Message ID | 20230120074306.1326298-25-ajd@linux.ibm.com |
---|---|
State | New |
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:adf:eb09:0:0:0:0:0 with SMTP id s9csp65673wrn; Thu, 19 Jan 2023 23:45:12 -0800 (PST) X-Google-Smtp-Source: AMrXdXvRJ5f/VWkJZlV3Vux/tKhjJtv+fhpuy5ScCp/SlVgEF/EEjBdUv+KFa92HXaSeyRS8kBV2 X-Received: by 2002:a17:90a:c298:b0:229:b5e:2e03 with SMTP id f24-20020a17090ac29800b002290b5e2e03mr13503220pjt.32.1674200711958; Thu, 19 Jan 2023 23:45:11 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1674200711; cv=none; d=google.com; s=arc-20160816; b=iNkxsrZcwuS0qqVt62SZp1niNAv5nlQzjlCGe8LaG96IpFc42mlRwsknKzh80DaqEB +DtV3DzhcSymmCcaynSuXFSqBByZ0rvE+komrOV4pEMhs3SkBzkkCqO+CnDN1bbKuO0U 7GL0p7zGk5Lw/yvwmW8/frTndCYGwtrpJKp8pgF96uZ6HvrUbGn2I8LwI/9v9LsXp4XF NzF9j2kF60FWMEEQhCcFCAva3j2N7IULEKqOCVHa9N1j0oW9iYgKWK9NTuZTM0dBWQ+3 iVKygEZglZmbsrlxyfWztgCMDFlMMDyWYg4/dNdegbH2XsUGj0rDap+f+O2szi0j0uy/ 8nYQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=DkjetBvNyupAHj8KhGylZIP4X9T8JCN3PLJ/4RRN4zc=; b=FyaFhqwolVyzVySsLtoGXZaNBFDWSmdaiRMaZZ288A3DwF8f2ZAIumr2u3RAJgK7pp WWvnXShx0D7sFjDl0nexH6WXw2TlBTYQhGN+dQ+KsRPXAtrI/gV+vJ21L8AXHCEosXuU zOiG+m6Pcb8miwnUSPzZPes3IfN9FKgVBU1ipdnpWA+QCJJnLBFBHuny1hX/dKeRfsNu 1Zy1wEpbNB7bpd1AgyYXuKtbqvs73S1uWmRtroTRUdkiSC9HdBJdnwk2A5vE7yPHY9v5 5ykX3VA7cFCN5XSRDIq4lEU0vaVYA0iOVzvJTwTBsH+MrmHKLXe7KCV1glbzLNP3/F/e A9ZQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ibm.com header.s=pp1 header.b=QKTuzhB3; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=NONE dis=NONE) header.from=ibm.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id 140-20020a630092000000b004ad157c46bbsi41769029pga.649.2023.01.19.23.44.58; Thu, 19 Jan 2023 23:45:11 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@ibm.com header.s=pp1 header.b=QKTuzhB3; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230522AbjATHoi (ORCPT <rfc822;changwoo.m@gmail.com> + 99 others); Fri, 20 Jan 2023 02:44:38 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44988 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230219AbjATHnv (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Fri, 20 Jan 2023 02:43:51 -0500 Received: from mx0a-001b2d01.pphosted.com (mx0a-001b2d01.pphosted.com [148.163.156.1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8DB997DFAA; Thu, 19 Jan 2023 23:43:49 -0800 (PST) Received: from pps.filterd (m0098404.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 30K7JfAb027594; Fri, 20 Jan 2023 07:43:42 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ibm.com; h=from : to : cc : subject : date : message-id : in-reply-to : references : mime-version : content-transfer-encoding; s=pp1; bh=DkjetBvNyupAHj8KhGylZIP4X9T8JCN3PLJ/4RRN4zc=; b=QKTuzhB3tbIEqykyYDxEhB+WKJyo4pe3wNzAql1+/BIQ3eh/ETnFLc0sCrSg2kSGefe7 i1QZ8zvqpFZjH+m59d2BoUsnubCC5RlI43+AF34jLWN6fDyV/JQ9XqLdyfpOJ5pAOR19 /kMktxPpSQd8Ku5rcgYe5torIGdoaziBA4d0BwyhlSIJebCKj/drov0jy2ly3ju5H1nv 85Z7LflXYWgAftRFE46FfncRnAf5Vkm0c0Zw67o0NsLRTizSYxoicXVEV1SHesTc+vSK d9GRyrplcRbjrFaRT3E7gtjtDPpJoD0vfIsnjMg4Omjslb8MKxBo26S+A2kv4kZDE/hb DQ== Received: from ppma01fra.de.ibm.com (46.49.7a9f.ip4.static.sl-reverse.com [159.122.73.70]) by mx0a-001b2d01.pphosted.com (PPS) with ESMTPS id 3n7pfj8ck8-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 20 Jan 2023 07:43:41 +0000 Received: from pps.filterd (ppma01fra.de.ibm.com [127.0.0.1]) by ppma01fra.de.ibm.com (8.17.1.19/8.17.1.19) with ESMTP id 30JLDIIN025743; Fri, 20 Jan 2023 07:43:39 GMT Received: from smtprelay06.fra02v.mail.ibm.com ([9.218.2.230]) by ppma01fra.de.ibm.com (PPS) with ESMTPS id 3n3m16dkgy-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 20 Jan 2023 07:43:39 +0000 Received: from smtpav03.fra02v.mail.ibm.com (smtpav03.fra02v.mail.ibm.com [10.20.54.102]) by smtprelay06.fra02v.mail.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id 30K7haXP23855480 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Fri, 20 Jan 2023 07:43:36 GMT Received: from smtpav03.fra02v.mail.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 988E520043; Fri, 20 Jan 2023 07:43:36 +0000 (GMT) Received: from smtpav03.fra02v.mail.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 1D9A220040; Fri, 20 Jan 2023 07:43:36 +0000 (GMT) Received: from ozlabs.au.ibm.com (unknown [9.192.253.14]) by smtpav03.fra02v.mail.ibm.com (Postfix) with ESMTP; Fri, 20 Jan 2023 07:43:36 +0000 (GMT) Received: from jarvis-ozlabs-ibm-com.ozlabs.ibm.com (haven.au.ibm.com [9.192.254.114]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ozlabs.au.ibm.com (Postfix) with ESMTPSA id 6F235609C3; Fri, 20 Jan 2023 18:43:30 +1100 (AEDT) From: Andrew Donnellan <ajd@linux.ibm.com> To: linuxppc-dev@lists.ozlabs.org, linux-integrity@vger.kernel.org Cc: gregkh@linuxfoundation.org, gcwilson@linux.ibm.com, linux-kernel@vger.kernel.org, nayna@linux.ibm.com, ruscur@russell.cc, zohar@linux.ibm.com, mpe@ellerman.id.au, gjoyce@linux.ibm.com, sudhakar@linux.ibm.com, bgray@linux.ibm.com, erichte@linux.ibm.com, joel@jms.id.au Subject: [PATCH v4 24/24] integrity/powerpc: Support loading keys from pseries secvar Date: Fri, 20 Jan 2023 18:43:06 +1100 Message-Id: <20230120074306.1326298-25-ajd@linux.ibm.com> X-Mailer: git-send-email 2.39.0 In-Reply-To: <20230120074306.1326298-1-ajd@linux.ibm.com> References: <20230120074306.1326298-1-ajd@linux.ibm.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-TM-AS-GCONF: 00 X-Proofpoint-ORIG-GUID: Qm1zgF_EukHmA95Zx8ly3KCZV9BOTRcV X-Proofpoint-GUID: Qm1zgF_EukHmA95Zx8ly3KCZV9BOTRcV X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.219,Aquarius:18.0.930,Hydra:6.0.562,FMLib:17.11.122.1 definitions=2023-01-20_04,2023-01-19_01,2022-06-22_01 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 impostorscore=0 mlxlogscore=999 phishscore=0 lowpriorityscore=0 malwarescore=0 spamscore=0 adultscore=0 bulkscore=0 suspectscore=0 clxscore=1015 mlxscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2212070000 definitions=main-2301200070 X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_EF,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1755526685823860129?= X-GMAIL-MSGID: =?utf-8?q?1755526685823860129?= |
Series |
pSeries dynamic secure boot secvar interface + platform keyring loading
|
|
Commit Message
Andrew Donnellan
Jan. 20, 2023, 7:43 a.m. UTC
From: Russell Currey <ruscur@russell.cc> The secvar object format is only in the device tree under powernv. We now have an API call to retrieve it in a generic way, so we should use that instead of having to handle the DT here. Add support for pseries secvar, with the "ibm,plpks-sb-v1" format. The object format is expected to be the same, so there shouldn't be any functional differences between objects retrieved from powernv and pseries. Signed-off-by: Russell Currey <ruscur@russell.cc> Signed-off-by: Andrew Donnellan <ajd@linux.ibm.com> --- v3: New patch v4: Pass format buffer size (stefanb, npiggin) --- .../integrity/platform_certs/load_powerpc.c | 17 ++++++++++------- 1 file changed, 10 insertions(+), 7 deletions(-)
Comments
