[RFC PATCH 00/13][V3] kexec: A new system call to allow in kernel loading
Vivek Goyal
vgoyal at redhat.com
Tue Jun 17 06:24:26 PDT 2014
On Mon, Jun 16, 2014 at 11:13:28PM +0200, Borislav Petkov wrote:
> On Tue, Jun 03, 2014 at 09:06:49AM -0400, Vivek Goyal wrote:
> > This patch series does not do kernel signature verification yet. I
> > plan to post another patch series for that. Now bzImage is already
> > signed with PKCS7 signature I plan to parse and verify those
> > signatures.
>
> Btw, do you have a brief outline on how you are going to do the
> extension to signature verification? Nothing formal, just enough of an
> outline that I can see where in the flow it will be plugged in.
>
> I was wondering how the whole signature signing and verification will
> be done, i.e., where do I get the signature, how and who will verify it
> (I'm guessing the purgatory code), etc, etc.
Hi Boris,
I am still working on signing patches. I have uploaded them here for you
to have a look.
http://people.redhat.com/vgoyal/kdump-secureboot/in-kernel-kexec/bzimage-sig-verification/
Last patch should give you a good idea how signature verification hooks
into kexec.
Signature verification patches are based on David Howell's work.
There is no purgatory involved here. Once we have copied kernel image
into kernel space, first thing we do is call into arch image loader
and ask it to verify signature of image. And bzImage loader in turn
calls into helper functions which can parse a PE signed file and
verify image signature.
I have yet to cleanup the code, implement a config option which enforces
signature verification.
Automatic enforncement of signature verification if secureboot is
enabled will happen once matthew's secureboot patches are merged
into mainline.
Thanks
Vivek
More information about the kexec
mailing list