[PATCH v5,4/4] Documentation/admin-guide/module-signing.rst: add openssl command option example for CodeSign EKU

2021-04-11 Thread Lee, Chun-Yi
Add an openssl command option example for generating CodeSign extended key usage in X.509 when CONFIG_CHECK_CODESIGN_EKU is enabled. Signed-off-by: "Lee, Chun-Yi" --- Documentation/admin-guide/module-signing.rst | 6 ++ 1 file changed, 6 insertions(+) diff --git a/Documentation/a

[PATCH v5,2/4] PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification

2021-04-11 Thread Lee, Chun-Yi
This patch adds the logic for checking the CodeSigning extended key usage when verifying signature of kernel module or kexec PE binary in PKCS#7. Signed-off-by: "Lee, Chun-Yi" --- certs/system_keyring.c | 2 +- crypto/asymmetric_keys/Kconfig | 9 +++

[PATCH v5,3/4] modsign: Add codeSigning EKU when generating X.509 key generation config

2021-04-11 Thread Lee, Chun-Yi
Add codeSigning EKU to the X.509 key generation config for the build time autogenerated kernel key. Signed-off-by: "Lee, Chun-Yi" --- certs/Makefile | 1 + 1 file changed, 1 insertion(+) diff --git a/certs/Makefile b/certs/Makefile index f4c25b67aad9..1ef4d6ca43b7 100644 --- a/cert

[PATCH v5,1/4] X.509: Add CodeSigning extended key usage parsing

2021-04-11 Thread Lee, Chun-Yi
This patch adds the logic for parsing the CodeSign extended key usage extension in X.509. The parsing result will be set to the eku flag which is carried by public key. It can be used in the PKCS#7 verification. Signed-off-by: "Lee, Chun-Yi" --- crypto/asymmetric_keys/x509_cert_par

[PATCH v5 0/4] Check codeSigning extended key usage extension

2021-04-11 Thread Lee, Chun-Yi
option example for generating CodeSign EKU to module-signing.rst document. v2: Changed the help wording in the Kconfig. Lee, Chun-Yi (4): X.509: Add CodeSigning extended key usage parsing PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification modsign: Add

[PATCH 4/4] Documentation/admin-guide/module-signing.rst: add openssl command option example for CodeSign EKU

2021-04-08 Thread Lee, Chun-Yi
Add an openssl command option example for generating CodeSign extended key usage in X.509 when CONFIG_CHECK_CODESIGN_EKU is enabled. Signed-off-by: "Lee, Chun-Yi" --- Documentation/admin-guide/module-signing.rst | 6 ++ 1 file changed, 6 insertions(+) diff --git a/Documentation/a

[PATCH 3/4] modsign: Add codeSigning EKU when generating X.509 key generation config

2021-04-08 Thread Lee, Chun-Yi
Add codeSigning EKU to the X.509 key generation config for the build time autogenerated kernel key. Signed-off-by: "Lee, Chun-Yi" --- certs/Makefile | 1 + 1 file changed, 1 insertion(+) diff --git a/certs/Makefile b/certs/Makefile index f4c25b67aad9..1ef4d6ca43b7 100644 --- a/cert

[PATCH 2/4] PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification

2021-04-08 Thread Lee, Chun-Yi
This patch adds the logic for checking the CodeSigning extended key usage when verifying signature of kernel module or kexec PE binary in PKCS#7. Signed-off-by: "Lee, Chun-Yi" --- certs/system_keyring.c | 2 +- crypto/asymmetric_keys/Kconfig | 9 +++

[PATCH 1/4] X.509: Add CodeSigning extended key usage parsing

2021-04-08 Thread Lee, Chun-Yi
This patch adds the logic for parsing the CodeSign extended key usage extension in X.509. The parsing result will be set to the eku flag which is carried by public key. It can be used in the PKCS#7 verification. Signed-off-by: "Lee, Chun-Yi" --- crypto/asymmetric_keys/x509_cert_par

[PATCH v5 0/4] Check codeSigning extended key usage extension

2021-04-08 Thread Lee, Chun-Yi
option example for generating CodeSign EKU to module-signing.rst document. v2: Changed the help wording in the Kconfig. Lee, Chun-Yi (4): X.509: Add CodeSigning extended key usage parsing PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification modsign: Add

[PATCH 4/4] Documentation/admin-guide/module-signing.rst: add openssl command option example for CodeSign EKU

2021-03-22 Thread Lee, Chun-Yi
Add an openssl command option example for generating CodeSign extended key usage in X.509 when CONFIG_CHECK_CODESIGN_EKU is enabled. Signed-off-by: "Lee, Chun-Yi" --- Documentation/admin-guide/module-signing.rst | 6 ++ 1 file changed, 6 insertions(+) diff --git a/Documentation/a

[PATCH 3/4] modsign: Add codeSigning EKU when generating X.509 key generation config

2021-03-22 Thread Lee, Chun-Yi
Add codeSigning EKU to the X.509 key generation config for the build time autogenerated kernel key. Signed-off-by: "Lee, Chun-Yi" --- certs/Makefile | 1 + 1 file changed, 1 insertion(+) diff --git a/certs/Makefile b/certs/Makefile index f4c25b67aad9..1ef4d6ca43b7 100644 --- a/cert

[PATCH 2/4] PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification

2021-03-22 Thread Lee, Chun-Yi
This patch adds the logic for checking the CodeSigning extended key usage when verifying signature of kernel module or kexec PE binary in PKCS#7. Signed-off-by: "Lee, Chun-Yi" --- certs/system_keyring.c | 2 +- crypto/asymmetric_keys/Kconfig | 9 +++

[PATCH 1/4] X.509: Add CodeSigning extended key usage parsing

2021-03-22 Thread Lee, Chun-Yi
This patch adds the logic for parsing the CodeSign extended key usage extension in X.509. The parsing result will be set to the eku flag which is carried by public key. It can be used in the PKCS#7 verification. Signed-off-by: "Lee, Chun-Yi" --- crypto/asymmetric_keys/x509_cert_par

[PATCH v5 0/4] Check codeSigning extended key usage extension

2021-03-22 Thread Lee, Chun-Yi
option example for generating CodeSign EKU to module-signing.rst document. v2: Changed the help wording in the Kconfig. Lee, Chun-Yi (4): X.509: Add CodeSigning extended key usage parsing PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification modsign: Add

[PATCH 3/4] modsign: Add codeSigning EKU when generating X.509 key generation config

2021-03-09 Thread Lee, Chun-Yi
Add codeSigning EKU to the X.509 key generation config for the build time autogenerated kernel key. Signed-off-by: "Lee, Chun-Yi" --- certs/Makefile | 1 + 1 file changed, 1 insertion(+) diff --git a/certs/Makefile b/certs/Makefile index f4c25b67aad9..1ef4d6ca43b7 100644 --- a/cert

[PATCH 1/4] X.509: Add CodeSigning extended key usage parsing

2021-03-09 Thread Lee, Chun-Yi
This patch adds the logic for parsing the CodeSign extended key usage extension in X.509. The parsing result will be set to the eku flag which is carried by public key. It can be used in the PKCS#7 verification. Signed-off-by: "Lee, Chun-Yi" --- crypto/asymmetric_keys/x509_cert_par

[PATCH 4/4] Documentation/admin-guide/module-signing.rst: add openssl command option example for CodeSign EKU

2021-03-09 Thread Lee, Chun-Yi
Add an openssl command option example for generating CodeSign extended key usage in X.509 when CONFIG_CHECK_CODESIGN_EKU is enabled. Signed-off-by: "Lee, Chun-Yi" --- Documentation/admin-guide/module-signing.rst | 6 ++ 1 file changed, 6 insertions(+) diff --git a/Documentation/a

[PATCH 2/4] PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification

2021-03-09 Thread Lee, Chun-Yi
This patch adds the logic for checking the CodeSigning extended key usage when verifying signature of kernel module or kexec PE binary in PKCS#7. Signed-off-by: "Lee, Chun-Yi" --- certs/system_keyring.c | 2 +- crypto/asymmetric_keys/Kconfig | 9 +++

[PATCH v5 0/4] Check codeSigning extended key usage extension

2021-03-09 Thread Lee, Chun-Yi
option example for generating CodeSign EKU to module-signing.rst document. v2: Changed the help wording in the Kconfig. Lee, Chun-Yi (4): X.509: Add CodeSigning extended key usage parsing PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification modsign: Add

[PATCH 4/4] Documentation/admin-guide/module-signing.rst: add openssl command option example for CodeSign EKU

2021-02-21 Thread Lee, Chun-Yi
Add an openssl command option example for generating CodeSign extended key usage in X.509 when CONFIG_CHECK_CODESIGN_EKU is enabled. Signed-off-by: "Lee, Chun-Yi" --- Documentation/admin-guide/module-signing.rst | 6 ++ 1 file changed, 6 insertions(+) diff --git a/Documentation/a

[PATCH 2/4] PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification

2021-02-21 Thread Lee, Chun-Yi
This patch adds the logic for checking the CodeSigning extended key usage when verifying signature of kernel module or kexec PE binary in PKCS#7. Signed-off-by: "Lee, Chun-Yi" --- certs/system_keyring.c | 2 +- crypto/asymmetric_keys/Kconfig | 9 +++

[PATCH 1/4] X.509: Add CodeSigning extended key usage parsing

2021-02-21 Thread Lee, Chun-Yi
This patch adds the logic for parsing the CodeSign extended key usage extension in X.509. The parsing result will be set to the eku flag which is carried by public key. It can be used in the PKCS#7 verification. Signed-off-by: "Lee, Chun-Yi" --- crypto/asymmetric_keys/x509_cert_par

[PATCH 3/4] modsign: Add codeSigning EKU when generating X.509 key generation config

2021-02-21 Thread Lee, Chun-Yi
Add codeSigning EKU to the X.509 key generation config for the build time autogenerated kernel key. Signed-off-by: "Lee, Chun-Yi" --- certs/Makefile | 1 + 1 file changed, 1 insertion(+) diff --git a/certs/Makefile b/certs/Makefile index f4c25b67aad9..1ef4d6ca43b7 100644 --- a/cert

[PATCH v4 0/4] Check codeSigning extended key usage extension

2021-02-21 Thread Lee, Chun-Yi
module-signing.rst document. v2: Changed the help wording in the Kconfig. Lee, Chun-Yi (4): X.509: Add CodeSigning extended key usage parsing PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification modsign: Add codeSigning EKU when generating X.509 key generation

[PATCH v4 0/4] Check codeSigning extended key usage extension

2021-01-20 Thread Lee, Chun-Yi
module-signing.rst document. v2: Changed the help wording in the Kconfig. Lee, Chun-Yi (4): X.509: Add CodeSigning extended key usage parsing PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification modsign: Add codeSigning EKU when generating X.509 key generation

[PATCH 2/4] PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification

2021-01-20 Thread Lee, Chun-Yi
This patch adds the logic for checking the CodeSigning extended key usage when verifying signature of kernel module or kexec PE binary in PKCS#7. Signed-off-by: "Lee, Chun-Yi" --- certs/system_keyring.c | 2 +- crypto/asymmetric_keys/Kconfig | 9 +++

[PATCH 4/4] Documentation/admin-guide/module-signing.rst: add openssl command option example for CodeSign EKU

2021-01-20 Thread Lee, Chun-Yi
Add an openssl command option example for generating CodeSign extended key usage in X.509 when CONFIG_CHECK_CODESIGN_EKU is enabled. Signed-off-by: "Lee, Chun-Yi" --- Documentation/admin-guide/module-signing.rst | 6 ++ 1 file changed, 6 insertions(+) diff --git a/Documentation/a

[PATCH 3/4] modsign: Add codeSigning EKU when generating X.509 key generation config

2021-01-20 Thread Lee, Chun-Yi
Add codeSigning EKU to the X.509 key generation config for the build time autogenerated kernel key. Signed-off-by: "Lee, Chun-Yi" --- certs/Makefile | 1 + 1 file changed, 1 insertion(+) diff --git a/certs/Makefile b/certs/Makefile index f4c25b67aad9..1ef4d6ca43b7 100644 --- a/cert

[PATCH 1/4] X.509: Add CodeSigning extended key usage parsing

2021-01-20 Thread Lee, Chun-Yi
This patch adds the logic for parsing the CodeSign extended key usage extension in X.509. The parsing result will be set to the eku flag which is carried by public key. It can be used in the PKCS#7 verification. Signed-off-by: "Lee, Chun-Yi" --- crypto/asymmetric_keys/x509_cert_par

[PATCH 0/4] Check codeSigning extended key usage extension

2020-11-24 Thread Lee, Chun-Yi
the help wording in the Kconfig. Lee, Chun-Yi (4): X.509: Add CodeSigning extended key usage parsing PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification modsign: Add codeSigning EKU when generating X.509 key generation config Documentation/admin-guide/module

[PATCH 4/4] Documentation/admin-guide/module-signing.rst: add openssl command option example for CodeSign EKU

2020-11-24 Thread Lee, Chun-Yi
Add an openssl command option example for generating CodeSign extended key usage in X.509 when CONFIG_CHECK_CODESIGN_EKU be enabled. Signed-off-by: "Lee, Chun-Yi" --- Documentation/admin-guide/module-signing.rst | 6 ++ 1 file changed, 6 insertions(+) diff --git a/Documentation/a

[PATCH 3/4] modsign: Add codeSigning EKU when generating X.509 key generation config

2020-11-24 Thread Lee, Chun-Yi
Add codeSigning EKU to the X.509 key generation config for the build time autogenerated kernel key. Signed-off-by: "Lee, Chun-Yi" --- certs/Makefile | 1 + 1 file changed, 1 insertion(+) diff --git a/certs/Makefile b/certs/Makefile index f4c25b67aad9..1ef4d6ca43b7 100644 --- a/cert

[PATCH v2 2/4] PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification

2020-11-24 Thread Lee, Chun-Yi
This patch adds the logic for checking the CodeSigning extended key usage when verifying signature of kernel module or kexec PE binary in PKCS#7. Signed-off-by: "Lee, Chun-Yi" --- certs/system_keyring.c | 2 +- crypto/asymmetric_keys/Kconfig | 9 +++

[PATCH v2 1/4] X.509: Add CodeSigning extended key usage parsing

2020-11-24 Thread Lee, Chun-Yi
This patch adds the logic for parsing the CodeSign extended key usage extension in X.509. The parsing result will be set to the eku flag which is carried by public key. It can be used in the PKCS#7 verification. Signed-off-by: "Lee, Chun-Yi" --- crypto/asymmetric_keys/x509_cert_par

[PATCH v2 1/2] X.509: Add CodeSigning extended key usage parsing

2020-11-04 Thread Lee, Chun-Yi
This patch adds the logic for parsing the CodeSign extended key usage extension in X.509. The parsing result will be set to the eku flag which is carried by public key. It can be used in the PKCS#7 verification. Signed-off-by: "Lee, Chun-Yi" --- crypto/asymmetric_keys/x509_cert_par

[PATCH v2 0/2] Check codeSigning extended key usage extension

2020-11-04 Thread Lee, Chun-Yi
extension field in X.509. And checking the CodeSigning EKU when verifying signature of kernel module or kexec PE binary in PKCS#7. v2: Changed the help wording in the Kconfig. Lee, Chun-Yi (2): X.509: Add CodeSigning extended key usage parsing PKCS#7: Check codeSigning EKU for kernel module and kexec

[PATCH v2 2/2] PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification

2020-11-04 Thread Lee, Chun-Yi
This patch adds the logic for checking the CodeSigning extended key usage when verifying signature of kernel module or kexec PE binary in PKCS#7. Signed-off-by: "Lee, Chun-Yi" --- certs/system_keyring.c | 2 +- crypto/asymmetric_keys/Kconfig | 9 +++

[RFC PATCH 2/2] PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification

2020-10-19 Thread Lee, Chun-Yi
This patch adds the logic for checking the CodeSigning extended key usage extenstion when verifying signature of kernel module or kexec PE binary in PKCS#7. Signed-off-by: "Lee, Chun-Yi" --- certs/system_keyring.c | 2 +- crypto/asymmetric_keys/Kconfig

[RFC PATCH 1/2] X.509: Add CodeSigning extended key usage parsing

2020-10-19 Thread Lee, Chun-Yi
This patch adds the logic for parsing the CodeSign extended key usage extension in X.509. The parsing result will be set to the eku flag which is carried by public key. It can be used in the PKCS#7 verification. Signed-off-by: "Lee, Chun-Yi" --- crypto/asymmetric_keys/x509_cert_par

[RFC PATCH 0/2] Check codeSigning extended key usage extension

2020-10-19 Thread Lee, Chun-Yi
extension field in X.509. And checking the CodeSigning EKU when verifying signature of kernel module or kexec PE binary in PKCS#7. Lee, Chun-Yi (2): X.509: Add CodeSigning extended key usage parsing PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification certs/system_keyring.c