On Fri Jan 20, 2023 at 5:43 PM AEST, Andrew Donnellan wrote: > From: Russell Currey <ruscur@russell.cc> > > The secvar object format is only in the device tree under powernv. > We now have an API call to retrieve it in a generic way, so we should > use that instead of having to handle the DT here. > > Add support for pseries secvar, with the "ibm,plpks-sb-v1" format. > The object format is expected to be the same, so there shouldn't be any > functional differences between objects retrieved from powernv and > pseries. > > Signed-off-by: Russell Currey <ruscur@russell.cc> > Signed-off-by: Andrew Donnellan <ajd@linux.ibm.com> > > --- > > v3: New patch > > v4: Pass format buffer size (stefanb, npiggin) > --- > .../integrity/platform_certs/load_powerpc.c | 17 ++++++++++------- > 1 file changed, 10 insertions(+), 7 deletions(-) > > diff --git a/security/integrity/platform_certs/load_powerpc.c b/security/integrity/platform_certs/load_powerpc.c > index dee51606d5f4..d4ce91bf3fec 100644 > --- a/security/integrity/platform_certs/load_powerpc.c > +++ b/security/integrity/platform_certs/load_powerpc.c > @@ -10,7 +10,6 @@ > #include <linux/cred.h> > #include <linux/err.h> > #include <linux/slab.h> > -#include <linux/of.h> > #include <asm/secure_boot.h> > #include <asm/secvar.h> > #include "keyring_handler.h" > @@ -59,16 +58,22 @@ static int __init load_powerpc_certs(void) > void *db = NULL, *dbx = NULL; > u64 dbsize = 0, dbxsize = 0; > int rc = 0; > - struct device_node *node; > + ssize_t len; > + char buf[32]; > > if (!secvar_ops) > return -ENODEV; > > - /* The following only applies for the edk2-compat backend. */ > - node = of_find_compatible_node(NULL, NULL, "ibm,edk2-compat-v1"); > - if (!node) > + len = secvar_ops->format(buf, 32); sizeof(buf)? Thanks, Nick
On Fri, 2023-01-20 at 18:43 +1100, Andrew Donnellan wrote: > From: Russell Currey <ruscur@russell.cc> > > The secvar object format is only in the device tree under powernv. > We now have an API call to retrieve it in a generic way, so we should > use that instead of having to handle the DT here. > > Add support for pseries secvar, with the "ibm,plpks-sb-v1" format. > The object format is expected to be the same, so there shouldn't be any > functional differences between objects retrieved from powernv and > pseries. > > Signed-off-by: Russell Currey <ruscur@russell.cc> > Signed-off-by: Andrew Donnellan <ajd@linux.ibm.com> > > --- > > v3: New patch > > v4: Pass format buffer size (stefanb, npiggin) > --- > .../integrity/platform_certs/load_powerpc.c | 17 ++++++++++------- > 1 file changed, 10 insertions(+), 7 deletions(-) > > diff --git a/security/integrity/platform_certs/load_powerpc.c b/security/integrity/platform_certs/load_powerpc.c > index dee51606d5f4..d4ce91bf3fec 100644 > --- a/security/integrity/platform_certs/load_powerpc.c > +++ b/security/integrity/platform_certs/load_powerpc.c > @@ -10,7 +10,6 @@ > #include <linux/cred.h> > #include <linux/err.h> > #include <linux/slab.h> > -#include <linux/of.h> > #include <asm/secure_boot.h> > #include <asm/secvar.h> > #include "keyring_handler.h" > @@ -59,16 +58,22 @@ static int __init load_powerpc_certs(void) > void *db = NULL, *dbx = NULL; > u64 dbsize = 0, dbxsize = 0; > int rc = 0; > - struct device_node *node; > + ssize_t len; > + char buf[32]; > > if (!secvar_ops) > return -ENODEV; > > - /* The following only applies for the edk2-compat backend. */ > - node = of_find_compatible_node(NULL, NULL, "ibm,edk2-compat-v1"); > - if (!node) > + len = secvar_ops->format(buf, 32); "powerpc/secvar: Handle format string in the consumer" defines opal_secvar_format() for the object