[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <2989292.sja9PMOcvE@hactar>
Date: Wed, 22 Jun 2016 13:34:36 -0300
From: Thiago Jung Bauermann <bauerman@...ux.vnet.ibm.com>
To: Dave Young <dyoung@...hat.com>
Cc: linuxppc-dev@...ts.ozlabs.org, kexec@...ts.infradead.org,
x86@...nel.org, linux-kernel@...r.kernel.org,
Eric Biederman <ebiederm@...ssion.com>,
Michael Ellerman <mpe@...erman.id.au>,
Mimi Zohar <zohar@...ux.vnet.ibm.com>,
Eric Richter <erichte@...ux.vnet.ibm.com>
Subject: Re: [PATCH 0/6] kexec_file: Add buffer hand-over for the next kernel
Hello Dave,
Thanks for your considerations on this feature.
Am Mittwoch, 22 Juni 2016, 09:20:46 schrieb Dave Young:
> On 06/20/16 at 10:44pm, Thiago Jung Bauermann wrote:
> > This feature was implemented because the Integrity Measurement
> > Architecture subsystem needs to preserve its measurement list accross
> > the kexec reboot. This is so that IMA can implement trusted boot
> > support on the OpenPower platform, because on such systems an
> > intermediary Linux instance running as part of the firmware is used to
> > boot the target operating system via kexec. Using this mechanism, IMA
> > on this intermediary instance can hand over to the target OS the
> > measurements of the components that were used to boot it.
> We have CONFIG_KEXEC_VERIFY_SIG, why not verifying the kernel to be
> loaded instead? I feel IMA should rebuild its measurement instead of
> passing it to another kernel.
In trusted boot, each stage of the boot process (firmware, boot loader,
target OS) measures the following stage before passing control to it, and
records that measurement cumulatively so that the target OS can look back
and see measurements of all the components that were used from the earliest
boot stages until the target OS was loaded (including a measurement of the
OS itself).
If IMA had to rebuild the measurements, it would mean that one stage is
measuring itself. This violates this design property of the trusted boot
process (i.e., each boot stage is measured by the one before it) so it's not
really an option. It has to receive the measurements from the boot stage
that ran before it.
> Kexec reboot is also a reboot. If we have
> to preserve something get from firmware we can do it, but other than
> that I think it sounds not a good idea.
OpenPower uses a Linux kernel (and initrd with a tiny system image) as a
boot loader, so in this platform a kexec reboot is not a reboot. It is part
of the boot process itself as the way of passing control from the boot
loader to the target OS.
> > This series applies on top of v2 of the "kexec_file_load implementation
>
> > for PowerPC" patch series at:
> The kexec_file_load patches should be addressed first, no?
Yes. I posted this series for two reasons:
1. The PowerPC maintainer asked why he would want to have the
kexec_file_load system call, and this feature is one of the reasons. I
wanted to show that it is not an hypothetical feature, there is a
functioning implementation.
2. I want to start discussion on this feature with the community early, so
that I can incorporate feedback and have it ready to be accepted (or closer
to ready at least) by the time the kexec_file_load patches are accepted.
[]'s
Thiago Jung Bauermann
IBM Linux Technology Center
Powered by blists - more mailing lists