[PATCH] EFI: update the documentation to correctly order loading SB keys

AKASHI Takahiro takahiro.akashi at linaro.org
Mon Nov 28 01:45:29 CET 2022


On Fri, Nov 25, 2022 at 01:30:11PM +0000, luca.boccassi at gmail.com wrote:
> From: Luca Boccassi <bluca at debian.org>
> 
> Loading the PK locks down the EFI variables, so it needs to be done last.

No, it's not (always) correct.

> Fix the order in the documentation and add a note.
> 
> Signed-off-by: Luca Boccassi <bluca at debian.org>
> ---
>  doc/develop/uefi/uefi.rst | 12 ++++++++----
>  1 file changed, 8 insertions(+), 4 deletions(-)
> 
> diff --git a/doc/develop/uefi/uefi.rst b/doc/develop/uefi/uefi.rst
> index e0835beba4..68a0bb6832 100644
> --- a/doc/develop/uefi/uefi.rst
> +++ b/doc/develop/uefi/uefi.rst
> @@ -169,12 +169,16 @@ Sign an image with one of the keys in "db" on your host
>  
>  Now in U-Boot install the keys on your board::
>  
> -    fatload mmc 0:1 <tmpaddr> PK.auth
> -    setenv -e -nv -bs -rt -at -i <tmpaddr>:$filesize PK
> -    fatload mmc 0:1 <tmpaddr> KEK.auth
> -    setenv -e -nv -bs -rt -at -i <tmpaddr>:$filesize KEK
>      fatload mmc 0:1 <tmpaddr> db.auth
>      setenv -e -nv -bs -rt -at -i <tmpaddr>:$filesize db
> +    fatload mmc 0:1 <tmpaddr> KEK.auth
> +    setenv -e -nv -bs -rt -at -i <tmpaddr>:$filesize KEK
> +    fatload mmc 0:1 <tmpaddr> PK.auth
> +    setenv -e -nv -bs -rt -at -i <tmpaddr>:$filesize PK
> +
> +Note that loading a key into PK automatically enables Secure Boot, and further
> +unsigned updates of secure EFI variables will no longer be allowed, so PK should
> +be loaded last.

KEK.auth and db.auth are created by sign-efi-sig-list command
(with valid keys) and contain authentication headers necessary
for signature verification.
So the original sequence works perfectly.

-Takahiro Akashi

>  Set up boot parameters on your board::
>  
> -- 
> 2.34.1
> 


More information about the U-Boot mailing list