Message ID | 20230228120825.2522604-1-srinuvasan_a@mentor.com (mailing list archive) |
---|---|
State | Accepted |
Headers | show |
Series | [isar-cip-core] README.secureboot.md: update the document | expand |
On 28.02.23 13:08, Srinuvasan A wrote: > From: Srinuvasan A <srinuvasan.a@siemens.com> > > Update the secureboot document based on the current implementation. > > Note: Now secureboot directly boot the linux hence no need to provide the efi > file path in efi shell. > > Signed-off-by: Srinuvasan A <srinuvasan.a@siemens.com> > --- > doc/README.secureboot.md | 49 ++++++++++++++++++++-------------------- > 1 file changed, 24 insertions(+), 25 deletions(-) > > diff --git a/doc/README.secureboot.md b/doc/README.secureboot.md > index b15ea93..54d67c7 100644 > --- a/doc/README.secureboot.md > +++ b/doc/README.secureboot.md > @@ -67,10 +67,9 @@ Set up a secure boot test environment with [QEMU](https://www.qemu.org/) > ### Prerequisites > > - OVMF from edk2 release edk2-stable201911 or newer > - - This documentation was tested under Debian 10 with OVMF (0.0~20200229-2) backported from Debian > - bullseye > + - This documentation was tested under Debian 11 with OVMF (2020.11-2+deb11u1) from Debian bullseye > - efitools for KeyTool.efi > - - This documentation was tested under Debian 10 with efitools (1.9.2-1) backported from Debian bullseye > + - This documentation was tested under Debian 11 with efitools (1.9.2-2~deb11u1) from Debian bullseye > - libnss3-tools > > ### Debian Snakeoil keys > @@ -80,7 +79,7 @@ You can use them as described in section [Start Image](#start-the-image). > > ### Generate Keys > > -#### Reuse exiting keys > +#### Reuse existing keys > > It is possible to use exiting keys like /usr/share/ovmf/PkKek-1-snakeoil.pem' from Debian > by executing the script `scripts/generate-sb-db-from-existing-certificate.sh`, e.g.: > @@ -196,12 +195,6 @@ and the following command is sufficient: > ./start-qemu.sh amd64 > ``` > > -The default `OVMF_VARS.snakeoil_4M.fd` boot to the EFI shell. To boot Linux enter the following command: > -``` > -FS0:\EFI\BOOT\bootx64.efi > -``` > -To change the boot behavior, enter `exit` in the shell to enter the bios and change the boot order. > - > #### User-generated keys > Start the image with the following command: > ``` > @@ -239,14 +232,17 @@ scp -P 22222 /tmp/cip-core-image-cip-core-bullseye-qemu-amd64.swu root@127.0.0.1 > ``` > - check which partition is booted, e.g. with `lsblk`: > ``` > -root@demo:/mnt# lsblk > -NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINT > -sda 8:0 0 2G 0 disk > -├─sda1 8:1 0 16.4M 0 part > -├─sda2 8:2 0 32M 0 part > -├─sda3 8:3 0 32M 0 part > -├─sda4 8:4 0 1000M 0 part / > -└─sda5 8:5 0 1000M 0 part > +root@demo:~# lsblk > +NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINT > +sda 8:0 0 6G 0 disk > +├─sda1 8:1 0 16.1M 0 part > +├─sda2 8:2 0 32M 0 part > +├─sda3 8:3 0 32M 0 part > +├─sda4 8:4 0 1G 0 part > +│ └─verityroot 252:0 0 110.9M 1 crypt / > +├─sda5 8:5 0 1G 0 part > +├─sda6 8:6 0 1.3G 0 part /home > +└─sda7 8:7 0 2.6G 0 part /var > ``` > > - install the swupdate and reboot the image > @@ -257,11 +253,14 @@ root@demo:~# reboot > - check which partition is booted, e.g. with `lsblk`. The rootfs should have changed: > ``` > root@demo:~# lsblk > -NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINT > -sda 8:0 0 2G 0 disk > -├─sda1 8:1 0 16.4M 0 part > -├─sda2 8:2 0 32M 0 part > -├─sda3 8:3 0 32M 0 part > -├─sda4 8:4 0 1000M 0 part > -└─sda5 8:5 0 1000M 0 part / > +NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINT > +sda 8:0 0 6G 0 disk > +├─sda1 8:1 0 16.1M 0 part > +├─sda2 8:2 0 32M 0 part > +├─sda3 8:3 0 32M 0 part > +├─sda4 8:4 0 1G 0 part > +├─sda5 8:5 0 1G 0 part > +│ └─verityroot 252:0 0 110.9M 1 crypt / > +├─sda6 8:6 0 1.3G 0 part /home > +└─sda7 8:7 0 2.6G 0 part /var > ``` Adding Quirin for a cross-check as well, but it looks good to me. Jan
On 2/28/23 13:22, Jan Kiszka wrote: > On 28.02.23 13:08, Srinuvasan A wrote: >> From: Srinuvasan A <srinuvasan.a@siemens.com> >> >> Update the secureboot document based on the current implementation. >> >> Note: Now secureboot directly boot the linux hence no need to provide the efi >> file path in efi shell. >> >> Signed-off-by: Srinuvasan A <srinuvasan.a@siemens.com> >> --- >> doc/README.secureboot.md | 49 ++++++++++++++++++++-------------------- >> 1 file changed, 24 insertions(+), 25 deletions(-) >> >> diff --git a/doc/README.secureboot.md b/doc/README.secureboot.md >> index b15ea93..54d67c7 100644 >> --- a/doc/README.secureboot.md >> +++ b/doc/README.secureboot.md >> @@ -67,10 +67,9 @@ Set up a secure boot test environment with [QEMU](https://www.qemu.org/) >> ### Prerequisites >> >> - OVMF from edk2 release edk2-stable201911 or newer >> - - This documentation was tested under Debian 10 with OVMF (0.0~20200229-2) backported from Debian >> - bullseye >> + - This documentation was tested under Debian 11 with OVMF (2020.11-2+deb11u1) from Debian bullseye >> - efitools for KeyTool.efi >> - - This documentation was tested under Debian 10 with efitools (1.9.2-1) backported from Debian bullseye >> + - This documentation was tested under Debian 11 with efitools (1.9.2-2~deb11u1) from Debian bullseye >> - libnss3-tools Should we remove the Debian 10 lines? cip-core still supports Debian 10. >> >> ### Debian Snakeoil keys >> @@ -80,7 +79,7 @@ You can use them as described in section [Start Image](#start-the-image). >> >> ### Generate Keys >> >> -#### Reuse exiting keys >> +#### Reuse existing keys >> >> It is possible to use exiting keys like /usr/share/ovmf/PkKek-1-snakeoil.pem' from Debian >> by executing the script `scripts/generate-sb-db-from-existing-certificate.sh`, e.g.: >> @@ -196,12 +195,6 @@ and the following command is sufficient: >> ./start-qemu.sh amd64 >> ``` >> >> -The default `OVMF_VARS.snakeoil_4M.fd` boot to the EFI shell. To boot Linux enter the following command: >> -``` >> -FS0:\EFI\BOOT\bootx64.efi >> -``` >> -To change the boot behavior, enter `exit` in the shell to enter the bios and change the boot order. >> - >> #### User-generated keys >> Start the image with the following command: >> ``` >> @@ -239,14 +232,17 @@ scp -P 22222 /tmp/cip-core-image-cip-core-bullseye-qemu-amd64.swu root@127.0.0.1 >> ``` >> - check which partition is booted, e.g. with `lsblk`: >> ``` >> -root@demo:/mnt# lsblk >> -NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINT >> -sda 8:0 0 2G 0 disk >> -├─sda1 8:1 0 16.4M 0 part >> -├─sda2 8:2 0 32M 0 part >> -├─sda3 8:3 0 32M 0 part >> -├─sda4 8:4 0 1000M 0 part / >> -└─sda5 8:5 0 1000M 0 part >> +root@demo:~# lsblk >> +NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINT >> +sda 8:0 0 6G 0 disk >> +├─sda1 8:1 0 16.1M 0 part >> +├─sda2 8:2 0 32M 0 part >> +├─sda3 8:3 0 32M 0 part >> +├─sda4 8:4 0 1G 0 part >> +│ └─verityroot 252:0 0 110.9M 1 crypt / >> +├─sda5 8:5 0 1G 0 part >> +├─sda6 8:6 0 1.3G 0 part /home >> +└─sda7 8:7 0 2.6G 0 part /var >> ``` >> >> - install the swupdate and reboot the image >> @@ -257,11 +253,14 @@ root@demo:~# reboot >> - check which partition is booted, e.g. with `lsblk`. The rootfs should have changed: >> ``` >> root@demo:~# lsblk >> -NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINT >> -sda 8:0 0 2G 0 disk >> -├─sda1 8:1 0 16.4M 0 part >> -├─sda2 8:2 0 32M 0 part >> -├─sda3 8:3 0 32M 0 part >> -├─sda4 8:4 0 1000M 0 part >> -└─sda5 8:5 0 1000M 0 part / >> +NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINT >> +sda 8:0 0 6G 0 disk >> +├─sda1 8:1 0 16.1M 0 part >> +├─sda2 8:2 0 32M 0 part >> +├─sda3 8:3 0 32M 0 part >> +├─sda4 8:4 0 1G 0 part >> +├─sda5 8:5 0 1G 0 part >> +│ └─verityroot 252:0 0 110.9M 1 crypt / >> +├─sda6 8:6 0 1.3G 0 part /home >> +└─sda7 8:7 0 2.6G 0 part /var >> ``` > > Adding Quirin for a cross-check as well, but it looks good to me. > > Jan > Looks good to me as well Quirin
On 28.02.23 14:55, Gylstorff Quirin wrote: > > > On 2/28/23 13:22, Jan Kiszka wrote: >> On 28.02.23 13:08, Srinuvasan A wrote: >>> From: Srinuvasan A <srinuvasan.a@siemens.com> >>> >>> Update the secureboot document based on the current implementation. >>> >>> Note: Now secureboot directly boot the linux hence no need to provide >>> the efi >>> file path in efi shell. >>> >>> Signed-off-by: Srinuvasan A <srinuvasan.a@siemens.com> >>> --- >>> doc/README.secureboot.md | 49 ++++++++++++++++++++-------------------- >>> 1 file changed, 24 insertions(+), 25 deletions(-) >>> >>> diff --git a/doc/README.secureboot.md b/doc/README.secureboot.md >>> index b15ea93..54d67c7 100644 >>> --- a/doc/README.secureboot.md >>> +++ b/doc/README.secureboot.md >>> @@ -67,10 +67,9 @@ Set up a secure boot test environment with >>> [QEMU](https://www.qemu.org/) >>> ### Prerequisites >>> - OVMF from edk2 release edk2-stable201911 or newer >>> - - This documentation was tested under Debian 10 with OVMF >>> (0.0~20200229-2) backported from Debian >>> - bullseye >>> + - This documentation was tested under Debian 11 with OVMF >>> (2020.11-2+deb11u1) from Debian bullseye >>> - efitools for KeyTool.efi >>> - - This documentation was tested under Debian 10 with efitools >>> (1.9.2-1) backported from Debian bullseye >>> + - This documentation was tested under Debian 11 with efitools >>> (1.9.2-2~deb11u1) from Debian bullseye >>> - libnss3-tools > > Should we remove the Debian 10 lines? cip-core still supports Debian 10. > Yeah, for the target. I don't think anyone is still building and configuring it on a Debian 10 host. > >>> ### Debian Snakeoil keys >>> @@ -80,7 +79,7 @@ You can use them as described in section [Start >>> Image](#start-the-image). >>> ### Generate Keys >>> -#### Reuse exiting keys >>> +#### Reuse existing keys >>> It is possible to use exiting keys like >>> /usr/share/ovmf/PkKek-1-snakeoil.pem' from Debian >>> by executing the script >>> `scripts/generate-sb-db-from-existing-certificate.sh`, e.g.: >>> @@ -196,12 +195,6 @@ and the following command is sufficient: >>> ./start-qemu.sh amd64 >>> ``` >>> -The default `OVMF_VARS.snakeoil_4M.fd` boot to the EFI shell. To >>> boot Linux enter the following command: >>> -``` >>> -FS0:\EFI\BOOT\bootx64.efi >>> -``` >>> -To change the boot behavior, enter `exit` in the shell to enter the >>> bios and change the boot order. >>> - >>> #### User-generated keys >>> Start the image with the following command: >>> ``` >>> @@ -239,14 +232,17 @@ scp -P 22222 >>> /tmp/cip-core-image-cip-core-bullseye-qemu-amd64.swu root@127.0.0.1 >>> ``` >>> - check which partition is booted, e.g. with `lsblk`: >>> ``` >>> -root@demo:/mnt# lsblk >>> -NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINT >>> -sda 8:0 0 2G 0 disk >>> -├─sda1 8:1 0 16.4M 0 part >>> -├─sda2 8:2 0 32M 0 part >>> -├─sda3 8:3 0 32M 0 part >>> -├─sda4 8:4 0 1000M 0 part / >>> -└─sda5 8:5 0 1000M 0 part >>> +root@demo:~# lsblk >>> +NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINT >>> +sda 8:0 0 6G 0 disk >>> +├─sda1 8:1 0 16.1M 0 part >>> +├─sda2 8:2 0 32M 0 part >>> +├─sda3 8:3 0 32M 0 part >>> +├─sda4 8:4 0 1G 0 part >>> +│ └─verityroot 252:0 0 110.9M 1 crypt / >>> +├─sda5 8:5 0 1G 0 part >>> +├─sda6 8:6 0 1.3G 0 part /home >>> +└─sda7 8:7 0 2.6G 0 part /var >>> ``` >>> - install the swupdate and reboot the image >>> @@ -257,11 +253,14 @@ root@demo:~# reboot >>> - check which partition is booted, e.g. with `lsblk`. The rootfs >>> should have changed: >>> ``` >>> root@demo:~# lsblk >>> -NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINT >>> -sda 8:0 0 2G 0 disk >>> -├─sda1 8:1 0 16.4M 0 part >>> -├─sda2 8:2 0 32M 0 part >>> -├─sda3 8:3 0 32M 0 part >>> -├─sda4 8:4 0 1000M 0 part >>> -└─sda5 8:5 0 1000M 0 part / >>> +NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINT >>> +sda 8:0 0 6G 0 disk >>> +├─sda1 8:1 0 16.1M 0 part >>> +├─sda2 8:2 0 32M 0 part >>> +├─sda3 8:3 0 32M 0 part >>> +├─sda4 8:4 0 1G 0 part >>> +├─sda5 8:5 0 1G 0 part >>> +│ └─verityroot 252:0 0 110.9M 1 crypt / >>> +├─sda6 8:6 0 1.3G 0 part /home >>> +└─sda7 8:7 0 2.6G 0 part /var >>> ``` >> >> Adding Quirin for a cross-check as well, but it looks good to me. >> >> Jan >> > > Looks good to me as well > Quirin > Thanks, merging. Jan
diff --git a/doc/README.secureboot.md b/doc/README.secureboot.md index b15ea93..54d67c7 100644 --- a/doc/README.secureboot.md +++ b/doc/README.secureboot.md @@ -67,10 +67,9 @@ Set up a secure boot test environment with [QEMU](https://www.qemu.org/) ### Prerequisites - OVMF from edk2 release edk2-stable201911 or newer - - This documentation was tested under Debian 10 with OVMF (0.0~20200229-2) backported from Debian - bullseye + - This documentation was tested under Debian 11 with OVMF (2020.11-2+deb11u1) from Debian bullseye - efitools for KeyTool.efi - - This documentation was tested under Debian 10 with efitools (1.9.2-1) backported from Debian bullseye + - This documentation was tested under Debian 11 with efitools (1.9.2-2~deb11u1) from Debian bullseye - libnss3-tools ### Debian Snakeoil keys @@ -80,7 +79,7 @@ You can use them as described in section [Start Image](#start-the-image). ### Generate Keys -#### Reuse exiting keys +#### Reuse existing keys It is possible to use exiting keys like /usr/share/ovmf/PkKek-1-snakeoil.pem' from Debian by executing the script `scripts/generate-sb-db-from-existing-certificate.sh`, e.g.: @@ -196,12 +195,6 @@ and the following command is sufficient: ./start-qemu.sh amd64 ``` -The default `OVMF_VARS.snakeoil_4M.fd` boot to the EFI shell. To boot Linux enter the following command: -``` -FS0:\EFI\BOOT\bootx64.efi -``` -To change the boot behavior, enter `exit` in the shell to enter the bios and change the boot order. - #### User-generated keys Start the image with the following command: ``` @@ -239,14 +232,17 @@ scp -P 22222 /tmp/cip-core-image-cip-core-bullseye-qemu-amd64.swu root@127.0.0.1 ``` - check which partition is booted, e.g. with `lsblk`: ``` -root@demo:/mnt# lsblk -NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINT -sda 8:0 0 2G 0 disk -├─sda1 8:1 0 16.4M 0 part -├─sda2 8:2 0 32M 0 part -├─sda3 8:3 0 32M 0 part -├─sda4 8:4 0 1000M 0 part / -└─sda5 8:5 0 1000M 0 part +root@demo:~# lsblk +NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINT +sda 8:0 0 6G 0 disk +├─sda1 8:1 0 16.1M 0 part +├─sda2 8:2 0 32M 0 part +├─sda3 8:3 0 32M 0 part +├─sda4 8:4 0 1G 0 part +│ └─verityroot 252:0 0 110.9M 1 crypt / +├─sda5 8:5 0 1G 0 part +├─sda6 8:6 0 1.3G 0 part /home +└─sda7 8:7 0 2.6G 0 part /var ``` - install the swupdate and reboot the image @@ -257,11 +253,14 @@ root@demo:~# reboot - check which partition is booted, e.g. with `lsblk`. The rootfs should have changed: ``` root@demo:~# lsblk -NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINT -sda 8:0 0 2G 0 disk -├─sda1 8:1 0 16.4M 0 part -├─sda2 8:2 0 32M 0 part -├─sda3 8:3 0 32M 0 part -├─sda4 8:4 0 1000M 0 part -└─sda5 8:5 0 1000M 0 part / +NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINT +sda 8:0 0 6G 0 disk +├─sda1 8:1 0 16.1M 0 part +├─sda2 8:2 0 32M 0 part +├─sda3 8:3 0 32M 0 part +├─sda4 8:4 0 1G 0 part +├─sda5 8:5 0 1G 0 part +│ └─verityroot 252:0 0 110.9M 1 crypt / +├─sda6 8:6 0 1.3G 0 part /home +└─sda7 8:7 0 2.6G 0 part /var ```