public inbox for kexec@lists.infradead.org
 help / color / mirror / Atom feed
From: Vivek Goyal <vgoyal@redhat.com>
To: Khalid Aziz <khalid@gonehiking.org>,
	"Eric W. Biederman" <ebiederm@xmission.com>
Cc: kexec@lists.infradead.org, horms@verge.net.au,
	Dave Young <dyoung@redhat.com>, "H. Peter Anvin" <hpa@zytor.com>,
	Matthew Garrett <mjg@redhat.com>
Subject: [RFC] Kdump with UEFI secure boot (Re: [PATCH v2] kdump: pass acpi_rsdp= to 2nd kernel for efi booting)
Date: Thu, 18 Oct 2012 15:38:31 -0400	[thread overview]
Message-ID: <20121018193831.GD18147@redhat.com> (raw)
In-Reply-To: <1350588121.30243.7.camel@rhapsody>

On Thu, Oct 18, 2012 at 01:22:01PM -0600, Khalid Aziz wrote:

[..]
> Yes, UEFI is a mess :) It does need to be sorted out. SecureBoot makes
> life even more difficult. Matthew Garret had earlier sent out patches to
> support SecureBoot on Linux and one of the things those patches did was
> to disable kexec completely. That is a drastic measure and ok as a short
> term solution but we need to come up with something better. If
> SecureBoot does not go away, we will have to do something in kexec-tools
> or even kernel to validate kernel code being loaded for kexec/kdump and
> the purgatory code as well. This will require interfacing with UEFI key
> checking mechanism. That is going to be ugly.

CCing Eric and Matthew Garret and hpa.

Ok, I will split this thread in two parts. Lets us quickly discuss
the UEFI secure boot also as it is happening soon. 

I was thinking that how about supporting in kernel bootloader. That is,
kernel acts as a boot loader. User passes the kernel, initrd and
commandline from user space using kexec system call and kernel parses
it and prepares appropriate memory areas ( ex. boot_params, kernel, initramfs,
backup region, elf header region etc). At the time of kexec -e, we just
follow th regular path and jump to second kernel.

At the time of loading, kernel can verify the signature of incoming
bzImage and reject it if signatures don't match. Matthew mentioned that
kernel signing certificate will be available inside the running kernel,
so verifying PE/COFF bzImage should be easy.

We don't have to worry about initramfs verification as it runs in 
user space.

There is one side issue of acpi_rsdp. Because second kernel executes
the code specified by acpi_rsdp, it is unsafe to let user specify
that location. Matthew metioned that figure a way out to pass acpi_rsdp
using boot params and drop it from command line.

Looking for thoughts and ideas on how to support kdump with UEFI
secureboot. (This is assuming that kdump already works with UEFI with
parameters "noefi" and "acpi_rsdp" in non secure boot mode).

Thanks
Vivek

_______________________________________________
kexec mailing list
kexec@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/kexec

  reply	other threads:[~2012-10-18 19:38 UTC|newest]