[PATCH] efi/efivars: Create efivars mount point in the registration of efivars abstraction

2020-09-24 Thread Lee, Chun-Yi
Cc: Greg Kroah-Hartman Cc: Arthur Heymans Cc: Patrick Rudolph Signed-off-by: "Lee, Chun-Yi" --- drivers/firmware/efi/efi.c | 7 --- drivers/firmware/efi/vars.c | 17 + 2 files changed, 17 insertions(+), 7 deletions(-) diff --git a/drivers/firmware/efi/efi.c b/d

[PATCH v2] efi/efivars: Create efivars mount point via efivars abstraction

2020-08-25 Thread Lee, Chun-Yi
This patch creates efivars mount point when active efivars abstraction be set. It is useful for userland to determine the availability of efivars filesystem. Cc: Matthias Brugger Cc: Fabian Vogt Cc: Ilias Apalodimas Cc: Ard Biesheuvel Signed-off-by: "Lee, Chun-Yi" ---

[PATCH v2] efi/efivars: Create efivars mount point via efivars abstraction

2020-08-25 Thread Lee, Chun-Yi
be instantiated using a different efivars abstraction. Cc: Matthias Brugger Cc: Fabian Vogt Cc: Ilias Apalodimas Cc: Ard Biesheuvel Signed-off-by: "Lee, Chun-Yi" --- drivers/firmware/efi/efi.c | 12 +++- 1 file changed, 7 insertions(+), 5 deletions(-) diff --git a/driver

[PATCH] efi/efivars: create efivars mount point when get variable services are available

2020-08-19 Thread Lee, Chun-Yi
Apalodimas Cc: Ard Biesheuvel Signed-off-by: "Lee, Chun-Yi" --- drivers/firmware/efi/efi.c | 13 - 1 file changed, 8 insertions(+), 5 deletions(-) diff --git a/drivers/firmware/efi/efi.c b/drivers/firmware/efi/efi.c index fdd1db025dbf..929fbf4dfd5d 100644 --- a/drivers/fi

[PATCH 5/5 v2] PM / hibernate: An option to request that snapshot image must be authenticated

2019-01-03 Thread Lee, Chun-Yi
Kconfig Cc: "Rafael J. Wysocki" Cc: Pavel Machek Cc: Chen Yu Cc: Oliver Neukum Cc: Ryan Chen Cc: David Howells Cc: Giovanni Gherdovich Cc: Randy Dunlap Cc: Jann Horn Cc: Andy Lutomirski Signed-off-by: "Lee, Chun-Yi" --- Documentation/admin-guide/kernel-parameters.tx

[PATCH 4/5 v2] PM / hibernate: Erase the snapshot master key in snapshot pages

2019-01-03 Thread Lee, Chun-Yi
Lutomirski Signed-off-by: "Lee, Chun-Yi" --- kernel/power/power.h| 6 kernel/power/snapshot.c | 5 kernel/power/snapshot_key.c | 67 + 3 files changed, 78 insertions(+) diff --git a/kernel/power/power.h b/kernel

[PATCH 3/5] PM / hibernate: Encrypt snapshot image

2019-01-03 Thread Lee, Chun-Yi
y. And the initialization vector will be kept in snapshot header for resuming. Cc: "Rafael J. Wysocki" Cc: Pavel Machek Cc: Chen Yu Cc: Oliver Neukum Cc: Ryan Chen Cc: David Howells Cc: Giovanni Gherdovich Cc: Randy Dunlap Cc: Jann Horn Cc: Andy Lutomirski Signed-off-by: "Lee, Ch

[PATCH 2/5] PM / hibernate: Generate and verify signature for snapshot image

2019-01-03 Thread Lee, Chun-Yi
ael J. Wysocki" Cc: Pavel Machek Cc: Chen Yu Cc: Oliver Neukum Cc: Ryan Chen Cc: David Howells Cc: Giovanni Gherdovich Cc: Randy Dunlap Cc: Jann Horn Cc: Andy Lutomirski Signed-off-by: "Lee, Chun-Yi" --- kernel/power/hibernate.c | 18 ++- kernel/power/power.h | 2

[PATCH 1/5 v2] PM / hibernate: Create snapshot keys handler

2019-01-03 Thread Lee, Chun-Yi
g. Cc: "Rafael J. Wysocki" Cc: Pavel Machek Cc: Chen Yu Cc: Oliver Neukum Cc: Ryan Chen Cc: David Howells Cc: Giovanni Gherdovich Cc: Randy Dunlap Cc: Jann Horn Cc: Andy Lutomirski Signed-off-by: "Lee, Chun-Yi" --- kernel/power/Kconfig| 14 +++ kernel/power

[PATCH 0/5 v2][RFC] Encryption and authentication for hibernate snapshot image

2019-01-03 Thread Lee, Chun-Yi
Pavel Machek Cc: Chen Yu Cc: Oliver Neukum Cc: Ryan Chen Cc: David Howells Cc: Giovanni Gherdovich Cc: Randy Dunlap Cc: Jann Horn Cc: Andy Lutomirski Signed-off-by: "Lee, Chun-Yi" Lee, Chun-Yi (5): PM / hibernate: Create snapshot keys handler PM / hibernate: Generate and

[PATCH 2/2] PM / Sleep: Check the file capability when writing wake lock interface

2018-12-30 Thread Lee, Chun-Yi
oah-Hartman Cc: "Rafael J. Wysocki" Cc: Chen Yu Cc: Giovanni Gherdovich Cc: Jann Horn Cc: Andy Lutomirski Cc: Pavel Machek Cc: Len Brown Cc: "Martin K. Petersen" Cc: Randy Dunlap Cc: Joe Perches Cc: Bart Van Assche Signed-off-by: "Lee, Chun-Yi" --- kernel/p

[PATCH 1/2] sysfs: Add hook for checking the file capable for opener

2018-12-30 Thread Lee, Chun-Yi
achek Cc: Len Brown Cc: "Martin K. Petersen" Cc: Randy Dunlap Cc: Joe Perches Cc: Bart Van Assche Signed-off-by: "Lee, Chun-Yi" --- fs/sysfs/file.c | 8 include/linux/kobject.h | 2 ++ include/linux/sysfs.h | 2 ++ lib/kobject.c | 26 +++

[PATCH 0/2] [RFC] sysfs: Add hook for checking the file capability of opener

2018-12-30 Thread Lee, Chun-Yi
capability. Cc: Greg Kroah-Hartman Cc: "Rafael J. Wysocki" Cc: Chen Yu Cc: Giovanni Gherdovich Cc: Jann Horn Cc: Andy Lutomirski Cc: Pavel Machek Cc: Len Brown Cc: "Martin K. Petersen" Cc: Randy Dunlap Cc: Joe Perches Cc: Bart Van Assche Signed-off-by: "Lee, C

[PATCH 2/5] PM / hibernate: Generate and verify signature for snapshot image

2018-09-12 Thread Lee, Chun-Yi
ael J. Wysocki" Cc: Pavel Machek Cc: Chen Yu Cc: Oliver Neukum Cc: Ryan Chen Cc: David Howells Cc: Giovanni Gherdovich Signed-off-by: "Lee, Chun-Yi" --- kernel/power/hibernate.c | 18 ++- kernel/power/power.h | 26 kernel/pow

[PATCH 5/5] PM / hibernate: An option to request that snapshot image must be authenticated

2018-09-12 Thread Lee, Chun-Yi
socki" Cc: Pavel Machek Cc: Chen Yu Cc: Oliver Neukum Cc: Ryan Chen Cc: David Howells Cc: Giovanni Gherdovich Signed-off-by: "Lee, Chun-Yi" --- Documentation/admin-guide/kernel-parameters.txt | 6 include/linux/kernel.h |

[PATCH 4/5] PM / hibernate: Erase the snapshot master key in snapshot pages

2018-09-12 Thread Lee, Chun-Yi
to forward snapshot master key to image kernel. Cc: "Rafael J. Wysocki" Cc: Pavel Machek Cc: Chen Yu Cc: Oliver Neukum Cc: Ryan Chen Cc: David Howells Cc: Giovanni Gherdovich Signed-off-by: "Lee, Chun-Yi" --- kernel/power/power.h| 6 + kernel/power

[PATCH 3/5] PM / hibernate: Encrypt snapshot image

2018-09-12 Thread Lee, Chun-Yi
y. And the initialization vector will be kept in snapshot header for resuming. Cc: "Rafael J. Wysocki" Cc: Pavel Machek Cc: Chen Yu Cc: Oliver Neukum Cc: Ryan Chen Cc: David Howells Cc: Giovanni Gherdovich Signed-off-by: "Lee, Chun-Yi" --- kernel/power/hibernate.c | 8 ++-

[PATCH 0/5][RFC] Encryption and authentication for hibernate snapshot image

2018-09-12 Thread Lee, Chun-Yi
Yu Cc: Oliver Neukum Cc: Ryan Chen Cc: David Howells Cc: Giovanni Gherdovich Signed-off-by: "Lee, Chun-Yi" Lee, Chun-Yi (5): PM / hibernate: Create snapshot keys handler PM / hibernate: Generate and verify signature for snapshot image PM / hibernate: Encrypt snapshot image

[PATCH 1/5] PM / hibernate: Create snapshot keys handler

2018-09-12 Thread Lee, Chun-Yi
be initialled when hibernation be triggered. Cc: "Rafael J. Wysocki" Cc: Pavel Machek Cc: Chen Yu Cc: Oliver Neukum Cc: Ryan Chen Cc: David Howells Cc: Giovanni Gherdovich Signed-off-by: "Lee, Chun-Yi" --- kernel/power/Kconfig| 14 +++ kernel/power/Make

[PATCH] x86/PCI: Claim the resources of firmware enabled IOAPIC before children bus

2018-07-24 Thread Lee, Chun-Yi
claims the resources of firmware enabled IOAPIC before children bus. Then kernel gets a chance to reassign the resources of children bus to avoid the conflict. Cc: Bjorn Helgaas Cc: Thomas Gleixner Cc: Ingo Molnar Cc: "H. Peter Anvin" Signed-off-by: "Lee, Chun-Yi"

[PATCH] efi: Fix the size not consistent issue when unmapping memory map

2018-05-01 Thread Lee, Chun-Yi
Biesheuvel Cc: Takashi Iwai Cc: Vivek Goyal Cc: Ingo Molnar Tested-by: Randy Wright Signed-off-by: "Lee, Chun-Yi" --- drivers/firmware/efi/memmap.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/firmware/efi/memmap.c b/drivers/firmware/efi/memmap.c index 5

[PATCH] efi: Fix the size not consistent issue when unmapping memory map

2018-04-12 Thread Lee, Chun-Yi
: Ingo Molnar Signed-off-by: "Lee, Chun-Yi" --- drivers/firmware/efi/memmap.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/firmware/efi/memmap.c b/drivers/firmware/efi/memmap.c index 5fc7052..1f592d8 100644 --- a/drivers/firmware/efi/memmap.c +++ b/dr

[PATCH v2] ACPI / scan: Send the change uevent with offine environmental data

2018-03-19 Thread Lee, Chun-Yi
ocko Signed-off-by: "Lee, Chun-Yi" --- drivers/acpi/scan.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/drivers/acpi/scan.c b/drivers/acpi/scan.c index 8e63d93..490498e 100644 --- a/drivers/acpi/scan.c +++ b/drivers/acpi/scan.c @@ -116,6 +116,7 @@ bool acpi_scan_

[PATCH 1/5] MODSIGN: do not load mok when secure boot disabled

2018-03-13 Thread Lee, Chun-Yi
Josh Boyer Cc: James Bottomley Signed-off-by: "Lee, Chun-Yi" --- certs/load_uefi.c | 26 +++--- 1 file changed, 15 insertions(+), 11 deletions(-) diff --git a/certs/load_uefi.c b/certs/load_uefi.c index 3d88459..d6de4d0 100644 --- a/certs/load_uefi.c +++ b/ce

[PATCH 0/5 v2] Using the hash in MOKx to blacklist kernel module

2018-03-13 Thread Lee, Chun-Yi
error message prints out appropriate status string for reading by human being. v2: Chekcikng the attributes of db and mok before loading certificates. Lee, Chun-Yi (5): MODSIGN: do not load mok when secure boot disabled MODSIGN: print appropriate status message when getting UEFI certificates

[PATCH 3/5] MODSIGN: load blacklist from MOKx

2018-03-13 Thread Lee, Chun-Yi
This patch adds the logic to load the blacklisted hash and certificates from MOKx which is maintained by shim bootloader. Cc: David Howells Cc: Josh Boyer Cc: James Bottomley Signed-off-by: "Lee, Chun-Yi" --- certs/load_uefi.c | 16 +--- 1 file changed, 13 insert

[PATCH 2/5] MODSIGN: print appropriate status message when getting UEFI certificates list

2018-03-13 Thread Lee, Chun-Yi
t get UEFI MokListRT: EFI_NOT_FOUND [0.788537] MODSIGN: Couldn't get UEFI MokListXRT: EFI_NOT_FOUND Cc: David Howells Cc: Josh Boyer Cc: James Bottomley Signed-off-by: "Lee, Chun-Yi" --- certs/load_uefi.c | 43 ++-

[PATCH 5/5] MODSIGN: check the attributes of db and mok

2018-03-13 Thread Lee, Chun-Yi
bit before we trust it. Cc: David Howells Cc: Josh Boyer Cc: James Bottomley Signed-off-by: "Lee, Chun-Yi" --- certs/load_uefi.c | 35 +++ 1 file changed, 23 insertions(+), 12 deletions(-) diff --git a/certs/load_uefi.c b/certs/load_uefi.c index dc6

[PATCH 4/5] MODSIGN: checking the blacklisted hash before loading a kernel module

2018-03-13 Thread Lee, Chun-Yi
, the hash can be compared by kernel. Cc: David Howells Cc: Josh Boyer Cc: James Bottomley Signed-off-by: "Lee, Chun-Yi" --- kernel/module_signing.c | 62 +++-- 1 file changed, 60 insertions(+), 2 deletions(-) diff --git a/kernel/module_sig

[PATCH 1/5] MODSIGN: do not load mok when secure boot disabled

2018-03-13 Thread Lee, Chun-Yi
Josh Boyer Cc: James Bottomley Signed-off-by: Lee, Chun-Yi --- certs/load_uefi.c | 26 +++--- 1 file changed, 15 insertions(+), 11 deletions(-) diff --git a/certs/load_uefi.c b/certs/load_uefi.c index 3d88459..d6de4d0 100644 --- a/certs/load_uefi.c +++ b/certs/load_u

[PATCH 2/5] MODSIGN: print appropriate status message when getting UEFI certificates list

2018-03-13 Thread Lee, Chun-Yi
t get UEFI MokListRT: EFI_NOT_FOUND [0.788537] MODSIGN: Couldn't get UEFI MokListXRT: EFI_NOT_FOUND Cc: David Howells Cc: Josh Boyer Cc: James Bottomley Signed-off-by: Lee, Chun-Yi --- certs/load_uefi.c | 43 ++- include/l

[PATCH 0/5 v2] Using the hash in MOKx to blacklist kernel module

2018-03-13 Thread Lee, Chun-Yi
error message prints out appropriate status string for reading by human being. v2: Chekcikng the attributes of db and mok before loading certificates. Lee, Chun-Yi (5): MODSIGN: do not load mok when secure boot disabled MODSIGN: print appropriate status message when getting UEFI certificates

[PATCH] ACPI / scan: Send the change uevent with offine environmental data

2018-03-01 Thread Lee, Chun-Yi
ck, kernel sends the KOBJ_CHANGE uevent with a offline environmental data to indicate purpose. It's useful by udev rule for using ENV{EVENT} filter. Cc: Michal Hocko Cc: "Rafael J. Wysocki" Cc: Len Brown Signed-off-by: "Lee, Chun-Yi" --- drivers/acpi/scan.c | 3 ++-

[PATCH 2/4] MODSIGN: print appropriate status message when getting UEFI certificates list

2017-11-29 Thread Lee, Chun-Yi
t get UEFI MokListRT: EFI_NOT_FOUND [0.788537] MODSIGN: Couldn't get UEFI MokListXRT: EFI_NOT_FOUND Cc: David Howells Cc: Josh Boyer Signed-off-by: "Lee, Chun-Yi" --- certs/load_uefi.c | 43 ++- include/linux/efi.h | 25 +

[PATCH 3/4] MODSIGN: load blacklist from MOKx

2017-11-29 Thread Lee, Chun-Yi
This patch adds the logic to load the blacklisted hash and certificates from MOKx which is maintained by shim bootloader. Cc: David Howells Cc: Josh Boyer Signed-off-by: "Lee, Chun-Yi" --- certs/load_uefi.c | 16 +--- 1 file changed, 13 insertions(+), 3 deletions(-) di

[PATCH 4/4] MODSIGN: checking the blacklisted hash before loading a kernel module

2017-11-29 Thread Lee, Chun-Yi
, the hash can be compared by kernel. Cc: David Howells Cc: Josh Boyer Signed-off-by: "Lee, Chun-Yi" --- kernel/module_signing.c | 62 +++-- 1 file changed, 60 insertions(+), 2 deletions(-) diff --git a/kernel/module_signing.c b/kernel/module_

[PATCH 0/4] Using the hash in MOKx to blacklist kernel module

2017-11-29 Thread Lee, Chun-Yi
t. Or revoking a kernel module that it was signed by a unsecure key. Except MOKx, this patch set fixs another two issues: The MOK/MOKx should not be loaded when secure boot is disabled. And, modified error message prints out appropriate status string for reading by human being. Lee, Chun-

[PATCH 1/4] MODSIGN: do not load mok when secure boot disabled

2017-11-29 Thread Lee, Chun-Yi
Josh Boyer Signed-off-by: "Lee, Chun-Yi" --- certs/load_uefi.c | 26 +++--- 1 file changed, 15 insertions(+), 11 deletions(-) diff --git a/certs/load_uefi.c b/certs/load_uefi.c index 3d88459..d6de4d0 100644 --- a/certs/load_uefi.c +++ b/certs/load_uefi.c @@

[PATCH 0/4] Using the hash in MOKx to blacklist kernel module

2017-11-29 Thread Lee, Chun-Yi
hould not be loaded when secure boot is disabled. And, modified error message prints out appropriate status string for reading by human being. Lee, Chun-Yi (4): MODSIGN: do not load mok when secure boot disabled MODSIGN: print appropriate status message when getting UEFI certificates

[PATCH] efi: setting secure boot flag in EFI stub when the sentinel is tainted.

2017-10-28 Thread Lee, Chun-Yi
ecure boot flag can be kept when the secure mode is not _unset_. Therefore the flag value from EFI stub can also be kept. Reference: https://bugzilla.redhat.com/show_bug.cgi?id=1418360 Signed-off-by: "Lee, Chun-Yi" Cc: Matt Fleming Cc: David Howells Cc: Ard Biesheuvel --- arch/x86/boo

[PATCH] KEYS: Fix the wrong index when checking the existence of second id

2017-10-04 Thread Lee, Chun-Yi
iller" Signed-off-by: "Lee, Chun-Yi" --- crypto/asymmetric_keys/asymmetric_type.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/crypto/asymmetric_keys/asymmetric_type.c b/crypto/asymmetric_keys/asymmetric_type.c index 3a3b028..39aecad 100644 --- a/cr

[PATCH] KEYS: checking the input id parameters before finding asymmetric key

2017-10-04 Thread Lee, Chun-Yi
For finding asymmetric key, the input id_0 and id_1 parameters can not be NULL at the same time. This patch adds the BUG_ON checking for id_0 and id_1. Cc: David Howells Cc: Herbert Xu Cc: "David S. Miller" Signed-off-by: "Lee, Chun-Yi" --- crypto/asymmetric_keys/asymmet

[PATCH] X.509: Fix the buffer overflow in the utility function for OID string

2017-09-02 Thread Lee, Chun-Yi
kiewicz Cc: Andrew Morton Signed-off-by: "Lee, Chun-Yi" Signed-off-by: Takashi Iwai --- lib/oid_registry.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/lib/oid_registry.c b/lib/oid_registry.c index 318f382..41b9e50 100644 --- a/lib/oid_registry.c +++

[PATCH] X.509: Fix the buffer overflow in the utility function for OID string

2017-08-18 Thread Lee, Chun-Yi
czorkiewicz Signed-off-by: "Lee, Chun-Yi" --- lib/oid_registry.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/lib/oid_registry.c b/lib/oid_registry.c index 318f382..41b9e50 100644 --- a/lib/oid_registry.c +++ b/lib/oid_registry.c @@ -142,9 +142,9 @@ int sprint

[RFC PATCH v4] acpi: indicate to platform when hot remove returns busy

2017-07-06 Thread Lee, Chun-Yi
Move the "error code to ost code" logic to a help function. (Andy Shevchenko) Cc: "Rafael J. Wysocki" Cc: Len Brown Cc: Michal Hocko Reviewed-by: Andy Shevchenko Signed-off-by: "Lee, Chun-Yi" --- drivers/acpi/scan.c | 18 +- 1 file changed, 13 i

[PATCH v3] acpi: handle the acpi hotplug schedule error

2017-07-06 Thread Lee, Chun-Yi
Brown Cc: Michal Hocko Reviewed-by: Andy Shevchenko Signed-off-by: "Lee, Chun-Yi" --- drivers/acpi/bus.c | 8 ++-- 1 file changed, 6 insertions(+), 2 deletions(-) diff --git a/drivers/acpi/bus.c b/drivers/acpi/bus.c index 784bda6..9d4fea6 100644 --- a/drivers/acpi/bus.c +++

[RFC PATCH v4] acpi: indicate to platform when hot remove returns busy

2017-07-03 Thread Lee, Chun-Yi
Move the "error code to ost code" logic to a help function. (Andy Shevchenko) Cc: "Rafael J. Wysocki" Cc: Len Brown Cc: Andy Shevchenko Cc: Michal Hocko Signed-off-by: "Lee, Chun-Yi" --- drivers/acpi/scan.c | 18 +- 1 file changed, 13 insertions(+)

