public inbox for isar-users@googlegroups.com
 help / color / mirror / Atom feed
From: "Mustafa Yücel" <yuecelm@gmail.com>
To: isar-users <isar-users@googlegroups.com>
Subject: Re: signing support for (in-tree and external) kernel modules
Date: Wed, 29 Apr 2020 09:51:03 -0700 (PDT)	[thread overview]
Message-ID: <a5a4a11a-9c3f-4367-b264-bba84bd2727c@googlegroups.com> (raw)
In-Reply-To: <bee889af-ce37-2c81-c0a2-5e5ad0f179f4@siemens.com>


[-- Attachment #1.1: Type: text/plain, Size: 2199 bytes --]

I checked again, sign-file is included in linux-headers package:

~myproject/out/build/tmp/deploy/isar-apt/apt/debian-buster/pool/main/l/linux-cip$ 
dpkg -c linux-headers-cip_4.19.113-cip23+r0_amd64.deb | grep sign-file
-rw-r--r-- root/root      7047 2020-04-29 16:56 
./usr/src/linux-headers-4.19.113-cip23/scripts/.sign-file.cmd
-rwxr-xr-x root/root     14624 2020-04-29 16:56 
./usr/src/linux-headers-4.19.113-cip23/scripts/sign-file
-rw-r--r-- root/root      9994 2020-03-28 01:06 
./usr/src/linux-headers-4.19.113-cip23/scripts/sign-file.c

from where you got CONFIG_MODULE_SIG_FORMAT? CONFIG_MODULE_SIG is the 
trigger to create this binary:

scripts/Makefile:hostprogs-$(CONFIG_MODULE_SIG) += sign-file

Musti

On Wednesday, April 29, 2020 at 5:35:15 PM UTC+2, Jan Kiszka wrote:
>
> On 29.04.20 15:00, yue...@gmail.com <javascript:> wrote: 
> > In tree kernel modules gets signed with the CONFIG_MODULE_SIG_ALL kernel 
> > option, but extra (resp. external) modules not. If you (resp. isar) not 
> > provide an (external) signing key, the kernel build autogenerates a 
> > private/public key pair. It would be nice if the isar build system 
> > provide some support for signing kernel modules. 
> > 
> > I see currently 2 use cases: 
> > 1) let the kernel build to autogenerate private/public key for kernel 
> > module signing and kernel-module reuse the key for signing (evt. isar 
> > deletes the private key after image generation) 
> > 2) provide an (external) private and public key for kernel module 
> > signing and will be used in kernel and kernel-module recipes 
> > 
>
> We likely want to go for path 2 because the first option prevents 
> reproducibility. And that means we need to define a channel how to 
> provide those keys both to the kernel build as well as the external 
> module builds. 
>
> Did you happen to observe if kernel-headers will include at least the 
> script/sign-file host tool when CONFIG_MODULE_SIG_FORMAT is enabled? 
> That - together with the keys - would be needed in order to sign 
> external modules already during their build. 
>
> Jan 
>
> -- 
> Siemens AG, Corporate Technology, CT RDA IOT SES-DE 
> Corporate Competence Center Embedded Linux 
>

[-- Attachment #1.2: Type: text/html, Size: 2846 bytes --]

  reply	other threads:[~2020-04-29 16:51 UTC|newest]

Thread overview: 8+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2020-04-29 13:00 yuecelm
2020-04-29 15:35 ` Jan Kiszka
2020-04-29 16:51   ` Mustafa Yücel [this message]
2020-04-29 17:38     ` Jan Kiszka
2020-04-29 18:57       ` Mustafa Yücel
2020-04-29 20:15         ` Henning Schild
2020-04-29 21:04           ` Mustafa Yücel
2020-04-30 10:42             ` Henning Schild

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=a5a4a11a-9c3f-4367-b264-bba84bd2727c@googlegroups.com \
    --to=yuecelm@gmail.com \
    --cc=isar-users@googlegroups.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox