Re: [programmer11...@programist.ru: Bug#1021846: grub-install is broken since 2.06-3: error: unknown filesystem]

2022-11-24 Thread sudhakar
=4bd9877f62166b7e369773ab92fe24a39f6515f8 thanks, Sudhakar Kuppusamy On 2022-11-24 20:39, Daniel Kiper wrote: Adding Daniel Axtens... On Tue, Nov 15, 2022 at 06:31:45PM +, Steve McIntyre wrote: Hi all! программист некто (in CC) reported this bug a few weeks back in Debian. Since I applied

Re: [PATCH v3 1/2] mkimage: create new ELF Note for SBAT

2024-10-22 Thread sudhakar
On 2024-10-16 20:36, Daniel Kiper wrote: On Fri, Sep 13, 2024 at 04:57:58PM +0530, Sudhakar Kuppusamy wrote: In order to store the SBAT data, we create a new ELF note. The string "Secure-Boot-Advanced-Targeting", zero-padded to 4 byte alignment, shall be entered in the name field.

Re: [PATCH v3 2/2] mkimage: adding sbat metadata into sbat ELF Note on powerpc

2024-10-22 Thread sudhakar
On 2024-10-16 20:42, Daniel Kiper wrote: On Fri, Sep 13, 2024 at 04:57:59PM +0530, Sudhakar Kuppusamy wrote: The SBAT metadata, which is read from .csv file and transformed into an ELF note, is made into an image using the -s option. Signed-off-by: Sudhakar Kuppusamy Co-authored-by: Daniel

Re: [PATCH v1 19/21] appendedsig: Reads the default DB keys from ELF Note

2025-02-27 Thread sudhakar
On 2025-01-02 18:49, Stefan Berger wrote: On 12/18/24 9:56 AM, Sudhakar Kuppusamy wrote: if secure boot enabled with PKS and set use_static_keys flag, it If Secure Boot is enabled with PKS and the use_static_keys flag is set, then read the DB default keys from the ELF note and store them in

Re: [PATCH v1 16/21] appendedsig: The creation of trusted and distrusted lists

2025-02-27 Thread sudhakar
On 2024-12-31 22:51, Stefan Berger wrote: On 12/18/24 9:56 AM, Sudhakar Kuppusamy wrote: The trusted certificates and binary hashes, distrusted certificates and binary/certificate hashes will be extracted from the platform keystore buffer if Secure Boot is enabled with PKS. In order to verify

Re: [PATCH v1 17/21] appendedsig: While verifying the kernel, use trusted and distrusted lists

2025-02-27 Thread sudhakar
On 2024-12-31 23:07, Stefan Berger wrote: On 12/18/24 9:56 AM, Sudhakar Kuppusamy wrote: To verify the kernel's: verify the kernel binary against list of binary hashes To verify the kernel's signature? against lists of binary hashes that are distrusted and trusted. If it is not

Re: [PATCH v1 18/21] ieee1275: set use_static_keys flag

2025-02-27 Thread sudhakar
On 2025-01-02 18:52, Stefan Berger wrote: On 12/18/24 9:56 AM, Sudhakar Kuppusamy wrote: if secure boot enabled with PKS, it set the use_static_keys flag I was not sure at this point what the patch actually does so I reformulated it a bit. I would start the patch description with the reason

Re: [PATCH v1 05/21] pgp: factor out rsa_pad

2025-02-27 Thread sudhakar
On 2025-01-05 00:10, Vladimir 'phcoder' Serbinenko wrote: rsa_pad will be removed when we update libgcrypt (see pending patch). Can we accommodate for this? On Wed, Dec 18, 2024 at 5:58 PM Sudhakar Kuppusamy wrote: From: Daniel Axtens rsa_pad does the PKCS#1 v1.5 padding f

Re: [PATCH v1 05/21] pgp: factor out rsa_pad

2025-02-27 Thread sudhakar
On 2025-01-24 16:10, Avnish Chouhan wrote: Indentation looks off in couple of places. Please fix it. Reviewed-by: Avnish Chouhan  On 2024-12-18 20:26, Sudhakar Kuppusamy wrote: From: Daniel Axtens rsa_pad does the PKCS#1 v1.5 padding for the RSA signature scheme. We want to use it in other

Re: [PATCH v1 09/21] appended signatures: parse PKCS#7 signedData and X.509 certificates

2025-02-27 Thread sudhakar
On 2025-01-24 16:40, Avnish Chouhan wrote: Suggestion : It will be good if we can remove the brackets in one liner if conditions and loops! Reviewed-by: Avnish Chouhan  On 2024-12-18 20:26, Sudhakar Kuppusamy wrote: From: Daniel Axtens This code allows us to parse: - PKCS#7 signedData

Re: [PATCH v1 10/21] appended signatures: support verifying appended signatures

2025-02-27 Thread sudhakar
On 2025-02-06 11:40, Avnish Chouhan wrote: On 2024-12-18 20:26, Sudhakar Kuppusamy wrote: From: Daniel Axtens Building on the parsers and the ability to embed x509 certificates, as well as the existing gcrypt functionality, add a module for verifying appended signatures. This includes a

Re: [PATCH v1 13/21] ieee1275: enter lockdown based on /ibm,secure-boot

2025-02-27 Thread sudhakar
On 2025-02-06 11:53, Avnish Chouhan wrote: On 2024-12-18 20:26, Sudhakar Kuppusamy wrote: From: Daniel Axtens If the 'ibm,secure-boot' property of the root node is 2 or greater, enter lockdown. Signed-off-by: Daniel Axtens Signed-off-by: Sudhakar Kuppusamy --- docs

Re: [PATCH v1 09/21] appended signatures: parse PKCS#7 signedData and X.509 certificates

2025-02-25 Thread sudhakar
On 2024-12-29 01:16, Stefan Berger wrote: On 12/18/24 9:56 AM, Sudhakar Kuppusamy wrote: From: Daniel Axtens This code allows us to parse: - PKCS#7 signedData messages. Only a single signerInfo is supported, which is all that the Linux sign-file utility supports creating out-of-the

Re: [PATCH v1 01/21] powerpc-ieee1275: Add support for signing grub with an appended signature

2025-02-25 Thread sudhakar
On 2024-12-27 20:28, Stefan Berger wrote: On 12/18/24 9:56 AM, Sudhakar Kuppusamy wrote: From: Rashmica Gupta Add infrastructure to allow firmware to verify the integrity of grub by use of a Linux-kernel-module-style appended signature. We initially target powerpc-ieee1275, but the code

Re: [PATCH v1 14/21] ieee1275: Platform Keystore (PKS) Support

2025-02-25 Thread sudhakar
On 2024-12-31 03:44, Stefan Berger wrote: On 12/18/24 9:56 AM, Sudhakar Kuppusamy wrote: enhancing the infrastructure to enable the Platform Keystore (PKS) feature, which provides access to the SB VERSION, DB, and DBX secure boot variables from PKS. Signed-off-by: Sudhakar Kuppusamy

Re: [PATCH v1 12/21] appended signatures: documentation

2025-02-25 Thread sudhakar
On 2024-12-30 21:20, Stefan Berger wrote: On 12/18/24 9:56 AM, Sudhakar Kuppusamy wrote: From: Daniel Axtens This explains how appended signatures can be used to form part of a secure boot chain, and documents the commands and variables introduced. Signed-off-by: Daniel Axtens Signed-off-by

Re: [PATCH v1 15/21] ieee1275: Read the DB and DBX secure boot variables

2025-02-25 Thread sudhakar
On 2024-12-31 04:31, Stefan Berger wrote: On 12/18/24 9:56 AM, Sudhakar Kuppusamy wrote: If secure boot is enabled with PKS, it will read secure boot variables such as db and dbx from PKS and extract certificates from ESL. It would be saved in the platform keystore buffer, and the appendedsig

Re: [PATCH v1 15/21] ieee1275: Read the DB and DBX secure boot variables

2025-02-25 Thread sudhakar
On 2024-12-31 04:34, Stefan Berger wrote: On 12/18/24 9:56 AM, Sudhakar Kuppusamy wrote: If secure boot is enabled with PKS, it will read secure boot variables such as db and dbx from PKS and extract certificates from ESL. It would be saved in the platform keystore buffer, and What is &#x

Re: [PATCH v2 00/21] Appended Signature Secure Boot Support for PowerPC

2025-05-20 Thread sudhakar
Hi Marta, Thanks Martha, yes that would be very helpful and I appreciate your consideration for that. Yes the patch-set is getting reviewed actively so I am also hopeful that these would be upstreamed soon. Thanks, Sudhakar Kuppusamy On 2025-05-13 19:46, Marta Lewandowska wrote: Red Hat

Re: [PATCH 2/3] Option to set title of submenus

2025-05-27 Thread sudhakar
arg : args[0]); + if (! prefix) ditto + return grub_errno; + grub_free(old_prefix); +} + r = grub_normal_add_menu_entry (argc - 1, (const char **) args, ctxt->state[0].args, ctxt->state[4].arg,

Re: [PATCH v2 20/21] appendedsig: The grub command's trusted and distrusted support

2025-05-21 Thread sudhakar
Hi Gary Lin, Thank you so much for a review!. I wil fix the bug in the code mentioned by you. Thanks, Sudhakar Kuppusmay On 2025-04-17 13:13, Gary Lin wrote: On Thu, Mar 27, 2025 at 01:02:41AM +0530, Sudhakar Kuppusamy wrote: To support the following trusted and distrusted commands 1

Re: [PATCH v2 20/21] appendedsig: The grub command's trusted and distrusted support

2025-05-21 Thread sudhakar
On 2025-04-15 13:54, Gary Lin wrote: On Thu, Mar 27, 2025 at 01:02:41AM +0530, Sudhakar Kuppusamy wrote: To support the following trusted and distrusted commands 1. trusted_list: It will show the list of trusted certificates and binary hashes 2. distrusted_list: It will

Re: [PATCH v2 10/21] appended signatures: support verifying appended signatures

2025-05-21 Thread sudhakar
On 2025-04-15 09:16, Gary Lin wrote: On Thu, Mar 27, 2025 at 01:02:31AM +0530, Sudhakar Kuppusamy wrote: From: Daniel Axtens Building on the parsers and the ability to embed x509 certificates, as well as the existing gcrypt functionality, add a module for verifying appended signatures. This

Re: [PATCH v2 1/2] gnulib: Add patch to allow GRUB w/GCC-15 compile

2025-06-17 Thread sudhakar
o avoid this warning: _attribute_((nonstring)). Fixes: https://savannah.gnu.org/bugs/?66470 Signed-off-by: Andrew Hamilton Reviewed-by: Sudhakar Kuppusamy --- bootstrap.conf| 3 ++- grub-core/lib/gnulib-patches/gcc-15-compile-fix.patch | 11 +++

Re: [PATCH v2 2/2] util/grub-protect: Correct uninit 'err' Variable

2025-06-17 Thread sudhakar
f51c (util/grub-protect: Support NV index mode) Signed-off-by: Andrew Hamilton Reviewed-by: Sudhakar Kuppusamy --- util/grub-protect.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/util/grub-protect.c b/util/grub-protect.c index d53c2572d..868eb76b9 100644 --- a/util/grub

