All of lore.kernel.org
 help / color / mirror / Atom feed
From: Zhuoying Cai <zycai@linux.ibm.com>
To: thuth@redhat.com, berrange@redhat.com,
	richard.henderson@linaro.org, jrossi@linux.ibm.com,
	qemu-s390x@nongnu.org, qemu-devel@nongnu.org
Cc: david@kernel.org, walling@linux.ibm.com, jjherne@linux.ibm.com,
	pasic@linux.ibm.com, borntraeger@linux.ibm.com,
	farman@linux.ibm.com, mjrosato@linux.ibm.com, iii@linux.ibm.com,
	eblake@redhat.com, armbru@redhat.com, zycai@linux.ibm.com,
	alifm@linux.ibm.com, brueckner@linux.ibm.com
Subject: [PATCH v8 01/30] Add boot-certs to s390-ccw-virtio machine type option
Date: Thu, 12 Feb 2026 15:43:22 -0500	[thread overview]
Message-ID: <20260212204352.1044699-2-zycai@linux.ibm.com> (raw)
In-Reply-To: <20260212204352.1044699-1-zycai@linux.ibm.com>

Introduce a new `boot-certs` machine type option for the s390-ccw-virtio
machine. This allows users to specify one or more certificate file paths
or directories to be used during secure boot.

Each entry is specified using the syntax:
	boot-certs.<index>.path=/path/to/cert.pem

Multiple paths can be specify using array properties:
	boot-certs.0.path=/path/to/cert.pem,
	boot-certs.1.path=/path/to/cert-dir,
	boot-certs.2.path=/path/to/another-dir...

Signed-off-by: Zhuoying Cai <zycai@linux.ibm.com>
Acked-by: Markus Armbruster <armbru@redhat.com>
---
 docs/system/s390x/secure-ipl.rst   | 20 ++++++++++++++++++++
 hw/s390x/s390-virtio-ccw.c         | 30 ++++++++++++++++++++++++++++++
 include/hw/s390x/s390-virtio-ccw.h |  2 ++
 qapi/machine-s390x.json            | 23 +++++++++++++++++++++++
 qapi/pragma.json                   |  1 +
 qemu-options.hx                    |  6 +++++-
 6 files changed, 81 insertions(+), 1 deletion(-)
 create mode 100644 docs/system/s390x/secure-ipl.rst

diff --git a/docs/system/s390x/secure-ipl.rst b/docs/system/s390x/secure-ipl.rst
new file mode 100644
index 0000000000..0a02f171b4
--- /dev/null
+++ b/docs/system/s390x/secure-ipl.rst
@@ -0,0 +1,20 @@
+.. SPDX-License-Identifier: GPL-2.0-or-later
+
+Secure IPL Command Line Options
+===============================
+
+The s390-ccw-virtio machine type supports secure IPL. These parameters allow
+users to provide certificates and enable secure IPL directly via the command
+line.
+
+Providing Certificates
+----------------------
+
+The certificate store can be populated by supplying a list of X.509 certificate
+file paths or directories containing certificate files on the command-line:
+
+Note: certificate files must have a .pem extension.
+
+.. code-block:: shell
+
+    qemu-system-s390x -machine s390-ccw-virtio,boot-certs.0.path=/.../qemu/certs,boot-certs.1.path=/another/path/cert.pem ...
diff --git a/hw/s390x/s390-virtio-ccw.c b/hw/s390x/s390-virtio-ccw.c
index eb135a515d..9267563cbe 100644
--- a/hw/s390x/s390-virtio-ccw.c
+++ b/hw/s390x/s390-virtio-ccw.c
@@ -45,6 +45,7 @@
 #include "target/s390x/kvm/pv.h"
 #include "migration/blocker.h"
 #include "qapi/visitor.h"
+#include "qapi/qapi-visit-machine-s390x.h"
 #include "hw/s390x/cpu-topology.h"
 #include "kvm/kvm_s390x.h"
 #include "hw/virtio/virtio-md-pci.h"
@@ -795,6 +796,30 @@ static void machine_set_loadparm(Object *obj, Visitor *v,
     g_free(val);
 }
 
