[OpenPower-Firmware] [PATCH 00/16] skiroot: add secure boot support

Klaus Heinrich Kiwi klaus at linux.vnet.ibm.com
Wed Jun 17 00:00:06 AEST 2020



On 6/15/2020 4:19 PM, Nayna Jain wrote:
> This series is meant to add support for secure boot. The patches
> are backported from v5.5 and higher.
> It adds support for:

Nayna,

  Joel can perhaps clarify, but I believe that the format we are expecting for
this are patches on top of op-build...

That means you have to use git-format-patch to patches on top of linux-kernel
version used by upstream op-build and place them on op-build/openpower/linux,
and then you commit those new files to your local op-build tree and once again
use git-format-patch or git-send-email to this list to with the additions proposed
to upstream op-build...

  -Klaus


> * ima arch specific policies for powerpc
> * platform keyring for powerpc
> * check against blacklist hashes
> * sysfs interface to expose secure variables from OPAL
> * xmon lockdown
> 
> Christopher M. Riedl (2):
>    powerpc/xmon: Allow listing and clearing breakpoints in read-only mode
>    powerpc/xmon: Restrict when kernel is locked down
> 
> Mimi Zohar (1):
>    powerpc/ima: Indicate kernel modules appended signatures are enforced
> 
> Nayna Jain (13):
>    powerpc: Detect the secure boot mode of the system
>    powerpc/ima: Add support to initialize ima policy rules
>    powerpc: Detect the trusted boot state of the system
>    powerpc/ima: Define trusted boot policy
>    ima: Make process_buffer_measurement() generic
>    certs: Add wrapper function to check blacklisted binary hash
>    ima: Check against blacklisted hashes for files with modsig
>    powerpc/ima: Update ima arch policy to check for blacklist
>    powerpc/powernv: Add OPAL API interface to access secure variable
>    powerpc: expose secure variables to userspace via sysfs
>    x86/efi: move common keyring handler functions to new file
>    powerpc: Load firmware trusted keys/hashes into kernel keyring
>    powerpc/ima: fix secure boot rules in ima arch policy
> 
>   Documentation/ABI/testing/ima_policy          |   4 +
>   Documentation/ABI/testing/sysfs-secvar        |  46 ++++
>   arch/powerpc/Kconfig                          |  22 ++
>   arch/powerpc/include/asm/opal-api.h           |   5 +-
>   arch/powerpc/include/asm/opal.h               |   7 +
>   arch/powerpc/include/asm/secure_boot.h        |  29 ++
>   arch/powerpc/include/asm/secvar.h             |  35 +++
>   arch/powerpc/kernel/Makefile                  |   3 +
>   arch/powerpc/kernel/ima_arch.c                |  78 ++++++
>   arch/powerpc/kernel/secure_boot.c             |  50 ++++
>   arch/powerpc/kernel/secvar-ops.c              |  17 ++
>   arch/powerpc/kernel/secvar-sysfs.c            | 248 ++++++++++++++++++
>   arch/powerpc/platforms/powernv/Makefile       |   1 +
>   arch/powerpc/platforms/powernv/opal-call.c    |   3 +
>   arch/powerpc/platforms/powernv/opal-secvar.c  | 140 ++++++++++
>   arch/powerpc/platforms/powernv/opal.c         |   3 +
>   arch/powerpc/xmon/xmon.c                      | 119 +++++++--
>   certs/blacklist.c                             |   9 +
>   include/keys/system_keyring.h                 |   6 +
>   include/linux/ima.h                           |   3 +-
>   include/linux/security.h                      |   2 +
>   security/integrity/Kconfig                    |   9 +
>   security/integrity/Makefile                   |   7 +-
>   security/integrity/ima/ima.h                  |  11 +
>   security/integrity/ima/ima_appraise.c         |  33 +++
>   security/integrity/ima/ima_main.c             |  70 +++--
>   security/integrity/ima/ima_policy.c           |  12 +-
>   security/integrity/integrity.h                |   1 +
>   .../platform_certs/keyring_handler.c          |  80 ++++++
>   .../platform_certs/keyring_handler.h          |  32 +++
>   .../integrity/platform_certs/load_powerpc.c   |  96 +++++++
>   security/integrity/platform_certs/load_uefi.c |  67 +----
>   security/lockdown/lockdown.c                  |   2 +
>   33 files changed, 1130 insertions(+), 120 deletions(-)
>   create mode 100644 Documentation/ABI/testing/sysfs-secvar
>   create mode 100644 arch/powerpc/include/asm/secure_boot.h
>   create mode 100644 arch/powerpc/include/asm/secvar.h
>   create mode 100644 arch/powerpc/kernel/ima_arch.c
>   create mode 100644 arch/powerpc/kernel/secure_boot.c
>   create mode 100644 arch/powerpc/kernel/secvar-ops.c
>   create mode 100644 arch/powerpc/kernel/secvar-sysfs.c
>   create mode 100644 arch/powerpc/platforms/powernv/opal-secvar.c
>   create mode 100644 security/integrity/platform_certs/keyring_handler.c
>   create mode 100644 security/integrity/platform_certs/keyring_handler.h
>   create mode 100644 security/integrity/platform_certs/load_powerpc.c
> 

-- 
Klaus Heinrich Kiwi <klaus at linux.vnet.ibm.com>


More information about the OpenPower-Firmware mailing list