Thread overview: 84+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2012-10-18  3:10 [PATCH v2] kdump: pass acpi_rsdp= to 2nd kernel for efi booting Dave Young
2012-10-18 14:56 ` Khalid Aziz
2012-10-18 19:11   ` Vivek Goyal
2012-10-18 19:22     ` Khalid Aziz
2012-10-18 19:38       ` Vivek Goyal [this message]
2012-10-18 19:55         ` [RFC] Kdump with UEFI secure boot (Re: [PATCH v2] kdump: pass acpi_rsdp= to 2nd kernel for efi booting) Matthew Garrett
2012-10-18 22:25         ` Eric W. Biederman
2012-10-19  2:06           ` Vivek Goyal
2012-10-19  3:36             ` Eric W. Biederman
2012-10-19 14:31               ` Vivek Goyal
2012-10-22 20:43                 ` Vivek Goyal
2012-10-22 21:11                   ` Eric W. Biederman
2012-10-23  2:04                   ` Simon Horman
2012-10-23 13:24                     ` Vivek Goyal
2012-10-23 16:26                       ` [RFC] Kdump with signed images Eric W. Biederman
2012-10-23 17:39                         ` Vivek Goyal
2012-10-23 19:11                           ` Maxim Uvarov
2012-10-23 19:16                             ` Vivek Goyal
2012-10-22 21:07                 ` [RFC] Kdump with UEFI secure boot (Re: [PATCH v2] kdump: pass acpi_rsdp= to 2nd kernel for efi booting) Eric W. Biederman
2012-10-23 13:18                   ` Vivek Goyal
2012-10-23 14:59                     ` Vivek Goyal
2012-10-23 15:41                       ` Matthew Garrett
2012-10-23 16:44                         ` [RFC] Kdump with signed images Eric W. Biederman
2012-10-23 16:52                           ` Matthew Garrett
2012-10-24 17:19                           ` Vivek Goyal
2012-10-25  5:43                             ` Mimi Zohar
2012-10-25  6:44                               ` Kees Cook
2012-10-25  7:01                                 ` Mimi Zohar
2012-10-25 13:54                               ` Vivek Goyal
2012-10-25 19:06                                 ` Mimi Zohar
2012-10-25 15:39                         ` [RFC] Kdump with UEFI secure boot (Re: [PATCH v2] kdump: pass acpi_rsdp= to 2nd kernel for efi booting) Vivek Goyal
2012-10-23 16:19                       ` Kdump with signed images Eric W. Biederman
2012-10-23 16:31                         ` Matthew Garrett
2012-10-23 17:03                           ` Eric W. Biederman
2012-10-23 17:09                             ` Matthew Garrett
2012-10-24 17:36                         ` Vivek Goyal
2012-10-25  6:10                           ` Mimi Zohar
2012-10-25 14:10                             ` Vivek Goyal
2012-10-25 18:40                               ` Mimi Zohar
2012-10-25 18:55                                 ` Vivek Goyal
2012-10-26  1:15                                   ` Mimi Zohar
2012-10-26  2:39                                     ` Matthew Garrett
2012-10-26  3:30                                       ` Eric W. Biederman
2012-10-26 17:06                                       ` Vivek Goyal
2012-10-26 18:37                                         ` Mimi Zohar
2012-11-01 13:10                                           ` Vivek Goyal
2012-11-01 13:53                                             ` Vivek Goyal
2012-11-01 14:29                                               ` Mimi Zohar
2012-11-01 14:43                                                 ` Vivek Goyal
2012-11-01 14:52                                                   ` Matthew Garrett
2012-11-02 13:23                                                     ` Vivek Goyal
2012-11-02 14:29                                                       ` Balbir Singh
2012-11-02 14:36                                                         ` Vivek Goyal
2012-11-03  3:02                                                           ` Balbir Singh
2012-11-02 21:34                                                         ` H. Peter Anvin
2012-11-02 21:32                                                       ` Eric W. Biederman
2012-11-05 18:03                                                         ` Vivek Goyal
2012-11-05 19:44                                                           ` Eric W. Biederman
2012-11-05 20:42                                                             ` Vivek Goyal
2012-11-05 23:01                                                               ` H. Peter Anvin
2012-11-06 19:34                                                             ` Vivek Goyal
2012-11-06 23:51                                                               ` Eric W. Biederman
2012-11-08 19:40                                                                 ` Vivek Goyal
2012-11-08 19:45                                                                   ` Vivek Goyal
2012-11-08 21:03                                                                     ` Eric W. Biederman
2012-11-09 14:39                                                                       ` Vivek Goyal
2012-11-15  5:09                                                                         ` Eric W. Biederman
2012-11-15 12:56                                                                           ` Mimi Zohar
2012-11-08 20:46                                                                   ` Mimi Zohar
2012-11-01 14:51                                                 ` Vivek Goyal
2012-11-01 14:57                                                   ` Matthew Garrett
2012-11-01 15:10                                                     ` Khalid Aziz
2012-11-01 16:23                                                       ` Matthew Garrett
2012-11-02 16:57                                                         ` Khalid Aziz
2012-10-26 17:59                                       ` Mimi Zohar
2012-10-26 18:19                                         ` Matthew Garrett
2012-10-26 18:25                                           ` Mimi Zohar
2012-10-23 15:51                     ` [RFC] Kdump with UEFI secure boot (Re: [PATCH v2] kdump: pass acpi_rsdp= to 2nd kernel for efi booting) Eric W. Biederman
2012-10-23 17:18                       ` Vivek Goyal
2012-10-19 17:53               ` Vivek Goyal
2012-10-22 21:15                 ` Eric W. Biederman
2012-11-02 21:36                   ` H. Peter Anvin
2012-11-05 18:11                     ` Vivek Goyal
2012-11-05 19:54                       ` Eric W. Biederman

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20121018193831.GD18147@redhat.com \
    --to=vgoyal@redhat.com \
    --cc=dyoung@redhat.com \
    --cc=ebiederm@xmission.com \
    --cc=horms@verge.net.au \
    --cc=hpa@zytor.com \
    --cc=kexec@lists.infradead.org \
    --cc=khalid@gonehiking.org \
    --cc=mjg@redhat.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox