From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id AFC7DEB64DA for ; Fri, 14 Jul 2023 09:13:24 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235775AbjGNJNV (ORCPT ); Fri, 14 Jul 2023 05:13:21 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44484 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235755AbjGNJNR (ORCPT ); Fri, 14 Jul 2023 05:13:17 -0400 Received: from cavan.codon.org.uk (cavan.codon.org.uk [176.126.240.207]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4D3D6E65; Fri, 14 Jul 2023 02:13:13 -0700 (PDT) Received: by cavan.codon.org.uk (Postfix, from userid 1000) id 0C4D0424A2; Fri, 14 Jul 2023 10:13:10 +0100 (BST) Date: Fri, 14 Jul 2023 10:13:10 +0100 From: Matthew Garrett To: Ard Biesheuvel Cc: Luca Boccassi , Peter Jones , Emanuele Giuseppe Esposito , x86@kernel.org, Thomas Gleixner , lennart@poettering.net, Ingo Molnar , Borislav Petkov , Dave Hansen , "H. Peter Anvin" , Andrew Morton , Masahiro Yamada , Alexander Potapenko , Nick Desaulniers , Vitaly Kuznetsov , Daniel P =?iso-8859-1?Q?=2E_Berrang=E9?= , linux-kernel@vger.kernel.org, linux-efi@vger.kernel.org Subject: Re: [RFC PATCH v2] x86/boot: add .sbat section to the bzImage Message-ID: <20230714091310.GA21128@srcf.ucam.org> References: <20230711154449.1378385-1-eesposit@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Jul 14, 2023 at 10:52:20AM +0200, Ard Biesheuvel wrote: > Maybe the OEMs have gotten better at this over the years, but it is > definitely not possible for the distros to rely on being able to get > their own cert into KEK and sign their builds directly. Getting certs into local machine databases should[1] be possible on all Windows certified machines, but in the status-quo there's no cross-vendor solution to doing this. Relying on the Shim-provided mechanisms is much safer from a consistency perspective. [1] Every time someone has claimed it's impossible to me I've ended up demonstrating otherwise, but that's not a guarantee