Re: [PATCH v2] lib/LzmaEnc: Validate 'len' before subtracting

2025-06-13 Thread sudhakar
;len - LZMA_MATCH_LEN_MIN" to avoid underflow when 'len' equals to 1. Fixed: CID 51508 Signed-off-by: Lidong Chen Reviewed-by: Sudhakar Kuppusamy --- grub-core/lib/LzmaEnc.c | 5 + 1 file changed, 5 insertions(+) diff --git a/grub-core/lib/LzmaEnc.c b/grub-core/lib/Lzm

Re: [PATCH] normal/charset: Fix underflow and overflow in loop init

2025-06-23 Thread sudhakar
;& (unsigned) i + 1 > line_start; + for (i = (signed) kk - 1; i >= 0 && (unsigned) i + 1 > line_start; i--) { enum grub_join_type join_type = get_join_type (visual[i].base); Reviewed-by: Sudhakar Kuppusamy

Re: [PATCH] loader/i386/pc/linux: Fix resource leak

2025-06-23 Thread sudhakar
-off-by: Lidong Chen it looks good.. Reviewed-by: Sudhakar Kuppusamy --- grub-core/loader/i386/pc/linux.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/grub-core/loader/i386/pc/linux.c b/grub-core/loader/i386/pc/linux.c index 4adeee9ae..0c2a4ae51 100644 --- a/grub-core

Re: [RESEND PATCH] UEFI: Fix several memory leaks of UEFI handles

2025-06-06 Thread sudhakar
@ check_protocol (void) gop_handle = 0; grub_dprintf ("video", "GOP: no usable mode\n"); - + grub_free (handles); return 0; } Thanks, Sudhakar Kuppusamy ___ Grub-devel mailing list Grub-devel@gnu.org https://lists.gnu.org/mailman/listinfo/grub-devel

Re: [PATCH 2/3] tpm2_key_protector: Dump the PCR bank for key unsealing

2025-06-10 Thread sudhakar
option, and it may not be the PCR bank for key unsealing. To dump the real PCR bank for key unsealing, this commit records the PCR bank used by 'TPM2_PolicyPCR' and dumps PCR values from that bank when necessary. Signed-off-by: Gary Lin Reviewed-by: Sudhakar Kuppusamy --- grub-c

Re: [PATCH 3/3] tests/tpm2_key_protector_test: Add tests for SHA384 PCR bank

2025-06-10 Thread sudhakar
On 2025-06-09 13:16, Gary Lin via Grub-devel wrote: Add a few more tests to seal and unseal the key with the SHA384 PCR bank instead of the default SHA256 PCR bank. Signed-off-by: Gary Lin Reviewed-by: Sudhakar Kuppusamy --- tests/tpm2_key_protector_test.in | 34

Re: [PATCH 1/3] grub-protect: Fix the hash algorithm of PCR digest

2025-06-10 Thread sudhakar
gorithm of PCR digest in grub-protect to avoid the potential unsealing failure. Ref: https://github.com/lcp/grub2/issues/4 Signed-off-by: Gary Lin Reviewed-by: Sudhakar Kuppusamy --- util/grub-protect.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/util/grub-protect.c b/util

[PATCH v3 21/25] powerpc_ieee1275: set use_static_keys flag

2025-06-10 Thread Sudhakar
From: Sudhakar Kuppusamy Introduce the use_static_keys flag to indicate that static keys are to be used rather than keys from the PKS storage's DB variable. This variable is set when Secure Boot is enabled with PKS but the DB variable is not present in the PKS storage. The appendedsig m

[PATCH v3 16/25] ieee1275: enter lockdown based on /ibm,secure-boot

2025-06-10 Thread Sudhakar
From: Daniel Axtens If the 'ibm,secure-boot' property of the root node is 2 or greater, enter lockdown. Signed-off-by: Daniel Axtens Signed-off-by: Sudhakar Kuppusamy Reviewed-by: Stefan Berger Reviewed-by: Avnish Chouhan --- docs/grub.texi | 2 +-

[PATCH v3 19/25] appendedsig: The creation of trusted and distrusted lists

2025-06-10 Thread Sudhakar
From: Sudhakar Kuppusamy The trusted certificates and binary hashes, distrusted certificates and binary/certificate hashes will be extracted from the platform keystore buffer if Secure Boot is enabled with PKS. In order to verify the integrity of the kernel, the extracted data needs to be

[PATCH v3 20/25] appendedsig: While verifying the kernel, use trusted and distrusted lists

2025-06-10 Thread Sudhakar
From: Sudhakar Kuppusamy To verify the kernel's signature: verify the kernel binary against lists of binary hashes that are either distrusted or trusted. If it is not list in either trusted or distrusted hashes list then the trusted keys from the trusted key list are used to verif

Re: [PATCH v2 10/21] appended signatures: support verifying appended signatures

2025-06-10 Thread sudhakar
Hi Daniel, Thank you for your valuable review. addressed all your review comments in v3. Thanks, sudhakar Kuppusamy On 2025-05-28 22:50, Daniel Kiper wrote: On Thu, Mar 27, 2025 at 01:02:31AM +0530, Sudhakar Kuppusamy wrote: From: Daniel Axtens Building on the parsers and the ability to

Re: [PATCH v2 11/21] appended signatures: verification tests

2025-06-10 Thread sudhakar
Hi Daniel, Thank you for your valuable review. On 2025-05-28 22:59, Daniel Kiper wrote: On Thu, Mar 27, 2025 at 01:02:32AM +0530, Sudhakar Kuppusamy wrote: [...] diff --git a/grub-core/tests/appended_signatures.h b/grub-core/tests/appended_signatures.h new file mode 100644 index 0

Re: [PATCH v2 08/21] appended signatures: import GNUTLS's ASN.1 description files

2025-06-10 Thread sudhakar
Hi Daniel, Thank you for your valuable review. addressed all the below review comments in v3. Thanks, Sudhakar Kuppusmay On 2025-05-28 21:25, Daniel Kiper wrote: On Thu, Mar 27, 2025 at 01:02:29AM +0530, Sudhakar Kuppusamy wrote: From: Daniel Axtens In order to parse PKCS#7 messages and

[PATCH v3 14/25] appended signatures: verification tests

2025-06-10 Thread Sudhakar
From: Daniel Axtens These tests are run through all_functional_test and test a range of commands and behaviours. Signed-off-by: Daniel Axtens Signed-off-by: Sudhakar Kuppusamy Reviewed-by: Stefan Berger Reviewed-by: Avnish Chouhan --- grub-core/Makefile.core.def | 6 + grub

[PATCH v3 09/25] appended signatures: import GNUTLS's ASN.1 description files

2025-06-10 Thread Sudhakar
://github.com/gnutls/gnutls/blob/master/lib/gnutls.asn - https://github.com/gnutls/gnutls/blob/master/lib/pkix.asn The GNUTLS license is LGPLv2.1+, which is GPLv3 compatible, allowing us to import it without issue. Signed-off-by: Daniel Axtens Signed-off-by: Sudhakar Kuppusamy Reviewed-by: Stefan

[PATCH v3 04/25] dl: provide a fake grub_dl_set_persistent and grub_dl_is_persistent for the emu target

2025-06-10 Thread Sudhakar
persistent modules) Signed-off-by: Daniel Axtens Signed-off-by: Sudhakar Kuppusamy Reviewed-by: Stefan Berger Reviewed-by: Avnish Chouhan --- include/grub/dl.h | 21 - 1 file changed, 20 insertions(+), 1 deletion(-) diff --git a/include/grub/dl.h b/include/grub/dl.h index

[PATCH 1/2] appendedsig: The grub command's trusted and distrusted support

2025-06-10 Thread Sudhakar
From: Sudhakar Kuppusamy To support the following trusted and distrusted commands 1. trusted_list: It will show the list of trusted certificates and binary hashes 2. distrusted_list: It will show the list of distrusted certificates and binary/certificate hashes 3

[PATCH v3 05/25] pgp: factor out rsa_pad

2025-06-10 Thread Sudhakar
d out into its own PKCS#1 v1.5 module. Signed-off-by: Daniel Axtens Signed-off-by: Sudhakar Kuppusamy Reviewed-by: Stefan Berger Reviewed-by: Avnish Chouhan Reviewed-by: Daniel Kiper --- grub-core/Makefile.core.def | 9 ++ grub-core/commands/pgp.c| 28 ++--- grub-core/lib/p

[PATCH v3 00/25] Appended Signature Secure Boot Support for PowerPC

2025-06-10 Thread Sudhakar
Add support for signing GRUB with an appended signature Sudhakar (1): PGP: renames the OBJ_TYPE_PUBKEY Sudhakar Kuppusamy (9): ieee1275: Platform Keystore (PKS) Support ieee1275: Read the DB and DBX secure boot variables appendedsig: The creation of trusted and distrusted lists appende

[PATCH v3 12/25] appended signatures: parse X.509 certificates

2025-06-10 Thread Sudhakar
support the Extended Key Usage extension and handle it by verifying that the certificate has a Code Signing usage. Signed-off-by: Javier Martinez Canillas # EKU support Reported-by: Michal Suchanek # key usage issue Signed-off-by: Daniel Axtens Signed-off-by: Sudhakar Kuppusamy Reviewed-by

[PATCH v3 06/25] crypto: move storage for grub_crypto_pk_* to crypto.c

2025-06-10 Thread Sudhakar
etc) use grub_crypto_lookup_cipher_by_name() to get a cipher handle. That depends on grub_ciphers being populated by people calling grub_cipher_register. import_gcry.py ensures that the symmetric ciphers call it.] Signed-off-by: Daniel Axtens Signed-off-by: Sudhakar Kuppusamy Reviewed-by: Stefan Berger Reviewed-by:

[PATCH v3 11/25] appended signatures: parse PKCS#7 signedData

2025-06-10 Thread Sudhakar
message will be ignored. Signed-off-by: Javier Martinez Canillas # EKU support Reported-by: Michal Suchanek # key usage issue Signed-off-by: Daniel Axtens Signed-off-by: Sudhakar Kuppusamy Reviewed-by: Stefan Berger Reviewed-by: Avnish Chouhan --- grub-core/commands/appendedsig/appendedsig.h

[PATCH v3 15/25] appended signatures: documentation

2025-06-10 Thread Sudhakar
From: Daniel Axtens This explains how appended signatures can be used to form part of a secure boot chain, and documents the commands and variables introduced. Signed-off-by: Daniel Axtens Signed-off-by: Sudhakar Kuppusamy Reviewed-by: Stefan Berger Reviewed-by: Avnish Chouhan --- docs

[PATCH v3 01/25] powerpc-ieee1275: Add support for signing GRUB with an appended signature

2025-06-10 Thread Sudhakar
before the appended signature structure (not at the end) so that the final bytes of a signed ELF file are the appended signature magic. A subsequent patch documents how to create a GRUB core.img validly signed under this scheme. Signed-off-by: Rashmica Gupta Signed-off-by: Daniel Axtens Sig

[PATCH v3 17/25] ieee1275: Platform Keystore (PKS) Support

2025-06-10 Thread Sudhakar
From: Sudhakar Kuppusamy enhancing the infrastructure to enable the Platform Keystore (PKS) feature, which provides access to the SB VERSION, DB, and DBX secure boot variables from PKS. Signed-off-by: Sudhakar Kuppusamy Reviewed-by: Stefan Berger Reviewed-by: Avnish Chouhan --- grub-core

[PATCH v3 22/25] appendedsig: Reads the default DB keys from ELF Note

2025-06-10 Thread Sudhakar
From: Sudhakar Kuppusamy If Secure Boot is enabled with PKS and the use_static_keys flag is set, then read the DB default keys from the ELF note and store them in the trusted list buffer. Signed-off-by: Sudhakar Kuppusamy Reviewed-by: Stefan Berger Reviewed-by: Avnish Chouhan --- grub-core

[PATCH v3 24/25] appendedsig: documentation

2025-06-10 Thread Sudhakar
From: Sudhakar Kuppusamy This explains how static and dynamic key appended signatures can be used to form part of a secure boot chain, and documents the commands and variables introduced. Signed-off-by: Sudhakar Kuppusamy Reviewed-by: Avnish Chouhan --- docs/grub.texi | 113

[PATCH v3 10/25] appended signatures: parse ASN1 node

2025-06-10 Thread Sudhakar
Signed-off-by: Daniel Axtens Signed-off-by: Sudhakar Kuppusamy Reviewed-by: Stefan Berger Reviewed-by: Avnish Chouhan --- grub-core/commands/appendedsig/appendedsig.h | 42 + grub-core/commands/appendedsig/asn1util.c| 96 2 files changed, 138 insertions(+) create

[PATCH v3 03/25] docs/grub: Document signing GRUB with an appended signature

2025-06-10 Thread Sudhakar
From: Daniel Axtens Signing GRUB for firmware that verifies an appended signature is a bit fiddly. I don't want people to have to figure it out from scratch so document it here. Signed-off-by: Daniel Axtens Signed-off-by: Sudhakar Kuppusamy Reviewed-by: Stefan Berger Reviewed-by: A

[PATCH v3 25/25] appendedsig: correcting the grub commands in appended signature tests

2025-06-10 Thread Sudhakar
From: Sudhakar Kuppusamy changed the following grub commands: - "trust_certificate" to "trusted_certificate" - "distrust_certificate" to "distrusted_certificate" Signed-off-by: Sudhakar Kuppusamy --- grub-core/tests/appended_signature_test.c | 30 +++

[PATCH v3 08/25] grub-install: support embedding x509 certificates

2025-06-10 Thread Sudhakar
keys. Signed-off-by: Alastair D'Silva Signed-off-by: Daniel Axtens Signed-off-by: Sudhakar Kuppusamy Reviewed-by: Stefan Berger Reviewed-by: Avnish Chouhan --- include/grub/kernel.h | 1 + include/grub/util/install.h | 3 +++ util/grub-install-common.c | 19 ++-

[PATCH v3 23/25] appendedsig: The grub command's trusted and distrusted support

2025-06-10 Thread Sudhakar
From: Sudhakar Kuppusamy To support the following trusted and distrusted commands 1. trusted_list: It will show the list of trusted certificates and binary hashes 2. distrusted_list: It will show the list of distrusted certificates and binary/certificate hashes 3

[PATCH v3 13/25] appended signatures: support verifying appended signatures

2025-06-10 Thread Sudhakar
solution: other mechanisms, such as a password or lockdown, must be used to ensure that a user cannot drop to the grub shell and disable verification. Signed-off-by: Daniel Axtens Signed-off-by: Sudhakar Kuppusamy Reviewed-by: Stefan Berger Reviewed-by: Avnish Chouhan --- grub-core

[PATCH v3 18/25] ieee1275: Read the DB and DBX secure boot variables

2025-06-10 Thread Sudhakar
From: Sudhakar Kuppusamy If secure boot is enabled with PKS, it will read secure boot variables such as db and dbx from PKS and extract ESL's from it. The ESL's would be saved in the platform keystore buffer, and the appendedsig (module) would read it later to extract the certificate

[PATCH v3 07/25] PGP: renames the OBJ_TYPE_PUBKEY

2025-06-10 Thread Sudhakar
renames the OBJ_TYPE_PUBKEY to OBJ_TYPE_GPG_PUBKEY Signed-off-by: Alastair D'Silva Signed-off-by: Daniel Axtens Signed-off-by: Sudhakar Kuppusamy Reviewed-by: Stefan Berger Reviewed-by: Avnish Chouhan --- grub-core/commands/pgp.c | 2 +- include/grub/kernel.h| 2 +- util/grub-mkim

[PATCH v3 02/25] docs/grub: Document signing GRUB under UEFI

2025-06-10 Thread Sudhakar
From: Daniel Axtens Before adding information about how grub is signed with an appended signature scheme, it's worth adding some information about how it can currently be signed for UEFI. Signed-off-by: Daniel Axtens Signed-off-by: Sudhakar Kuppusamy Reviewed-by: Stefan Berger Review

Re: [PATCH v2 09/21] appended signatures: parse PKCS#7 signedData and X.509 certificates

2025-06-10 Thread sudhakar
Hi Daniel, Thank you for your valuable review. addressed all the below review comments in v3. Thanks, Sudhakar Kuppusmay On 2025-05-28 22:14, Daniel Kiper wrote: On Thu, Mar 27, 2025 at 01:02:30AM +0530, Sudhakar Kuppusamy wrote: From: Daniel Axtens This code allows us to parse: - PKCS

Re: [PATCH v2 07/21] grub-install: support embedding x509 certificates

2025-06-10 Thread sudhakar
Hi Daniel, Thank you for your valuable review. splited this patch into two in v3. Thanks, Sudhakar Kuppusmay On 2025-05-28 21:17, Daniel Kiper wrote: On Thu, Mar 27, 2025 at 01:02:28AM +0530, Sudhakar Kuppusamy wrote: From: Alastair D'Silva To support verification of appended signa

Re: [PATCH v2 01/21] powerpc-ieee1275: Add support for signing grub with an appended signature

2025-06-10 Thread sudhakar
Hi Daniel, Thank you for your valuable review comments. On 2025-05-22 23:19, Daniel Kiper wrote: On Thu, Mar 27, 2025 at 01:02:22AM +0530, Sudhakar Kuppusamy wrote: From: Rashmica Gupta Add infrastructure to allow firmware to verify the integrity of grub by use of a Linux-kernel-module

Re: [PATCH v2 03/21] docs/grub: Document signing grub with an appended signature

2025-06-10 Thread sudhakar
Hi Daniel, Thank you for your valuable review comments. addressed all your comments. On 2025-05-22 23:49, Daniel Kiper wrote: On Thu, Mar 27, 2025 at 01:02:24AM +0530, Sudhakar Kuppusamy wrote: From: Daniel Axtens Signing grub for firmware that verifies an appended signature is a s/grub

[PATCH v3 00/25] Appended Signature Secure Boot Support for PowerPC

2025-06-10 Thread Sudhakar
Add support for signing GRUB with an appended signature Sudhakar (1): PGP: renames the OBJ_TYPE_PUBKEY Sudhakar Kuppusamy (9): ieee1275: Platform Keystore (PKS) Support ieee1275: Read the DB and DBX secure boot variables appendedsig: The creation of trusted and distrusted list

[PATCH v3 00/25] Appended Signature Secure Boot Support for PowerPC

2025-06-10 Thread Sudhakar
Add support for signing GRUB with an appended signature Sudhakar (1): PGP: renames the OBJ_TYPE_PUBKEY Sudhakar Kuppusamy (9): ieee1275: Platform Keystore (PKS) Support ieee1275: Read the DB and DBX secure boot variables appendedsig: The creation of trusted and distrusted lists appende

Re: [PATCH v7] efi: new 'connectefi' command

2025-06-10 Thread sudhakar
"pciroot|disk|all", + N_("Connect EFI handles." + " If 'pciroot' is specified, connect PCI" + " root EFI handles recursively." +

Re: [PATCH v1] lsefi: fixed memory leaks

2025-06-10 Thread sudhakar
(protocols); Hi Renaud Métrich, better to use like this if (protocols != NULL) grub_efi_free_pool (protocols); thanks, Sudhakar } + grub_free (handles); + return 0; } ___ Grub-devel mailing list Grub-devel@gnu.org https://lis

Re: [PATCH] lib/LzmaEnc: Validate 'len' before subtracting

2025-06-10 Thread sudhakar
p->state = kMatchNextStates[p->state]; + if (len < LZMA_MATCH_LEN_MIN) + { + p->result = SZ_ERROR_DATA; + return CheckErrors(p); + } Hi Lidong Chen, please fix the indentation issue in if condition. thanks, sudhakar LenEnc_Encode2(&a

[PATCH v0 0/2] Secure Boot Advanced Targeting (SBAT) support on powerpc

2024-04-16 Thread Sudhakar Kuppusamy
at.csv and create the ELF Note for it then store the SBAT data on it while generate image with -s option Sudhakar Kuppusamy and Daniel Axtens (2): mkimage: create new ELF Note for SBAT mkimage: adding sbat data into sbat ELF Note on powerpc include/grub/util/mkimage.h | 4 +-- util/gr

[PATCH v0 1/2] mkimage: create new ELF Note for SBAT

2024-04-16 Thread Sudhakar Kuppusamy
we add a new ELF note for SBAT which store the SBAT data. The name field of shall be the string "Secure-Boot-Advanced-Targeting", zero-padded to 4 byte alignment. The type field shall be 0x41536967 (the ASCII values for the string "sbat"). Signed-off-by: Sudhakar Kuppu

[PATCH v0 1/2] mkimage: create new ELF Note for SBAT

2024-04-16 Thread Sudhakar Kuppusamy
we add a new ELF note for SBAT which store the SBAT data. The name field of shall be the string "Secure-Boot-Advanced-Targeting", zero-padded to 4 byte alignment. The type field shall be 0x41536967 (the ASCII values for the string "sbat"). Signed-off-by: Sudhakar Kuppu

[PATCH v0 0/2] Secure Boot Advanced Targeting (SBAT) support on powerpc

2024-04-16 Thread Sudhakar Kuppusamy
at.csv and create the ELF Note for it then store the SBAT data on it while generate image with -s option Sudhakar Kuppusamy and Daniel Axtens (2): mkimage: create new ELF Note for SBAT mkimage: adding sbat data into sbat ELF Note on powerpc include/grub/util/mkimage.h | 4 +-- util/gr

[PATCH v0 2/2] mkimage: adding sbat data into sbat ELF Note on powerpc

2024-04-16 Thread Sudhakar Kuppusamy
it reads the SBAT data from sbat.csv and create the ELF Note for it then store the SBAT data on it while generate image with -s option Signed-off-by: Sudhakar Kuppusamy Co-authored-by: Daniel Axtens --- util/mkimage.c | 21 - 1 file changed, 16 insertions(+), 5 deletions

[PATCH v1 2/2] mkimage: adding sbat data into sbat ELF Note on powerpc

2024-06-06 Thread Sudhakar Kuppusamy
it reads the SBAT data from sbat.csv and create the ELF Note for it then store the SBAT data on it while generate image with -s option Signed-off-by: Sudhakar Kuppusamy Co-authored-by: Daniel Axtens --- util/mkimage.c | 19 +++ 1 file changed, 15 insertions(+), 4 deletions

[PATCH v1 0/2] Secure Boot Advanced Targeting (SBAT) support on powerpc

2024-06-06 Thread Sudhakar Kuppusamy
alignment. The type field shall be 0x41536967 (the ASCII values for the string "sbat"). 2) Patch 2: adding sbat data into sbat ELF Note it reads the SBAT data from sbat.csv and create the ELF Note for it then store the SBAT data on it while generate image with -s opti

[PATCH v1 1/2] mkimage: create new ELF Note for SBAT

2024-06-06 Thread Sudhakar Kuppusamy
we add a new ELF note for SBAT which store the SBAT data. The name field of shall be the string "Secure-Boot-Advanced-Targeting", zero-padded to 4 byte alignment. The type field shall be 0x41536967 (the ASCII values for the string "sbat"). Signed-off-by: Sudhakar Kuppu

[PATCH V3 INTERNAL 1/2] mkimage: create new ELF Note for SBAT

2024-09-13 Thread Sudhakar Kuppusamy
In order to store the SBAT data, we create a new ELF note. The string "Secure-Boot-Advanced-Targeting", zero-padded to 4 byte alignment, shall be entered in the name field. The string "sbat"'s ASCII values, 0x41536967, should be entered in the type field. Signed-off-b

[PATCH V3 INTERNAL 0/2] Secure Boot Advanced Targeting (SBAT) support on powerpc

2024-09-13 Thread Sudhakar Kuppusamy
sudo ./grub-install --modules "$GRUB_MODULES" -d ./grub-core/ -v "/dev/sda2" --sbat=./sbat_metadata.csv dd if=/boot/grub/powerpc-ieee1275/core.elf of=/dev/sda2 Sudhakar Kuppusamy (2): mkimage: create new ELF Note for SBAT mkimage: adding sbat metadata into sbat E

[PATCH V3 INTERNAL 2/2] mkimage: adding sbat metadata into sbat ELF Note on powerpc

2024-09-13 Thread Sudhakar Kuppusamy
The SBAT metadata, which is read from .csv file and transformed into an ELF note, is made into an image using the -s option. Signed-off-by: Sudhakar Kuppusamy Co-authored-by: Daniel Axtens --- util/mkimage.c | 12 ++-- 1 file changed, 10 insertions(+), 2 deletions(-) diff --git a

[PATCH v3 2/2] mkimage: adding sbat metadata into sbat ELF Note on powerpc

2024-09-13 Thread Sudhakar Kuppusamy
The SBAT metadata, which is read from .csv file and transformed into an ELF note, is made into an image using the -s option. Signed-off-by: Sudhakar Kuppusamy Co-authored-by: Daniel Axtens --- util/mkimage.c | 12 ++-- 1 file changed, 10 insertions(+), 2 deletions(-) diff --git a

[PATCH v3 1/2] mkimage: create new ELF Note for SBAT

2024-09-13 Thread Sudhakar Kuppusamy
In order to store the SBAT data, we create a new ELF note. The string "Secure-Boot-Advanced-Targeting", zero-padded to 4 byte alignment, shall be entered in the name field. The string "sbat"'s ASCII values, 0x41536967, should be entered in the type field. Signed-off-b

[PATCH v3 0/2] Secure Boot Advanced Targeting (SBAT) support on powerpc

2024-09-13 Thread Sudhakar Kuppusamy
sudo ./grub-install --modules "$GRUB_MODULES" -d ./grub-core/ -v "/dev/sda2" --sbat=./sbat_metadata.csv dd if=/boot/grub/powerpc-ieee1275/core.elf of=/dev/sda2 Sudhakar Kuppusamy (2): mkimage: create new ELF Note for SBAT mkimage: adding sbat metadata into sbat E

[PATCH v4 0/2] Secure Boot Advanced Targeting (SBAT) support on powerpc

2024-10-23 Thread Sudhakar Kuppusamy
es "$GRUB_MODULES" -d ./grub-core/ -v "/dev/sda2" --sbat=./sbat_metadata.csv dd if=/boot/grub/powerpc-ieee1275/core.elf of=/dev/sda2 Daniel Axtens and Sudhakar Kuppusamy (2): mkimage: create new ELF Note for SBAT mkimage: adding sbat metadata into sbat ELF Note on po

[PATCH v4 2/2] mkimage: adding sbat metadata into sbat ELF Note on powerpc

2024-10-23 Thread Sudhakar Kuppusamy
The SBAT metadata, which is read from .csv file and transformed into an ELF note, is made into an image using the -s option. Signed-off-by: Daniel Axtens Signed-off-by: Sudhakar Kuppusamy --- util/mkimage.c | 11 +-- 1 file changed, 9 insertions(+), 2 deletions(-) diff --git a/util

[PATCH v4 1/2] mkimage: create new ELF Note for SBAT

2024-10-23 Thread Sudhakar Kuppusamy
In order to store the SBAT data, we create a new ELF note. The string ".sbat", zero-padded to 4 byte alignment, shall be entered in the name field. The string "SBAT"'s ASCII values, 0x53424154, should be entered in the type field. Signed-off-by: Daniel Axtens Signed-o

