From: "Mustafa Yücel" <yuecelm@gmail.com>
To: isar-users <isar-users@googlegroups.com>
Subject: Re: signing support for (in-tree and external) kernel modules
Date: Wed, 29 Apr 2020 09:51:03 -0700 (PDT) [thread overview]
Message-ID: <a5a4a11a-9c3f-4367-b264-bba84bd2727c@googlegroups.com> (raw)
In-Reply-To: <bee889af-ce37-2c81-c0a2-5e5ad0f179f4@siemens.com>
[-- Attachment #1.1: Type: text/plain, Size: 2199 bytes --]
I checked again, sign-file is included in linux-headers package:
~myproject/out/build/tmp/deploy/isar-apt/apt/debian-buster/pool/main/l/linux-cip$
dpkg -c linux-headers-cip_4.19.113-cip23+r0_amd64.deb | grep sign-file
-rw-r--r-- root/root 7047 2020-04-29 16:56
./usr/src/linux-headers-4.19.113-cip23/scripts/.sign-file.cmd
-rwxr-xr-x root/root 14624 2020-04-29 16:56
./usr/src/linux-headers-4.19.113-cip23/scripts/sign-file
-rw-r--r-- root/root 9994 2020-03-28 01:06
./usr/src/linux-headers-4.19.113-cip23/scripts/sign-file.c
from where you got CONFIG_MODULE_SIG_FORMAT? CONFIG_MODULE_SIG is the
trigger to create this binary:
scripts/Makefile:hostprogs-$(CONFIG_MODULE_SIG) += sign-file
Musti
On Wednesday, April 29, 2020 at 5:35:15 PM UTC+2, Jan Kiszka wrote:
>
> On 29.04.20 15:00, yue...@gmail.com <javascript:> wrote:
> > In tree kernel modules gets signed with the CONFIG_MODULE_SIG_ALL kernel
> > option, but extra (resp. external) modules not. If you (resp. isar) not
> > provide an (external) signing key, the kernel build autogenerates a
> > private/public key pair. It would be nice if the isar build system
> > provide some support for signing kernel modules.
> >
> > I see currently 2 use cases:
> > 1) let the kernel build to autogenerate private/public key for kernel
> > module signing and kernel-module reuse the key for signing (evt. isar
> > deletes the private key after image generation)
> > 2) provide an (external) private and public key for kernel module
> > signing and will be used in kernel and kernel-module recipes
> >
>
> We likely want to go for path 2 because the first option prevents
> reproducibility. And that means we need to define a channel how to
> provide those keys both to the kernel build as well as the external
> module builds.
>
> Did you happen to observe if kernel-headers will include at least the
> script/sign-file host tool when CONFIG_MODULE_SIG_FORMAT is enabled?
> That - together with the keys - would be needed in order to sign
> external modules already during their build.
>
> Jan
>
> --
> Siemens AG, Corporate Technology, CT RDA IOT SES-DE
> Corporate Competence Center Embedded Linux
>
[-- Attachment #1.2: Type: text/html, Size: 2846 bytes --]
next prev parent reply other threads:[~2020-04-29 16:51 UTC|newest]
Thread overview: 8+ messages / expand[flat|nested] mbox.gz Atom feed top
2020-04-29 13:00 yuecelm
2020-04-29 15:35 ` Jan Kiszka
2020-04-29 16:51 ` Mustafa Yücel [this message]
2020-04-29 17:38 ` Jan Kiszka
2020-04-29 18:57 ` Mustafa Yücel
2020-04-29 20:15 ` Henning Schild
2020-04-29 21:04 ` Mustafa Yücel
2020-04-30 10:42 ` Henning Schild
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=a5a4a11a-9c3f-4367-b264-bba84bd2727c@googlegroups.com \
--to=yuecelm@gmail.com \
--cc=isar-users@googlegroups.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox