From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1758868Ab3BUUba (ORCPT ); Thu, 21 Feb 2013 15:31:30 -0500 Received: from mx1.redhat.com ([209.132.183.28]:15686 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755257Ab3BUUb0 (ORCPT ); Thu, 21 Feb 2013 15:31:26 -0500 Date: Thu, 21 Feb 2013 15:31:19 -0500 From: Vivek Goyal To: Linus Torvalds Cc: Peter Jones , David Howells , Matthew Garrett , Josh Boyer , Kees Cook , keyrings@linux-nfs.org, Linux Kernel Mailing List Subject: Re: [GIT PULL] Load keys from signed PE binaries Message-ID: <20130221203119.GC23427@redhat.com> References: <30665.1361461678@warthog.procyon.org.uk> <20130221164244.GA19625@srcf.ucam.org> <567.1361470653@warthog.procyon.org.uk> <20130221183445.GB20629@fenchurch.internal.datastacks.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Feb 21, 2013 at 10:56:44AM -0800, Linus Torvalds wrote: [..] > So no. The PE file thing makes no sense what-so-ever. What you mention > we can already do, and we already do it *better*. IIUC, PE/COFF signature verification bits can be useful for verifying the signature of PE/COFF signed bzImage. This verification will be required before kexec decides to load the kernel. Thanks Vivek