From: Sudhakar Kuppusamy <sudhakar@linux.ibm.com>
To: grub-devel@gnu.org
Cc: dja@axtens.net, jan.setjeeilers@oracle.com,
julian.klode@canonical.com, mate.kukri@canonical.com,
pjones@redhat.com, msuchanek@suse.com, mlewando@redhat.com,
stefanb@linux.ibm.com, avnish@linux.ibm.com, nayna@linux.ibm.com,
ssrish@linux.ibm.com, Sudhakar Kuppusamy <sudhakar@linux.ibm.com>,
sridharm@linux.ibm.com, Daniel Kiper <daniel.kiper@oracle.com>
Subject: [PATCH v10 16/22] powerpc_ieee1275: Introduce use_static_keys flag
Date: Tue, 9 Sep 2025 17:15:24 +0530 [thread overview]
Message-ID: <20250909114530.36863-17-sudhakar@linux.ibm.com> (raw)
In-Reply-To: <20250909114530.36863-1-sudhakar@linux.ibm.com>
Introduce the use_static_keys flag to indicate that static keys are to be used
rather than keys from the PKS storage's db variable. This flag is set if
secure boot is enabled with PKS when the db variable is not present or
empty in the PKS storage.
The appendedsig module would use this flag to extract the static keys from
the GRUB ELF Note and stored in the db list.
Signed-off-by: Sudhakar Kuppusamy <sudhakar@linux.ibm.com>
Reviewed-by: Stefan Berger <stefanb@linux.ibm.com>
Reviewed-by: Avnish Chouhan <avnish@linux.ibm.com>
Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
---
.../kern/powerpc/ieee1275/platform_keystore.c | 25 +++++++++++++++++--
.../grub/powerpc/ieee1275/platform_keystore.h | 1 +
2 files changed, 24 insertions(+), 2 deletions(-)
diff --git a/grub-core/kern/powerpc/ieee1275/platform_keystore.c b/grub-core/kern/powerpc/ieee1275/platform_keystore.c
index 71a3d261e..f4eab16cc 100644
--- a/grub-core/kern/powerpc/ieee1275/platform_keystore.c
+++ b/grub-core/kern/powerpc/ieee1275/platform_keystore.c
@@ -50,9 +50,19 @@
static grub_size_t pks_max_object_size;
-/* Platform KeyStore db and dbx. */
+/*
+ * Platform KeyStore db and dbx, use_static_keys falg to
+ * indicate use of static keys.
+ *
+ * use_static_keys:
+ * False: Does not enforce the use of the static key as a default key from
+ the GRUB ELF Note. This is default.
+ * True: Enforce the use of the static key as a default key from the
+ * GRUB ELF Note if db variable is not available in PKS when use_keystore
+ * is set to true
+ */
static grub_pks_t pks_keystore = { .db = NULL, .dbx = NULL, .db_entries = 0,
- .dbx_entries = 0};
+ .dbx_entries = 0, .use_static_keys = false};
/*
* pks_use_keystore: Key Management Modes
* False: Static key management (use built-in Keys). This is default.
@@ -331,6 +341,17 @@ grub_pks_keystore_init (void)
/* Read db from PKS. */
rc = read_sbvar_from_pks (0, DB, &pks_keystore.db, &pks_keystore.db_entries);
+ if (rc == GRUB_ERR_UNKNOWN_COMMAND)
+ {
+ rc = GRUB_ERR_NONE;
+ /*
+ * This flag is set to true because secure boot is enabled with PKS,
+ * and the db variable is not present or empty in the PKS storage.
+ * It enforces the use of static keys from the GRUB ELF Note.
+ */
+ pks_keystore.use_static_keys = true;
+ }
+
if (rc == GRUB_ERR_NONE)
{
/* Read dbx from PKS. */
diff --git a/include/grub/powerpc/ieee1275/platform_keystore.h b/include/grub/powerpc/ieee1275/platform_keystore.h
index b18bd4688..24649b2b1 100644
--- a/include/grub/powerpc/ieee1275/platform_keystore.h
+++ b/include/grub/powerpc/ieee1275/platform_keystore.h
@@ -95,6 +95,7 @@ struct grub_pks
grub_pks_sd_t *dbx; /* Forbidden signature database. */
grub_uint32_t db_entries; /* Size of signature database. */
grub_uint32_t dbx_entries;/* Size of forbidden signature database. */
+ bool use_static_keys; /* Flag to indicate use of static keys. */
} GRUB_PACKED;
typedef struct grub_pks grub_pks_t;
--
2.39.5 (Apple Git-154)
_______________________________________________
Grub-devel mailing list
Grub-devel@gnu.org
https://lists.gnu.org/mailman/listinfo/grub-devel
next prev parent reply other threads:[~2025-09-09 11:50 UTC|newest]
Thread overview: 25+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-09-09 11:45 [PATCH v10 00/22] Appended Signature Secure Boot Support for PowerPC Sudhakar Kuppusamy
2025-09-09 11:45 ` [PATCH v10 01/22] powerpc-ieee1275: Add support for signing GRUB with an appended signature Sudhakar Kuppusamy
2025-09-09 11:45 ` [PATCH v10 02/22] crypto: Move storage for grub_crypto_pk_* to crypto.c Sudhakar Kuppusamy
2025-09-09 11:45 ` [PATCH v10 03/22] pgp: Rename OBJ_TYPE_PUBKEY to OBJ_TYPE_GPG_PUBKEY Sudhakar Kuppusamy
2025-09-09 11:45 ` [PATCH v10 04/22] grub-install: Support embedding x509 certificates Sudhakar Kuppusamy
2025-09-09 11:45 ` [PATCH v10 05/22] appended signatures: Import GNUTLS's ASN.1 description files Sudhakar Kuppusamy
2025-09-09 11:45 ` [PATCH v10 06/22] appended signatures: Parse ASN1 node Sudhakar Kuppusamy
2025-09-09 11:45 ` [PATCH v10 07/22] appended signatures: Parse PKCS#7 signed data Sudhakar Kuppusamy
2025-09-09 11:45 ` [PATCH v10 08/22] appended signatures: Parse X.509 certificates Sudhakar Kuppusamy
2025-09-09 11:45 ` [PATCH v10 09/22] powerpc_ieee1275: Enter lockdown based on /ibm, secure-boot Sudhakar Kuppusamy
2025-09-09 11:45 ` [PATCH v10 10/22] appended signatures: Support verifying appended signatures Sudhakar Kuppusamy
2025-09-09 11:45 ` [PATCH v10 11/22] powerpc_ieee1275: Read the db and dbx secure boot variables Sudhakar Kuppusamy
2025-09-11 7:54 ` Srish Srinivasan
2025-09-15 10:43 ` Sudhakar Kuppusamy
2025-09-09 11:45 ` [PATCH v10 12/22] appended signatures: Introducing key management environment variable Sudhakar Kuppusamy
2025-09-09 11:45 ` [PATCH v10 13/22] appended signatures: Create db and dbx lists Sudhakar Kuppusamy
2025-09-09 11:45 ` [PATCH v10 14/22] appended signatures: Using db and dbx lists for signature verification Sudhakar Kuppusamy
2025-09-09 11:45 ` [PATCH v10 15/22] appended signatures: GRUB commands to manage the certificates Sudhakar Kuppusamy
2025-09-09 11:45 ` Sudhakar Kuppusamy [this message]
2025-09-09 11:45 ` [PATCH v10 17/22] appended signatures: Read default db keys from the ELF Note Sudhakar Kuppusamy
2025-09-09 11:45 ` [PATCH v10 18/22] appended signatures: GRUB commands to manage the hashes Sudhakar Kuppusamy
2025-09-09 11:45 ` [PATCH v10 19/22] appended signatures: Verification tests Sudhakar Kuppusamy
2025-09-09 11:45 ` [PATCH v10 20/22] docs/grub: Document signing GRUB under UEFI Sudhakar Kuppusamy
2025-09-09 11:45 ` [PATCH v10 21/22] docs/grub: Document signing GRUB with an appended signature Sudhakar Kuppusamy
2025-09-09 11:45 ` [PATCH v10 22/22] docs/grub: Document " Sudhakar Kuppusamy
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20250909114530.36863-17-sudhakar@linux.ibm.com \
--to=sudhakar@linux.ibm.com \
--cc=avnish@linux.ibm.com \
--cc=daniel.kiper@oracle.com \
--cc=dja@axtens.net \
--cc=grub-devel@gnu.org \
--cc=jan.setjeeilers@oracle.com \
--cc=julian.klode@canonical.com \
--cc=mate.kukri@canonical.com \
--cc=mlewando@redhat.com \
--cc=msuchanek@suse.com \
--cc=nayna@linux.ibm.com \
--cc=pjones@redhat.com \
--cc=sridharm@linux.ibm.com \
--cc=ssrish@linux.ibm.com \
--cc=stefanb@linux.ibm.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).