[PATCH v3] acpi: handle the acpi hotplug schedule error

2017-06-30 Thread Lee, Chun-Yi
Brown Cc: Michal Hocko Reviewed-by: Andy Shevchenko Signed-off-by: "Lee, Chun-Yi" --- drivers/acpi/bus.c | 8 ++-- 1 file changed, 6 insertions(+), 2 deletions(-) diff --git a/drivers/acpi/bus.c b/drivers/acpi/bus.c index 784bda6..9d4fea6 100644 --- a/drivers/acpi/bus.c +++

[RFC PATCH v3] acpi: indicate to platform when hot remove returns busy

2017-06-21 Thread Lee, Chun-Yi
) Cc: "Rafael J. Wysocki" Cc: Len Brown Cc: Andy Shevchenko Cc: Michal Hocko Signed-off-by: "Lee, Chun-Yi" --- drivers/acpi/scan.c | 21 +++-- 1 file changed, 15 insertions(+), 6 deletions(-) diff --git a/drivers/acpi/scan.c b/drivers/acpi/scan.c index 3a

[PATCH v2] acpi: handle the acpi hotplug schedule error

2017-06-21 Thread Lee, Chun-Yi
Shevchenko Signed-off-by: "Lee, Chun-Yi" --- drivers/acpi/bus.c | 9 +++-- 1 file changed, 7 insertions(+), 2 deletions(-) diff --git a/drivers/acpi/bus.c b/drivers/acpi/bus.c index 34fbe02..91adb71 100644 --- a/drivers/acpi/bus.c +++ b/drivers/acpi/bus.c @@ -427,12 +427,17 @@ static

[PATCH] acer-wmi: Using zero as the first WMI instance number

2017-06-20 Thread Lee, Chun-Yi
Hart Cc: Andy Shevchenko Cc: Pali Rohár Signed-off-by: "Lee, Chun-Yi" --- drivers/platform/x86/acer-wmi.c | 8 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/drivers/platform/x86/acer-wmi.c b/drivers/platform/x86/acer-wmi.c index 79fa5ab..ef420b6 100644 --- a/

[PATCH] tracepoints: Clean up the description of functions

2017-06-16 Thread Lee, Chun-Yi
The description of tracepoint_probe_register duplicates with tracepoint_probe_register_prio. This patch cleans up the description. Cc: Steven Rostedt Cc: Ingo Molnar Signed-off-by: "Lee, Chun-Yi" --- kernel/tracepoint.c | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) di

[RFC PATCH v3] acpi: indicate to platform when hot remove returns busy

2017-06-13 Thread Lee, Chun-Yi
) Cc: "Rafael J. Wysocki" Cc: Len Brown Cc: Andy Shevchenko Cc: Michal Hocko Signed-off-by: "Lee, Chun-Yi" --- drivers/acpi/scan.c | 21 +++-- 1 file changed, 15 insertions(+), 6 deletions(-) diff --git a/drivers/acpi/scan.c b/drivers/acpi/scan.c index 3a

[PATCH v2] acpi: handle the acpi hotplug schedule error

2017-06-13 Thread Lee, Chun-Yi
Shevchenko Signed-off-by: "Lee, Chun-Yi" --- drivers/acpi/bus.c | 9 +++-- 1 file changed, 7 insertions(+), 2 deletions(-) diff --git a/drivers/acpi/bus.c b/drivers/acpi/bus.c index 34fbe02..91adb71 100644 --- a/drivers/acpi/bus.c +++ b/drivers/acpi/bus.c @@ -427,12 +427,17 @@ static

[PATCH v2] acpi: indicate to platform when hot remove returns busy

2017-06-09 Thread Lee, Chun-Yi
rn code to ACPI_OST_SC_DEVICE_BUSY when the acpi hot remove function returns -EBUSY. v2: Do not overwrite ost code in acpi_generic_hotplug_event(). Move the "error code to ost code" logic to a help function. Cc: "Rafael J. Wysocki" Cc: Len Brown Cc: Andy Shevchenko Signed-off-by: "Lee, Chun

[PATCH v2] acpi: handle the acpi hotplug schedule error

2017-06-08 Thread Lee, Chun-Yi
Kernel should decrements the reference count of acpi device when the scheduling of acpi hotplug work is failed, and evaluates _OST to notify BIOS the failure. v2: To simplify the code. (Andy Shevchenko) Cc: "Rafael J. Wysocki" Cc: Len Brown Cc: Andy Shevchenko Signed-off-by: &qu

[RFC PATCH] acpi: indicate to platform when hot remove returns busy

2017-06-06 Thread Lee, Chun-Yi
EVICE_BUSY when the acpi hot remove function returns -EBUSY. Cc: "Rafael J. Wysocki" Cc: Len Brown Signed-off-by: "Lee, Chun-Yi" --- drivers/acpi/scan.c | 13 + 1 file changed, 9 insertions(+), 4 deletions(-) diff --git a/drivers/acpi/scan.c b/drivers/acpi

[PATCH] acpi: handle the acpi hotplug schedule error

2017-06-06 Thread Lee, Chun-Yi
Kernel should decrements the reference count of acpi device when scheduling acpi hotplug work is failed, and also evaluates _OST to notify BIOS the failure. Cc: "Rafael J. Wysocki" Cc: Len Brown Signed-off-by: "Lee, Chun-Yi" --- drivers/acpi/bus.c | 10 -- 1 file c

[RFC PATCH] acpi: indicate to platform when hot remove returns busy

2017-06-03 Thread Lee, Chun-Yi
EVICE_BUSY when the acpi hot remove function returns -EBUSY. Cc: "Rafael J. Wysocki" Cc: Len Brown Signed-off-by: "Lee, Chun-Yi" --- drivers/acpi/scan.c | 13 + 1 file changed, 9 insertions(+), 4 deletions(-) diff --git a/drivers/acpi/scan.c b/drivers/acpi

  1   2   3   >