format "ibm,secvar-backend". Here shouldn't it being returning the format for "ibm,edk2-compat-v1"? Mimi > + if (len <= 0) > return -ENODEV; > > + // Check for known secure boot implementations from OPAL or PLPKS > + if (strcmp("ibm,edk2-compat-v1", buf) && strcmp("ibm,plpks-sb-v1", buf)) { > + pr_err("Unsupported secvar implementation \"%s\", not loading certs\n", buf); > + return -ENODEV; > + } > + > /* > * Get db, and dbx. They might not exist, so it isn't an error if we > * can't get them. > @@ -103,8 +108,6 @@ static int __init load_powerpc_certs(void) > kfree(dbx); > } > > - of_node_put(node); > - > return rc; > } > late_initcall(load_powerpc_certs);
On Tue, 2023-01-24 at 10:14 -0500, Mimi Zohar wrote: > > - /* The following only applies for the edk2-compat backend. > > */ > > - node = of_find_compatible_node(NULL, NULL, "ibm,edk2- > > compat-v1"); > > - if (!node) > > + len = secvar_ops->format(buf, 32); > > "powerpc/secvar: Handle format string in the consumer" defines > opal_secvar_format() for the object format "ibm,secvar-backend". > Here > shouldn't it being returning the format for "ibm,edk2-compat-v1"? opal_secvar_format() doesn't return "ibm,secvar-backend", it searches for the device tree node named "ibm,secvar-backend", then reads and returns the contents of the property "format" under that node. The expected content of the format property is "ibm,edk2-compat-v1".
On Tue, 2023-01-24 at 10:14 -0500, Mimi Zohar wrote: > On Fri, 2023-01-20 at 18:43 +1100, Andrew Donnellan wrote: > > From: Russell Currey <ruscur@russell.cc> > > > > The secvar object format is only in the device tree under powernv. > > We now have an API call to retrieve it in a generic way, so we > > should > > use that instead of having to handle the DT here. > > > > Add support for pseries secvar, with the "ibm,plpks-sb-v1" format. > > The object format is expected to be the same, so there shouldn't be > > any > > functional differences between objects retrieved from powernv and > > pseries. > > > > Signed-off-by: Russell Currey <ruscur@russell.cc> > > Signed-off-by: Andrew Donnellan <ajd@linux.ibm.com> > > > > --- > > > > v3: New patch > > > > v4: Pass format buffer size (stefanb, npiggin) > > --- > > .../integrity/platform_certs/load_powerpc.c | 17 ++++++++++--- > > ---- > > 1 file changed, 10 insertions(+), 7 deletions(-) > > > > diff --git a/security/integrity/platform_certs/load_powerpc.c > > b/security/integrity/platform_certs/load_powerpc.c > > index dee51606d5f4..d4ce91bf3fec 100644 > > --- a/security/integrity/platform_certs/load_powerpc.c > > +++ b/security/integrity/platform_certs/load_powerpc.c > > @@ -10,7 +10,6 @@ > > #include <linux/cred.h> > > #include <linux/err.h> > > #include <linux/slab.h> > > -#include <linux/of.h> > > #include <asm/secure_boot.h> > > #include <asm/secvar.h> > > #include "keyring_handler.h" > > @@ -59,16 +58,22 @@ static int __init load_powerpc_certs(void) > > void *db = NULL, *dbx = NULL; > > u64 dbsize = 0, dbxsize = 0; > > int rc = 0; > > - struct device_node *node; > > + ssize_t len; > > + char buf[32]; > > > > if (!secvar_ops) > > return -ENODEV; > > > > - /* The following only applies for the edk2-compat backend. > > */ > > - node = of_find_compatible_node(NULL, NULL, "ibm,edk2- > > compat-v1"); > > - if (!node) > > + len = secvar_ops->format(buf, 32); > > "powerpc/secvar: Handle format string in the consumer" defines > opal_secvar_format() for the object format "ibm,secvar-backend". > Here > shouldn't it being returning the format for "ibm,edk2-compat-v1"? > They end up with the same value. The DT structure on powernv looks like this: /proc/device-tree/ibm,opal/secvar: name "secvar" compatible "ibm,secvar-backend" "ibm,edk2-compat-v1" format "ibm,edk2-compat-v1" max-var-key-len 00000000 00000400 phandle 0000805a (32858) max-var-size 00000000 00002000 The existing code is checking for a node compatible with "ibm,edk2- compat-v1", which would match the node above. opal_secvar_format() checks for a node compatible with "ibm,secvar-backend" (again, matching above) and then returns the contents of the "format" string, which is "ibm,edk2-compat-v1". Ultimately it's two different ways of doing the same thing, but this way load_powerpc_certs() doesn't have to interact with the device tree. - Russell > Mimi > > > + if (len <= 0) > > return -ENODEV; > > > > + // Check for known secure boot implementations from OPAL or > > PLPKS > > + if (strcmp("ibm,edk2-compat-v1", buf) && strcmp("ibm,plpks- > > sb-v1", buf)) { > > + pr_err("Unsupported secvar implementation \"%s\", > > not loading certs\n", buf); > > + return -ENODEV; > > + } > > + > > /* > > * Get db, and dbx. They might not exist, so it isn't an > > error if we > > * can't get them. > > @@ -103,8 +108,6 @@ static int __init load_powerpc_certs(void) > > kfree(dbx); > > } > > > > - of_node_put(node); > > - > > return rc; > > } > > late_initcall(load_powerpc_certs); > >
On Wed, 2023-01-25 at 13:23 +1100, Russell Currey wrote: > On Tue, 2023-01-24 at 10:14 -0500, Mimi Zohar wrote: > > On Fri, 2023-01-20 at 18:43 +1100, Andrew Donnellan wrote: > > > From: Russell Currey <ruscur@russell.cc> > > > > > > The secvar object format is only in the device tree under powernv. > > > We now have an API call to retrieve it in a generic way, so we > > > should > > > use that instead of having to handle the DT here. > > > > > > Add support for pseries secvar, with the "ibm,plpks-sb-v1" format. > > > The object format is expected to be the same, so there shouldn't be > > > any > > > functional differences between objects retrieved from powernv and > > > pseries. > > > > > > Signed-off-by: Russell Currey <ruscur@russell.cc> > > > Signed-off-by: Andrew Donnellan <ajd@linux.ibm.com> > > > > > > --- > > > > > > v3: New patch > > > > > > v4: Pass format buffer size (stefanb, npiggin) > > > --- > > > .../integrity/platform_certs/load_powerpc.c | 17 ++++++++++--- > > > ---- > > > 1 file changed, 10 insertions(+), 7 deletions(-) > > > > > > diff --git a/security/integrity/platform_certs/load_powerpc.c > > > b/security/integrity/platform_certs/load_powerpc.c > > > index dee51606d5f4..d4ce91bf3fec 100644 > > > --- a/security/integrity/platform_certs/load_powerpc.c > > > +++ b/security/integrity/platform_certs/load_powerpc.c > > > @@ -10,7 +10,6 @@ > > > #include <linux/cred.h> > > > #include <linux/err.h> > > > #include <linux/slab.h> > > > -#include <linux/of.h> > > > #include <asm/secure_boot.h> > > > #include <asm/secvar.h> > > > #include "keyring_handler.h" > > > @@ -59,16 +58,22 @@ static int __init load_powerpc_certs(void) > > > void *db = NULL, *dbx = NULL; > > > u64 dbsize = 0, dbxsize = 0; > > > int rc = 0; > > > - struct device_node *node; > > > + ssize_t len; > > > + char buf[32]; > > > > > > if (!secvar_ops) > > > return -ENODEV; > > > > > > - /* The following only applies for the edk2-compat backend. > > > */ > > > - node = of_find_compatible_node(NULL, NULL, "ibm,edk2- > > > compat-v1"); > > > - if (!node) > > > + len = secvar_ops->format(buf, 32); > > > > "powerpc/secvar: Handle format string in the consumer" defines > > opal_secvar_format() for the object format "ibm,secvar-backend". > > Here > > shouldn't it being returning the format for "ibm,edk2-compat-v1"? > > > > They end up with the same value. The DT structure on powernv looks > like this: > > /proc/device-tree/ibm,opal/secvar: > name "secvar" > compatible "ibm,secvar-backend" > "ibm,edk2-compat-v1" > format "ibm,edk2-compat-v1" > max-var-key-len 00000000 00000400 > phandle 0000805a (32858) > max-var-size 00000000 00002000 > > The existing code is checking for a node compatible with "ibm,edk2- > compat-v1", which would match the node above. opal_secvar_format() > checks for a node compatible with "ibm,secvar-backend" (again, matching > above) and then returns the contents of the "format" string, which is > "ibm,edk2-compat-v1". > > Ultimately it's two different ways of doing the same thing, but this > way load_powerpc_certs() doesn't have to interact with the device tree. Agreed. Thank you for the explanation. To simplify review, I suggest either adding this explanation in the patch description or stage the change by replacing the existing "ibm,edk2-compat-v1" usage first. thanks, Mimi > > > > Mimi > > > > > + if (len <= 0) > > > return -ENODEV; > > > > > > + // Check for known secure boot implementations from OPAL or > > > PLPKS > > > + if (strcmp("ibm,edk2-compat-v1", buf) && strcmp("ibm,plpks- > > > sb-v1", buf)) { > > > + pr_err("Unsupported secvar implementation \"%s\", > > > not loading certs\n", buf); > > > + return -ENODEV; > > > + } > > > + > > > /* > > > * Get db, and dbx. They might not exist, so it isn't an > > > error if we > > > * can't get them. > > > @@ -103,8 +108,6 @@ static int __init load_powerpc_certs(void) > > > kfree(dbx); > > > } > > > > > > - of_node_put(node); > > > - > > > return rc; > > > } > > > late_initcall(load_powerpc_certs); > > > > >
On Tue, 2023-01-24 at 21:47 -0500, Mimi Zohar wrote: > Agreed. Thank you for the explanation. To simplify review, I > suggest > either adding this explanation in the patch description or stage the > change by replacing the existing "ibm,edk2-compat-v1" usage first. Will clarify in the commit message of the next revision.
diff --git a/security/integrity/platform_certs/load_powerpc.c b/security/integrity/platform_certs/load_powerpc.c index dee51606d5f4..d4ce91bf3fec 100644 --- a/security/integrity/platform_certs/load_powerpc.c +++ b/security/integrity/platform_certs/load_powerpc.c @@ -10,7 +10,6 @@ #include <linux/cred.h> #include <linux/err.h> #include <linux/slab.h> -#include <linux/of.h> #include <asm/secure_boot.h> #include <asm/secvar.h> #include "keyring_handler.h" @@ -59,16 +58,22 @@ static int __init load_powerpc_certs(void) void *db = NULL, *dbx = NULL; u64 dbsize = 0, dbxsize = 0; int rc = 0; - struct device_node *node; + ssize_t len; + char buf[32]; if (!secvar_ops) return -ENODEV; - /* The following only applies for the edk2-compat backend. */ - node = of_find_compatible_node(NULL, NULL, "ibm,edk2-compat-v1"); - if (!node) + len = secvar_ops->format(buf, 32); + if (len <= 0) return -ENODEV; + // Check for known secure boot implementations from OPAL or PLPKS + if (strcmp("ibm,edk2-compat-v1", buf) && strcmp("ibm,plpks-sb-v1", buf)) { + pr_err("Unsupported secvar implementation \"%s\", not loading certs\n", buf); + return -ENODEV; + } + /* * Get db, and dbx. They might not exist, so it isn't an error if we * can't get them. @@ -103,8 +108,6 @@ static int __init load_powerpc_certs(void) kfree(dbx); } - of_node_put(node); - return rc; } late_initcall(load_powerpc_certs);