From patchwork Wed Apr 13 07:16:36 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jan Kiszka X-Patchwork-Id: 12812184 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 0272BC352AA for ; Wed, 13 Apr 2022 15:48:07 +0000 (UTC) Received: from mta-64-228.siemens.flowmailer.net (mta-64-228.siemens.flowmailer.net [185.136.64.228]) by mx.groups.io with SMTP id smtpd.web11.3440.1649834201790323295 for ; Wed, 13 Apr 2022 00:16:44 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=jan.kiszka@siemens.com header.s=fm1 header.b=khttu8KY; spf=pass (domain: rts-flowmailer.siemens.com, ip: 185.136.64.228, mailfrom: fm-294854-202204130716430c0da5d3fa0b062d83-ucxtq0@rts-flowmailer.siemens.com) Received: by mta-64-228.siemens.flowmailer.net with ESMTPSA id 202204130716430c0da5d3fa0b062d83 for ; Wed, 13 Apr 2022 09:16:44 +0200 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; s=fm1; d=siemens.com; i=jan.kiszka@siemens.com; h=Date:From:Subject:To:Message-ID:MIME-Version:Content-Type:Content-Transfer-Encoding:Cc:References:In-Reply-To; bh=QjhILSWUFTGLOnXV8x7gQka8M+oclocTcR+QDf4/8T8=; b=khttu8KYfs3j7jWSTpNpPNziYeYpB/BpGyNihjrGpArX+ggSVXJGG372IPP9aDABxztd26 +LJgS5eIbc/wBvLDeAA7pz4p17fQAyYIFExJ/6WUKhsZ/dGIzZxihoCj+aAHn8mk31O5+LMj +B1auqezIuxuJjAaXCltIs7/P91Ng=; From: Jan Kiszka To: cip-dev@lists.cip-project.org Cc: Quirin Gylstorff , Christian Storm Subject: [isar-cip-core][PATCH 19/19] doc: README.secureboot polishing Date: Wed, 13 Apr 2022 09:16:36 +0200 Message-Id: In-Reply-To: References: MIME-Version: 1.0 X-Flowmailer-Platform: Siemens Feedback-ID: 519:519-294854:519-21489:flowmailer List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 13 Apr 2022 15:48:07 -0000 X-Groupsio-URL: https://lists.cip-project.org/g/cip-dev/message/8066 From: Jan Kiszka There has never been a uefikernel parameter for efibootguard-boot, so drop this. Furthermore, spell-out "EFI Boot Guard" and adjust some section levels and titles. Signed-off-by: Jan Kiszka --- doc/README.secureboot.md | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/doc/README.secureboot.md b/doc/README.secureboot.md index 3c2d524..b2d7be9 100644 --- a/doc/README.secureboot.md +++ b/doc/README.secureboot.md @@ -1,11 +1,11 @@ -# Efibootguard Secure boot +# EFI Boot Guard secure boot This document describes how to generate a secure boot capable image with [efibootguard](https://github.com/siemens/efibootguard). ## Description -The image build signs the efibootguard bootloader (bootx64.efi) and generates +The image build signs the EFI Boot Guard bootloader (bootx64.efi) and generates a signed [unified kernel image](https://systemd.io/BOOT_LOADER_SPECIFICATION/). A unified kernel image packs the kernel, initramfs and the kernel command-line in one binary object. As the kernel command-line is immutable after the build @@ -19,12 +19,12 @@ If a match is found the rootfs is used for the boot. ## Adaptation for Images -### WIC +### WIC The following elements must be present in a wks file to create a secure boot capable image. ``` part --source efibootguard-efi --sourceparams "signwith=