• Lenny Szubowicz's avatar
    efi: Support for MOK variable config table · 58c90902
    Lenny Szubowicz authored
    Because of system-specific EFI firmware limitations, EFI volatile
    variables may not be capable of holding the required contents of
    the Machine Owner Key (MOK) certificate store when the certificate
    list grows above some size. Therefore, an EFI boot loader may pass
    the MOK certs via a EFI configuration table created specifically for
    this purpose to avoid this firmware limitation.
    
    An EFI configuration table is a much more primitive mechanism
    compared to EFI variables and is well suited for one-way passage
    of static information from a pre-OS environment to the kernel.
    
    This patch adds initial kernel support to recognize, parse,
    and validate the EFI MOK configuration table, where named
    entries contain the same data that would otherwise be provided
    in similarly named EFI variables.
    
    Additionally, this patch creates a sysfs binary file for each
    EFI MOK configuration table entry found. These files are read-only
    to root and are provided for use by user space utilities such as
    mokutil.
    
    A subsequent patch will load MOK certs into the trusted platform
    key ring using this infrastructure.
    Signed-off-by: default avatarLenny Szubowicz <lszubowi@redhat.com>
    Link: https://lore.kernel.org/r/20200905013107.10457-2-lszubowi@redhat.comSigned-off-by: default avatarArd Biesheuvel <ardb@kernel.org>
    58c90902
Makefile 1.52 KB