Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp2228128ybx; Fri, 8 Nov 2019 01:43:48 -0800 (PST) X-Google-Smtp-Source: APXvYqz9tkR9DMAR8U/Po2f1mxMExmlNeOctrxYPNOCAySH5K7kNhaxApkURy1om16xAAdDPVtpL X-Received: by 2002:a17:906:1b41:: with SMTP id p1mr7671129ejg.65.1573206228222; Fri, 08 Nov 2019 01:43:48 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1573206228; cv=none; d=google.com; s=arc-20160816; b=GuTI+FhP5Yd3fcBt8vaOHCdqp1g9GxfCoPpVZzuNwq/Is0pB9Rkxz5T8/MVXeHdIr/ L3cnmuFg5bWEZ1ITYWHw7MxVsE2ogmboy+CwGKy8JQcVAdAMyZDOdcHQxyVoOEnB7tTC e1L6j6B5mWG29gWNm05NXNjioARrekqw4cJORq5qIRq23EALb2na14XnWkLqwKcF0Mos MoEWUGq4RPkPHmaovqfOsPUaVdE83EzjPtqX5S1sNzpQXz8MPOvJ60MHgZyt1kz9wsVl PN/btnyQ8RLJQMC5i1xcHMgPTrvRFpHOodjWZfWAIaY4xHiyoVQzoCawcd3tqzCGaPfN Vylw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:references :in-reply-to:subject:cc:to:from:dkim-signature; bh=HvrKoIhAF5A/C9PHFucCYFrORKb6iW6KQaqTs5R/XiY=; b=RwZmwTRtl8F84dD0pLBQgTnfdbyikbONGNnLphBAR6B9aCVG+hdV+pdt7H/dbdI9BS z4ImnjPG4nmA1OGYDsYQMTlLG8wsL4aQNCOl99jQfBg9FlE/pnxhWNOG9ql3aCEcaiiZ pOU87TCXhNN+bLCR/0qn88bjfL6kuDvIx2ExMy1NEZAlAdpQGnnXUwuIoJIXhaqeIeel dc28gz4E2fEY71HOQA4PrAhaVxy4U+KKNNdd6WMeJqlbFxPadTCeImtl9X+jztlrDB1R oi6HWTWx3VCkX/nYMLT7ptbklvr1TbL2GNjmS6ht0Z2C64T+Ggzr1veib7v18NghSobo MYkA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ellerman.id.au header.s=201909 header.b="fR/E8RyI"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b10si3592277eds.63.2019.11.08.01.43.24; Fri, 08 Nov 2019 01:43:48 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@ellerman.id.au header.s=201909 header.b="fR/E8RyI"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731556AbfKHJml (ORCPT + 99 others); Fri, 8 Nov 2019 04:42:41 -0500 Received: from ozlabs.org ([203.11.71.1]:53119 "EHLO ozlabs.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731436AbfKHJmj (ORCPT ); Fri, 8 Nov 2019 04:42:39 -0500 Received: from authenticated.ozlabs.org (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mail.ozlabs.org (Postfix) with ESMTPSA id 478b0W3jgtz9sP6; Fri, 8 Nov 2019 20:42:34 +1100 (AEDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ellerman.id.au; s=201909; t=1573206156; bh=HX/zf896+L+aLj5O52hjw0t0TJACu18gwzubsdQDKao=; h=From:To:Cc:Subject:In-Reply-To:References:Date:From; b=fR/E8RyIIV9SH5jJ24k4CkSnV7QgtDW3LJ+kkvk99VO/lnDNUOeEMuzs+17FqtD9s f9aDOFogdkIoR66y2NBPqigmk+WXxeltzF0G18vpZNKTHgjj1tVXNfIl4qcwr49R+4 KjvsjjfYuOPp1jNkkvlHTM308O3ZfX5yO6V74oyTLvNWwFqPkL1vDIlRqjih0EXEeZ /YnjCKOb7FacQDI7/ZRvygb/VyPh+EZRIvOhLR9gsJ9Jp8PPUWb//aUfqzafQDh4vo roR1lEI0zAvgko5ZtaCyObtNxgeQDkeADjto2j3KY+ZDFRFBaBnwMwY+aVCteqyxZ1 JhwFXFnfFOOPw== From: Michael Ellerman To: Eric Richter , linuxppc-dev@ozlabs.org, linux-efi@vger.kernel.org, linux-integrity@vger.kernel.org