[PATCH v1 11/21] appended signatures: verification tests

2024-12-18 Thread Sudhakar Kuppusamy
From: Daniel Axtens These tests are run through all_functional_test and test a range of commands and behaviours. Signed-off-by: Daniel Axtens Signed-off-by: Sudhakar Kuppusamy --- grub-core/Makefile.core.def | 6 + grub-core/tests/appended_signature_test.c | 258 ++ grub

[PATCH v1 14/21] ieee1275: Platform Keystore (PKS) Support

2024-12-18 Thread Sudhakar Kuppusamy
enhancing the infrastructure to enable the Platform Keystore (PKS) feature, which provides access to the SB VERSION, DB, and DBX secure boot variables from PKS. Signed-off-by: Sudhakar Kuppusamy --- grub-core/kern/ieee1275/ieee1275.c | 117 + include/grub/ieee1275

[PATCH v1 09/21] appended signatures: parse PKCS#7 signedData and X.509 certificates

2024-12-18 Thread Sudhakar Kuppusamy
# key usage issue Signed-off-by: Daniel Axtens Signed-off-by: Sudhakar Kuppusamy --- grub-core/commands/appendedsig/appendedsig.h | 110 +++ grub-core/commands/appendedsig/asn1util.c| 99 ++ grub-core/commands/appendedsig/pkcs7.c | 473 + grub-core/commands/appendedsig/x509.c

[PATCH v1 16/21] appendedsig: The creation of trusted and distrusted lists

2024-12-18 Thread Sudhakar Kuppusamy
), rejected it while extracting it from the platform keystore buffer. Signed-off-by: Sudhakar Kuppusamy --- grub-core/commands/appendedsig/appendedsig.c | 636 +-- 1 file changed, 592 insertions(+), 44 deletions(-) diff --git a/grub-core/commands/appendedsig/appendedsig.c b/grub

[PATCH v1 15/21] ieee1275: Read the DB and DBX secure boot variables

2024-12-18 Thread Sudhakar Kuppusamy
ff-by: Sudhakar Kuppusamy --- grub-core/Makefile.am | 1 + grub-core/Makefile.core.def | 1 + grub-core/kern/ieee1275/init.c | 14 +- grub-core/kern/ieee1275/platform_keystore.c | 337 include/grub/platform_keyst

[PATCH v1 08/21] appended signatures: import GNUTLS's ASN.1 description files

2024-12-18 Thread Sudhakar Kuppusamy
. Signed-off-by: Daniel Axtens Signed-off-by: Sudhakar Kuppusamy --- .../commands/appendedsig/gnutls_asn1_tab.c| 121 + .../commands/appendedsig/pkix_asn1_tab.c | 484 ++ 2 files changed, 605 insertions(+) create mode 100644 grub-core/commands/appendedsig/gnutls_asn1_tab.c

[PATCH v1 02/21] docs/grub: Document signing grub under UEFI

2024-12-18 Thread Sudhakar Kuppusamy
From: Daniel Axtens Before adding information about how grub is signed with an appended signature scheme, it's worth adding some information about how it can currently be signed for UEFI. Signed-off-by: Daniel Axtens Signed-off-by: Sudhakar Kuppusamy --- docs/grub.texi

[PATCH v1 06/21] crypto: move storage for grub_crypto_pk_* to crypto.c

2024-12-18 Thread Sudhakar Kuppusamy
etc) use grub_crypto_lookup_cipher_by_name() to get a cipher handle. That depends on grub_ciphers being populated by people calling grub_cipher_register. import_gcry.py ensures that the symmetric ciphers call it.] Signed-off-by: Daniel Axtens Signed-off-by: Sudhakar Kuppusamy --- grub-core/commands/pgp.c | 4 grub

[PATCH v1 07/21] grub-install: support embedding x509 certificates

2024-12-18 Thread Sudhakar Kuppusamy
keys. Signed-off-by: Alastair D'Silva Signed-off-by: Daniel Axtens Signed-off-by: Sudhakar Kuppusamy --- grub-core/commands/pgp.c| 2 +- include/grub/kernel.h | 2 ++ include/grub/util/install.h | 3 +++ util/grub-install-common.c | 19 ++- util/grub-mkimage.c

[PATCH v1 04/21] dl: provide a fake grub_dl_set_persistent for the emu target

2024-12-18 Thread Sudhakar Kuppusamy
-off-by: Daniel Axtens Signed-off-by: Sudhakar Kuppusamy --- include/grub/dl.h | 11 +++ 1 file changed, 11 insertions(+) diff --git a/include/grub/dl.h b/include/grub/dl.h index 750fc8d3d..fb4476797 100644 --- a/include/grub/dl.h +++ b/include/grub/dl.h @@ -242,11 +242,22 @@ grub_dl_get

[PATCH v1 01/21] powerpc-ieee1275: Add support for signing grub with an appended signature

2024-12-18 Thread Sudhakar Kuppusamy
before the appended signature structure (not at the end) so that the final bytes of a signed ELF file are the appended signature magic. A subsequent patch documents how to create a grub core.img validly signed under this scheme. Signed-off-by: Rashmica Gupta Signed-off-by: Daniel Axtens Sig

[PATCH v1 03/21] docs/grub: Document signing grub with an appended signature

2024-12-18 Thread Sudhakar Kuppusamy
From: Daniel Axtens Signing grub for firmware that verifies an appended signature is a bit fiddly. I don't want people to have to figure it out from scratch so document it here. Signed-off-by: Daniel Axtens Signed-off-by: Sudhakar Kuppusamy --- docs/grub.texi

  1   2   3   >