Luis, Thank you for this heads-up. On Wed, Nov 08, 2017 at 12:07:00AM +0100, Luis R. Rodriguez wrote: > On Thu, Nov 02, 2017 at 06:10:41PM -0400, Mimi Zohar wrote: > > On Thu, 2017-11-02 at 22:04 +0000, David Howells wrote: > > > Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx> wrote: > > > > > > > > Only validly signed device firmware may be loaded. > > > > > > > > fw_get_filesystem_firmware() calls kernel_read_file_from_path() to > > > > read the firmware, which calls into the security hooks. Is there > > > > another place that validates the firmware signatures. I'm not seeing > > > > which patch requires firmware to be signed? > > > > > > Luis has a set of patches for this. However, I'm not sure if that's going > > > anywhere at the moment. Possibly I should remove this from the manpage for > > > the moment. > > Remove it for now. The state of of affairs for firmware signing is complex given > that we first wanted to address how to properly grow the API without making > the API worse. This in and of itself was an effort, and that effort also > evaluated two different development paradigms: > > o functional API > o data driven API > > I only recently was convinced that functional API should be used, even for > commonly used exported symbols, Are you? I haven't answered Linus' question, but my concern about functional APIs, as far as firmware signing goes, is that we have no way to _enforce_ firmware signing to existing (i.e. verification-unaware) drivers if we need an explicit call of a function, say, verify_firmware(). > and as such I've been going back and slowly > grooming the firmware API with small atomic changes to first clean up the > complex flag mess we have. > > Since I'm busy with that Takahiro AKASHI has taken up firmware singing effort > but this will depend on the above small cleanup to be done first. I was busy > with addressing existing bugs on the firmware API for a while, then company > travel / conferences so was not able to address this, but I'm back now and > I believe I should be able to tackle the cleanup now. Good to hear. > Only after this is merged can we expect a final respin of the firmware signing > effort. > > > Or reflect that IMA-appraisal, if enabled, will enforce firmware being > > validly signed. > > But FWICT lockdown is a built-in kernel thingy, unless lockdown implies IMA > it would not be the place to refer to it. I think that the situation is the same as in module signing. -Takahiro AKASHI > It seems the documentation was proposed to help users if an error was caught. > That error should cover only what is being addressed in code on the kernel. > > Luis -- To unsubscribe from this list: send the line "unsubscribe linux-efi" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html