Cc: linux-kernel@vger.kernel.org, Benjamin Herrenschmidt , Paul Mackerras , Ard Biesheuvel , Jeremy Kerr , Matthew Garret , Mimi Zohar , Greg Kroah-Hartman , Claudio Carvalho , George Wilson , Elaine Palmer , Eric Ricther , Oliver O'Halloran , Nayna Jain Subject: Re: [PATCH v7 4/4] powerpc: load firmware trusted keys/hashes into kernel keyring In-Reply-To: <20191107042205.13710-5-erichte@linux.ibm.com> References: <20191107042205.13710-1-erichte@linux.ibm.com> <20191107042205.13710-5-erichte@linux.ibm.com> Date: Fri, 08 Nov 2019 20:42:26 +1100 Message-ID: <87eeyi4scd.fsf@mpe.ellerman.id.au> MIME-Version: 1.0 Content-Type: text/plain Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Eric Richter writes: > From: Nayna Jain > > The keys used to verify the Host OS kernel are managed by firmware as > secure variables. This patch loads the verification keys into the .platform > keyring and revocation hashes into .blacklist keyring. This enables > verification and loading of the kernels signed by the boot time keys which > are trusted by firmware. > > Signed-off-by: Nayna Jain > Reviewed-by: Mimi Zohar > Signed-off-by: Eric Richter > --- > arch/powerpc/Kconfig | 1 + > security/integrity/Kconfig | 8 ++ > security/integrity/Makefile | 4 +- > .../integrity/platform_certs/load_powerpc.c | 98 +++++++++++++++++++ > 4 files changed, 110 insertions(+), 1 deletion(-) > create mode 100644 security/integrity/platform_certs/load_powerpc.c > > diff --git a/arch/powerpc/Kconfig b/arch/powerpc/Kconfig > index cabc091f3fe1..498967a5ef4e 100644 > --- a/arch/powerpc/Kconfig > +++ b/arch/powerpc/Kconfig > @@ -939,6 +939,7 @@ config PPC_SECURE_BOOT > bool > depends on PPC_POWERNV > depends on IMA_ARCH_POLICY > + select LOAD_PPC_KEYS This gave me a warning: WARNING: unmet direct dependencies detected for LOAD_PPC_KEYS Depends on [n]: INTEGRITY [=y] && INTEGRITY_PLATFORM_KEYRING [=n] && PPC_SECURE_BOOT [=y] Selected by [y]: - PPC_SECURE_BOOT [=y] && PPC_POWERNV [=y] && IMA_ARCH_POLICY [=y] I think you should probably just drop the select .. > diff --git a/security/integrity/Kconfig b/security/integrity/Kconfig > index 0bae6adb63a9..26abee23e4e3 100644 > --- a/security/integrity/Kconfig > +++ b/security/integrity/Kconfig > @@ -72,6 +72,14 @@ config LOAD_IPL_KEYS > depends on S390 > def_bool y > > +config LOAD_PPC_KEYS > + bool "Enable loading of platform and blacklisted keys for POWER" > + depends on INTEGRITY_PLATFORM_KEYRING > + depends on PPC_SECURE_BOOT > + help > + Enable loading of keys to the .platform keyring and blacklisted > + hashes to the .blacklist keyring for powerpc based platforms. And instead make this default y, if you think it should be enabled by default when its prerequisites are met. cheers