal
2013-01-11 20:26                           ` Eric W. Biederman
2013-01-11 20:26                             ` Eric W. Biederman
2013-01-11 20:26                             ` Eric W. Biederman
2013-01-11 20:52                             ` Vivek Goyal
2013-01-11 20:52                               ` Vivek Goyal
2013-01-11 20:52                               ` Vivek Goyal
2013-01-11 21:03                               ` H. Peter Anvin
2013-01-11 21:03                               ` H. Peter Anvin [this message]
2013-01-11 21:03                                 ` H. Peter Anvin
2013-01-11 21:08                                 ` Vivek Goyal
2013-01-11 21:08                                   ` Vivek Goyal
2013-01-11 21:14                                   ` H. Peter Anvin
2013-01-11 21:14                                     ` H. Peter Anvin
2013-01-11 21:14                                     ` H. Peter Anvin
2013-01-11 21:08                                 ` Vivek Goyal
2013-01-04 17:07               ` Daniel Kiper
2013-01-02 15:27       ` Ian Campbell
2013-01-02 15:27       ` Ian Campbell
2013-01-02 15:27         ` Ian Campbell

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=50F07E2D.6010602@zytor.com \
    --to=hpa@zytor.com \
    --cc=JBeulich@suse.com \
    --cc=andrew.cooper3@citrix.com \
    --cc=daniel.kiper@oracle.com \
    --cc=dhowells@redhat.com \
    --cc=ebiederm@xmission.com \
    --cc=kexec@lists.infradead.org \
    --cc=konrad.wilk@oracle.com \
    --cc=linux-kernel@vger.kernel.org \
    --cc=maxim.uvarov@oracle.com \
    --cc=mingo@redhat.com \
    --cc=tglx@linutronix.de \
    --cc=vgoyal@redhat.com \
    --cc=virtualization@lists.linux-foundation.org \
    --cc=x86@kernel.org \
    --cc=xen-devel@lists.xensource.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.