Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp2491498pxb; Sun, 23 Jan 2022 06:24:00 -0800 (PST) X-Google-Smtp-Source: ABdhPJyQHzjnawxmv8AXsQyvX848CD1aRs8IQbRPACT3QkDCpnjP2kJCEDYd2LuPe3aAYhd87j2C X-Received: by 2002:a17:90b:4a09:: with SMTP id kk9mr9027235pjb.237.1642947840539; Sun, 23 Jan 2022 06:24:00 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1642947840; cv=none; d=google.com; s=arc-20160816; b=Y/dTJJMBrPJ2VT6jfVY8BxqFHPMTtDFdNlJzruftBEKOIrr89hszG7eeVRlZx+YmXS i/sWvXgCO1h5y/zdLptKWW3I5hBhCArp2mitiLHmMQKskDq08paz26+jZ3ZUk86Zyl0h ewo6VA+KARGuKahWFBOKeiLS5W4DY6GEAe4MXChu3V/Eor9hvgfIc7P3CuZJCrk6mqM0 t4BB7WbrYNbJBUnfhwgQWzHiXVaM7duQdZ8zJaib8ouSpR+NVDRAPQusX4Er2yLfWBCB VKaVDvAw1uBoLnMPrR62qr4Oxptn1k0DaMUVubfZFQI0mIfbEcI/0Tu/14nuMUJpdCww yxVg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=DWp0AATfNgPvoG+R6f/HbqPdUlzi3X9Z8h6LsNvuC3U=; b=j7roO62iZUDlxWnFeihBmI5yAl6Xx0D1vzqINgYk2Wy0uVVH5SfTuA9t/5Sa7n48Yn UQNyzKIqNTzjeVRt/+1iJwEQ/HPnL9oLK7M1P03HvHqFOxvmaMhbp/Zh6lW9IkezO/ub Qe9U+FfAhWOsWKJY01X43uoufTXASMeN3afuEvJRv13bZDRlYeB7OwXcqc4deQdVXoK1 0VfCEQcX3ipSp1/gGW2uUrmviDLw1LD/MM6caHg7yXMk9yhzzhOQWEXoNnuN+T9SPh6t /qPwFrDF0SkHoadNrOQQExwvoIBGC/cyAxPMkWsK0W+xl29QARJTiLmViNK7Wn9vZVO/ MzcA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=pI1ceGoV; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id bc2si10260075plb.349.2022.01.23.06.23.48; Sun, 23 Jan 2022 06:24:00 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=pI1ceGoV; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233546AbiAVH3c (ORCPT + 99 others); Sat, 22 Jan 2022 02:29:32 -0500 Received: from dfw.source.kernel.org ([139.178.84.217]:54488 "EHLO dfw.source.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230174AbiAVH3c (ORCPT ); Sat, 22 Jan 2022 02:29:32 -0500 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 88E8560915 for ; Sat, 22 Jan 2022 07:29:31 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 0D2B9C004E1; Sat, 22 Jan 2022 07:29:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1642836570; bh=cMWRKsI8TI2NHT84jTQS/VsDVS8oI5QJbf0MXIj7kt0=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=pI1ceGoVu3CvLVt/6heTjt81u7y+XDx/Uw6BOOSObPJW4WPvVtM5NhbPo6poe2GPQ tdZKznbXRQN+CEn4N451Wc8DtVhEyKoAlz4/PwX2FXWc6KDagqwQgHn9TU7nRGlxrr UIb/aGYJKpTrwLWT6QFH4a5O2fl+WFVq49KXzpCM= Date: Sat, 22 Jan 2022 08:29:21 +0100 From: Greg KH To: Nayna Jain Cc: linuxppc-dev@lists.ozlabs.org, Michael Ellerman , Daniel Axtens , George Wilson , Douglas Miller , gjoyce@ibm.com, linux-kernel@vger.kernel.org Subject: Re: [RFC PATCH 0/2] powerpc/pseries: add support for local secure storage called Platform Keystore(PKS) Message-ID: References: <20220122005637.28199-1-nayna@linux.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20220122005637.28199-1-nayna@linux.ibm.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Jan 21, 2022 at 07:56:35PM -0500, Nayna Jain wrote: > PowerVM provides an isolated Platform Keystore(PKS) storage allocation > for each partition with individually managed access controls to store > sensitive information securely. Linux Kernel can access this storage by > interfacing with hypervisor using a new set of hypervisor calls. > > PowerVM guest secure boot intend to use Platform Keystore for the > purpose of storing public keys. Secure boot requires public keys to > be able to verify the grub and boot kernel. To allow authenticated > manipulation of keys, it supports variables to store key authorities > - PK/KEK and code signing keys - db. It also supports denied list to > disallow booting even if signed with valid key. This is done via > denied list database - dbx or sbat. These variables would be stored in > PKS, and are managed and controlled by firmware. > > The purpose of this patchset is to add support for users to > read/write/add/delete variables required for secure boot on PowerVM. Ok, this is like the 3rd or 4th different platform-specific proposal for this type of functionality. I think we need to give up on platform-specific user/kernel apis on this (random sysfs/securityfs files scattered around the tree), and come up with a standard place for all of this. Please work with the other developers of the other drivers for this to make this unified so that userspace has a chance to use this in a sane manner. thanks, greg k-h