Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S934322AbcKWKsn (ORCPT ); Wed, 23 Nov 2016 05:48:43 -0500 Received: from foss.arm.com ([217.140.101.70]:48582 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751008AbcKWKsl (ORCPT ); Wed, 23 Nov 2016 05:48:41 -0500 Date: Wed, 23 Nov 2016 10:47:58 +0000 From: Mark Rutland To: David Howells Cc: lukas@wunner.de, linux-efi@vger.kernel.org, linux-security-module@vger.kernel.org, keyrings@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH 4/6] efi: Get the secure boot status [ver #2] Message-ID: <20161123104757.GE24624@leverpostej> References: <147986054870.13790.8640536414645705863.stgit@warthog.procyon.org.uk> <147986057768.13790.3027173260868896792.stgit@warthog.procyon.org.uk> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <147986057768.13790.3027173260868896792.stgit@warthog.procyon.org.uk> User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1278 Lines: 46 On Wed, Nov 23, 2016 at 12:22:57AM +0000, David Howells wrote: > @@ -1158,6 +1158,8 @@ struct boot_params *efi_main(struct efi_config *c, > else > setup_boot_services32(efi_early); > > + boot_params->secure_boot = (efi_get_secureboot(sys_table) == 1); In the arm stub's efi_entry(), we fail-safe, and assume secure boot for any non-zero status (including errors). e.g. secure_boot = efi_get_secureboot(sys_table); if (secure_boot > 0) pr_efi(sys_table, "UEFI Secure Boot is enabled.\n"); if (secure_boot < 0) { pr_efi_err(sys_table, "could not determine UEFI Secure Boot status.\n"); } /* * Unauthenticated device tree data is a security hazard, so * ignore 'dtb=' unless UEFI Secure Boot is disabled. */ if (secure_boot != 0 && strstr(cmdline_ptr, "dtb=")) { pr_efi(sys_table, "Ignoring DTB from command line.\n"); ... should we not do likewise here, e.g. int secure_boot = efi_get_secureboot(sys_table); if (secure_boot > 0) pr_efi(sys_table, "UEFI Secure Boot is enabled.\n"); if (secure_boot < 0) pr_efi_err(sys_table, "could not determine UEFI Secure Boot status.\n"); /* * Fail-safe in the case of an error determining the secure boot * status. */ boot_params->secure_boot = (secure_boot != 0); ... ? Thanks, Mark.