[OpenPower-Firmware] [PATCH 00/16] skiroot: add secure boot support
Joel Stanley
joel at jms.id.au
Tue Jun 23 17:22:26 AEST 2020
On Tue, 16 Jun 2020 at 14:00, Klaus Heinrich Kiwi
<klaus at linux.vnet.ibm.com> wrote:
>
>
>
> On 6/15/2020 4:19 PM, Nayna Jain wrote:
> > This series is meant to add support for secure boot. The patches
> > are backported from v5.5 and higher.
> > It adds support for:
>
> Nayna,
>
> Joel can perhaps clarify, but I believe that the format we are expecting for
> this are patches on top of op-build...
>
> That means you have to use git-format-patch to patches on top of linux-kernel
> version used by upstream op-build and place them on op-build/openpower/linux,
> and then you commit those new files to your local op-build tree and once again
> use git-format-patch or git-send-email to this list to with the additions proposed
> to upstream op-build...
To avoid confusion: the format that Nayna has sent is what we are after.
Thanks,
Joel
>
> -Klaus
>
>
> > * ima arch specific policies for powerpc
> > * platform keyring for powerpc
> > * check against blacklist hashes
> > * sysfs interface to expose secure variables from OPAL
> > * xmon lockdown
> >
> > Christopher M. Riedl (2):
> > powerpc/xmon: Allow listing and clearing breakpoints in read-only mode
> > powerpc/xmon: Restrict when kernel is locked down
> >
> > Mimi Zohar (1):
> > powerpc/ima: Indicate kernel modules appended signatures are enforced
> >
> > Nayna Jain (13):
> > powerpc: Detect the secure boot mode of the system
> > powerpc/ima: Add support to initialize ima policy rules
> > powerpc: Detect the trusted boot state of the system
> > powerpc/ima: Define trusted boot policy
> > ima: Make process_buffer_measurement() generic
> > certs: Add wrapper function to check blacklisted binary hash
> > ima: Check against blacklisted hashes for files with modsig
> > powerpc/ima: Update ima arch policy to check for blacklist
> > powerpc/powernv: Add OPAL API interface to access secure variable
> > powerpc: expose secure variables to userspace via sysfs
> > x86/efi: move common keyring handler functions to new file
> > powerpc: Load firmware trusted keys/hashes into kernel keyring
> > powerpc/ima: fix secure boot rules in ima arch policy
> >
> > Documentation/ABI/testing/ima_policy | 4 +
> > Documentation/ABI/testing/sysfs-secvar | 46 ++++
> > arch/powerpc/Kconfig | 22 ++
> > arch/powerpc/include/asm/opal-api.h | 5 +-
> > arch/powerpc/include/asm/opal.h | 7 +
> > arch/powerpc/include/asm/secure_boot.h | 29 ++
> > arch/powerpc/include/asm/secvar.h | 35 +++
> > arch/powerpc/kernel/Makefile | 3 +
> > arch/powerpc/kernel/ima_arch.c | 78 ++++++
> > arch/powerpc/kernel/secure_boot.c | 50 ++++
> > arch/powerpc/kernel/secvar-ops.c | 17 ++
> > arch/powerpc/kernel/secvar-sysfs.c | 248 ++++++++++++++++++
> > arch/powerpc/platforms/powernv/Makefile | 1 +
> > arch/powerpc/platforms/powernv/opal-call.c | 3 +
> > arch/powerpc/platforms/powernv/opal-secvar.c | 140 ++++++++++
> > arch/powerpc/platforms/powernv/opal.c | 3 +
> > arch/powerpc/xmon/xmon.c | 119 +++++++--
> > certs/blacklist.c | 9 +
> > include/keys/system_keyring.h | 6 +
> > include/linux/ima.h | 3 +-
> > include/linux/security.h | 2 +
> > security/integrity/Kconfig | 9 +
> > security/integrity/Makefile | 7 +-
> > security/integrity/ima/ima.h | 11 +
> > security/integrity/ima/ima_appraise.c | 33 +++
> > security/integrity/ima/ima_main.c | 70 +++--
> > security/integrity/ima/ima_policy.c | 12 +-
> > security/integrity/integrity.h | 1 +
> > .../platform_certs/keyring_handler.c | 80 ++++++
> > .../platform_certs/keyring_handler.h | 32 +++
> > .../integrity/platform_certs/load_powerpc.c | 96 +++++++
> > security/integrity/platform_certs/load_uefi.c | 67 +----
> > security/lockdown/lockdown.c | 2 +
> > 33 files changed, 1130 insertions(+), 120 deletions(-)
> > create mode 100644 Documentation/ABI/testing/sysfs-secvar
> > create mode 100644 arch/powerpc/include/asm/secure_boot.h
> > create mode 100644 arch/powerpc/include/asm/secvar.h
> > create mode 100644 arch/powerpc/kernel/ima_arch.c
> > create mode 100644 arch/powerpc/kernel/secure_boot.c
> > create mode 100644 arch/powerpc/kernel/secvar-ops.c
> > create mode 100644 arch/powerpc/kernel/secvar-sysfs.c
> > create mode 100644 arch/powerpc/platforms/powernv/opal-secvar.c
> > create mode 100644 security/integrity/platform_certs/keyring_handler.c
> > create mode 100644 security/integrity/platform_certs/keyring_handler.h
> > create mode 100644 security/integrity/platform_certs/load_powerpc.c
> >
>
> --
> Klaus Heinrich Kiwi <klaus at linux.vnet.ibm.com>
More information about the OpenPower-Firmware
mailing list