meta-efi-secure-boot/README: update to reflect using fallback to chainloader SELoader

Signed-off-by: Lans Zhang <jia.zhang@windriver.com>
This commit is contained in:
Lans Zhang
2017-07-25 09:33:16 +08:00
parent 008b18270f
commit 567e817691
+17 -12
View File
@@ -10,11 +10,15 @@ chainloader the next stage bootloader with the integrity check using the
shim-managed certificates corresponding to another set of trusted keys, which shim-managed certificates corresponding to another set of trusted keys, which
may be different than the trusted keys used by UEFI Secure Boot. may be different than the trusted keys used by UEFI Secure Boot.
In addition, this layer introduces the SELoader as the second-stage bootloader fallback is the second-stage bootloader used to by-pass the Red Hat shim
and eventually chainliader to the third-stage bootloader "grub". With the signing review. It is designed to read a .csv file and will create a boot
extension provided by SELoader, grub configuration files, kernel (even without option in BIOS boot manager for the first boot entry in .csv.
EFI stub support) and initrd can be authenticated. This capability is not
available in the shim bootloader. This layer introduces the SELoader as the third-stage bootloader and eventually
chainliader to the fourth-stage bootloader "grub". With the extension provided
by SELoader, grub configuration files, kernel (even without EFI stub support)
and initrd can be authenticated. This capability is not available in the shim
bootloader.
Grub bootloader is also enhanced to support lockdown mode. In this mode, the Grub bootloader is also enhanced to support lockdown mode. In this mode, the
edit, rescue and command line are protected in order to prevent from edit, rescue and command line are protected in order to prevent from
@@ -31,11 +35,12 @@ A complete boot flow looks like as following:
- UEFI firmware boot manager (UEFI Secure Boot enabled) -> - UEFI firmware boot manager (UEFI Secure Boot enabled) ->
- shim (verified by a DB certificate) -> - shim (verified by a DB certificate) ->
- SELoader (verified by a shim-managed certificate) -> - fallback (verified by a shim-managed certificate) ->
- grub (verified by a shim-managed certificate) -> - SELoader (verified by a shim-managed certificate) ->
- grub.cfg (verified by a shim-managed certificate) - grub (verified by a shim-managed certificate) ->
- kernel (verified by a shim-managed certificate) - grub.cfg (verified by a shim-managed certificate)
- initramfs (verified by a shim-managed certificate) - kernel (verified by a shim-managed certificate)
- initramfs (verified by a shim-managed certificate)
### Quick Start For The First Boot ### Quick Start For The First Boot
- Deploy the rootfs - Deploy the rootfs
@@ -298,8 +303,8 @@ Each boot component may have different verification failure phenomenon.
### MOK Secure Boot and the shim bootloader ### MOK Secure Boot and the shim bootloader
MOK Secure Boot is based on UEFI Secure Boot, adding the shim bootloader to MOK Secure Boot is based on UEFI Secure Boot, adding the shim bootloader to
chainloader the second-stage bootloader "SELoader" and eventually chainliader chainloader the bootloader "SELoader" and eventually chainliader to the
to the third-stage bootloader "grub". bootloader "grub".
[ Quoting: https://github.com/rhboot/shim ] [ Quoting: https://github.com/rhboot/shim ]
shim is a trivial EFI application that, when run, attempts to open and shim is a trivial EFI application that, when run, attempts to open and