+static void machine_get_boot_certs(Object *obj, Visitor *v,
+                                   const char *name, void *opaque,
+                                   Error **errp)
+{
+    S390CcwMachineState *ms = S390_CCW_MACHINE(obj);
+    BootCertificatesList **certs = &ms->boot_certs;
+
+    visit_type_BootCertificatesList(v, name, certs, errp);
+}
+
+static void machine_set_boot_certs(Object *obj, Visitor *v, const char *name,
+                                   void *opaque, Error **errp)
+{
+    S390CcwMachineState *ms = S390_CCW_MACHINE(obj);
+    BootCertificatesList *cert_list = NULL;
+
+    visit_type_BootCertificatesList(v, name, &cert_list, errp);
+    if (!cert_list) {
+        return;
+    }
+
+    ms->boot_certs = cert_list;
+}
+
 static void ccw_machine_class_init(ObjectClass *oc, const void *data)
 {
     MachineClass *mc = MACHINE_CLASS(oc);
@@ -848,6 +873,11 @@ static void ccw_machine_class_init(ObjectClass *oc, const void *data)
             "Up to 8 chars in set of [A-Za-z0-9. ] (lower case chars converted"
             " to upper case) to pass to machine loader, boot manager,"
             " and guest kernel");
+
+    object_class_property_add(oc, "boot-certs", "BootCertificatesList",
+                              machine_get_boot_certs, machine_set_boot_certs, NULL, NULL);
+    object_class_property_set_description(oc, "boot-certs",
+            "provide paths to a directory and/or a certificate file for secure boot");
 }
 
 static inline void s390_machine_initfn(Object *obj)
diff --git a/include/hw/s390x/s390-virtio-ccw.h b/include/hw/s390x/s390-virtio-ccw.h
index f1f06119d6..5ad1ea2f24 100644
--- a/include/hw/s390x/s390-virtio-ccw.h
+++ b/include/hw/s390x/s390-virtio-ccw.h
@@ -14,6 +14,7 @@
 #include "hw/core/boards.h"
 #include "qom/object.h"
 #include "hw/s390x/sclp.h"
+#include "qapi/qapi-types-machine-s390x.h"
 
 #define TYPE_S390_CCW_MACHINE               "s390-ccw-machine"
 
@@ -31,6 +32,7 @@ struct S390CcwMachineState {
     uint8_t loadparm[8];
     uint64_t memory_limit;
     uint64_t max_pagesize;
+    BootCertificatesList *boot_certs;
 
     SCLPDevice *sclp;
 };
diff --git a/qapi/machine-s390x.json b/qapi/machine-s390x.json
index ea430e1b88..0e0f4fdfb0 100644
--- a/qapi/machine-s390x.json
+++ b/qapi/machine-s390x.json
@@ -140,3 +140,26 @@
 { 'event': 'SCLP_CPI_INFO_AVAILABLE',
   'features': [ 'unstable' ]
 }
+
+##
+# @BootCertificates:
+#
+# Boot certificate for secure IPL.
+#
+# @path: path to an X.509 certificate file or a directory containing
+# certificate files.
+#
+# Since: 11.0
+##
+{ 'struct': 'BootCertificates',
+  'data': {'path': 'str'} }
+
+##
+# @DummyBootCertificates:
+#
+# Not used by QMP; hack to let us use BootCertificatesList internally.
+#
+# Since: 11.0
+##
+{ 'struct': 'DummyBootCertificates',
+  'data': {'unused-boot-certs': ['BootCertificates'] } }
diff --git a/qapi/pragma.json b/qapi/pragma.json
index 193bc39059..aad270402f 100644
--- a/qapi/pragma.json
+++ b/qapi/pragma.json
@@ -49,6 +49,7 @@
         'DisplayProtocol',
         'DriveBackupWrapper',
         'DummyBlockCoreForceArrays',
+        'DummyBootCertificates',
         'DummyForceArrays',
         'DummyVirtioForceArrays',
         'HotKeyMod',
diff --git a/qemu-options.hx b/qemu-options.hx
index ec92723f10..7c02220a5c 100644
--- a/qemu-options.hx
+++ b/qemu-options.hx
@@ -45,7 +45,8 @@ DEF("machine", HAS_ARG, QEMU_OPTION_machine, \
     "                memory-backend='backend-id' specifies explicitly provided backend for main RAM (default=none)\n"
     "                cxl-fmw.0.targets.0=firsttarget,cxl-fmw.0.targets.1=secondtarget,cxl-fmw.0.size=size[,cxl-fmw.0.interleave-granularity=granularity]\n"
     "                sgx-epc.0.memdev=memid,sgx-epc.0.node=numaid\n"
-    "                smp-cache.0.cache=cachename,smp-cache.0.topology=topologylevel\n",
+    "                smp-cache.0.cache=cachename,smp-cache.0.topology=topologylevel\n"
+    "                boot-certs.0.path=/path/directory,boot-certs.1.path=/path/file provides paths to a directory and/or a certificate file\n",
     QEMU_ARCH_ALL)
 SRST
 ``-machine [type=]name[,prop=value[,...]]``
@@ -209,6 +210,9 @@ SRST
         ::
 
             -machine smp-cache.0.cache=l1d,smp-cache.0.topology=core,smp-cache.1.cache=l1i,smp-cache.1.topology=core
+
+    ``boot-certs.0.path=/path/directory,boot-certs.1.path=/path/file``
+        Provide paths to a directory and/or a certificate file on the host [s390x only].
 ERST
 
 DEF("M", HAS_ARG, QEMU_OPTION_M,
-- 
2.52.0



  reply	other threads:[~2026-02-12 20:45 UTC|newest]

Thread overview: 72+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2026-02-12 20:43 [PATCH v8 00/30] Secure IPL Support for SCSI Scheme of virtio-blk/virtio-scsi Devices Zhuoying Cai
2026-02-12 20:43 ` Zhuoying Cai [this message]
2026-02-17  8:30   ` [PATCH v8 01/30] Add boot-certs to s390-ccw-virtio machine type option Markus Armbruster
2026-02-12 20:43 ` [PATCH v8 02/30] crypto/x509-utils: Refactor with GNUTLS fallback Zhuoying Cai
2026-02-12 20:43 ` [PATCH v8 03/30] crypto/x509-utils: Add helper functions for certificate store Zhuoying Cai
2026-02-12 20:43 ` [PATCH v8 04/30] hw/s390x/ipl: Create " Zhuoying Cai
2026-02-26 16:02   ` Thomas Huth
2026-02-28  1:45     ` Zhuoying Cai
2026-03-05 21:34   ` Farhan Ali
2026-02-12 20:43 ` [PATCH v8 05/30] s390x/diag: Introduce DIAG 320 for Certificate Store Facility Zhuoying Cai
2026-02-27 12:41   ` Thomas Huth
2026-02-28  1:47     ` Zhuoying Cai
2026-02-12 20:43 ` [PATCH v8 06/30] s390x/diag: Refactor address validation check from diag308_parm_check Zhuoying Cai
2026-02-27 12:46   ` Thomas Huth
2026-02-12 20:43 ` [PATCH v8 07/30] s390x/diag: Implement DIAG 320 subcode 1 Zhuoying Cai
2026-02-27 12:58   ` Thomas Huth
2026-02-28  2:15     ` Zhuoying Cai
2026-02-28 12:51       ` Thomas Huth
2026-02-12 20:43 ` [PATCH v8 08/30] crypto/x509-utils: Add helper functions for DIAG 320 subcode 2 Zhuoying Cai
2026-02-28 13:43   ` Thomas Huth
2026-03-03 21:02     ` Zhuoying Cai
2026-03-04  7:26       ` Thomas Huth
2026-02-12 20:43 ` [PATCH v8 09/30] s390x/diag: Implement " Zhuoying Cai
2026-02-17  8:18   ` Markus Armbruster
2026-02-17 21:29     ` Zhuoying Cai
2026-02-28  2:25   ` Zhuoying Cai
2026-02-28 14:07   ` Thomas Huth
2026-02-12 20:43 ` [PATCH v8 10/30] s390x/diag: Introduce DIAG 508 for secure IPL operations Zhuoying Cai
2026-02-12 20:43 ` [PATCH v8 11/30] crypto/x509-utils: Add helper functions for DIAG 508 subcode 1 Zhuoying Cai
2026-02-12 20:43 ` [PATCH v8 12/30] s390x/diag: Implement DIAG 508 subcode 1 for signature verification Zhuoying Cai
2026-03-03 20:22   ` Farhan Ali
2026-02-12 20:43 ` [PATCH v8 13/30] s390x/ipl: Introduce IPL Information Report Block (IIRB) Zhuoying Cai
2026-03-03 20:38   ` Farhan Ali
2026-02-12 20:43 ` [PATCH v8 14/30] pc-bios/s390-ccw: Define memory for IPLB and convert IPLB to pointers Zhuoying Cai
2026-03-02  9:56   ` Thomas Huth
2026-02-12 20:43 ` [PATCH v8 15/30] hw/s390x/ipl: Add IPIB flags to IPL Parameter Block Zhuoying Cai
2026-02-12 20:43 ` [PATCH v8 16/30] s390x: Guest support for Secure-IPL Facility Zhuoying Cai
2026-03-02 10:03   ` Thomas Huth
2026-02-12 20:43 ` [PATCH v8 17/30] pc-bios/s390-ccw: Refactor zipl_run() Zhuoying Cai
2026-02-12 20:43 ` [PATCH v8 18/30] pc-bios/s390-ccw: Rework zipl_load_segment function Zhuoying Cai
2026-02-12 20:43 ` [PATCH v8 19/30] pc-bios/s390-ccw: Add signature verification for secure IPL in audit mode Zhuoying Cai
2026-03-02 10:48   ` Thomas Huth
2026-03-03 21:46   ` Farhan Ali
2026-03-04 22:17     ` Zhuoying Cai
2026-02-12 20:43 ` [PATCH v8 20/30] pc-bios/s390-ccw: Add signed component address overlap checks Zhuoying Cai
2026-03-02 11:01   ` Thomas Huth
2026-03-03 22:07   ` Farhan Ali
2026-03-03 22:36     ` Zhuoying Cai
2026-02-12 20:43 ` [PATCH v8 21/30] s390x: Guest support for Secure-IPL Code Loading Attributes Facility (SCLAF) Zhuoying Cai
2026-02-17  8:06   ` Markus Armbruster
2026-02-17  8:19     ` Markus Armbruster
2026-02-12 20:43 ` [PATCH v8 22/30] pc-bios/s390-ccw: Add additional security checks for secure boot Zhuoying Cai
2026-03-02 11:24   ` Thomas Huth
2026-03-03 21:17     ` Zhuoying Cai
2026-02-12 20:43 ` [PATCH v8 23/30] Add secure-boot to s390-ccw-virtio machine type option Zhuoying Cai
2026-02-12 20:43 ` [PATCH v8 24/30] hw/s390x/ipl: Set IPIB flags for secure IPL Zhuoying Cai
2026-03-02 11:34   ` Thomas Huth
2026-02-12 20:43 ` [PATCH v8 25/30] pc-bios/s390-ccw: Handle true secure IPL mode Zhuoying Cai
2026-03-02 12:53   ` Thomas Huth
2026-02-12 20:43 ` [PATCH v8 26/30] hw/s390x/ipl: Handle secure boot with multiple boot devices Zhuoying Cai
2026-03-02 12:59   ` Thomas Huth
2026-02-12 20:43 ` [PATCH v8 27/30] hw/s390x/ipl: Handle secure boot without specifying a boot device Zhuoying Cai
2026-02-12 20:43 ` [PATCH v8 28/30] tests/functional/s390x: Add secure IPL functional test Zhuoying Cai
2026-03-02 13:35   ` Thomas Huth
2026-03-03 22:07     ` Zhuoying Cai
2026-02-12 20:43 ` [PATCH v8 29/30] docs/specs: Add secure IPL documentation Zhuoying Cai
2026-03-02 13:45   ` Thomas Huth
2026-02-12 20:43 ` [PATCH v8 30/30] docs/system/s390x: " Zhuoying Cai
2026-02-17  8:06   ` Markus Armbruster
2026-02-17  8:20     ` Markus Armbruster
2026-02-17 20:29       ` Zhuoying Cai
2026-03-02 16:24   ` Thomas Huth

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20260212204352.1044699-2-zycai@linux.ibm.com \
    --to=zycai@linux.ibm.com \
    --cc=alifm@linux.ibm.com \
    --cc=armbru@redhat.com \
    --cc=berrange@redhat.com \
    --cc=borntraeger@linux.ibm.com \
    --cc=brueckner@linux.ibm.com \
    --cc=david@kernel.org \
    --cc=eblake@redhat.com \
    --cc=farman@linux.ibm.com \
    --cc=iii@linux.ibm.com \
    --cc=jjherne@linux.ibm.com \
    --cc=jrossi@linux.ibm.com \
    --cc=mjrosato@linux.ibm.com \
    --cc=pasic@linux.ibm.com \
    --cc=qemu-devel@nongnu.org \
    --cc=qemu-s390x@nongnu.org \
    --cc=richard.henderson@linaro.org \
    --cc=thuth@redhat.com \
    --cc=walling@linux.ibm.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.