secureboot: enroll EFI keys on first boot#1692
Conversation
db95740 to
d9d928a
Compare
d9d928a to
980bbd8
Compare
980bbd8 to
ff805e8
Compare
|
we need a flag in the installer so as not to turn on secure boot by default for all, otherwise we will have non functional devices once you build your own local image. |
ff805e8 to
afa133f
Compare
done! |
afa133f to
314533e
Compare
314533e to
4c96f72
Compare
|
Tested on signed Darter Pro installer
My testing process
When I started testing this PR I already had the matching keys enrolled to BIOS. I confirmed that the image I was testing was signed correctly by running the installer and then turning on the Secure Boot. The image booted without issues. The problem is only when trying to enroll the keys with this PR. |
4c96f72 to
acbf27e
Compare
|
Tested on signed Darter Pro installer Still not working, same result. Device does not boot after Secure Boot has been enabled.
|
acbf27e to
8cc8d08
Compare
|
heavily refactored, moved all key deployment logic to ghaf-installer. |
8cc8d08 to
a364092
Compare
a364092 to
cfcbc90
Compare
|
Tested on signed Darter Pro installer The signed installer image does not boot. Non-signed installer image boots normally. |
Critical Issues1. Missing
|
|
cfcbc90 to
924c67b
Compare
Secure Boot enrollment is implemented in the ghaf-installer -s . Keys are enrolled during install in Setup Mode. Signed-off-by: vadik likholetov <vadikas@gmail.com>
924c67b to
007c071
Compare
|
Tested on signed Darter Pro installer
My testing process
Notes
|

Secure Boot: first-boot EFI key enrollment + enable on X1 Carbon and System76
Secure Boot enrollment is implemented in the ghaf-installer -s .
Keys are enrolled during install in Setup Mode.
What’s included
efi-updatevar.
repeats.
KEK.crt, db.crt + README).
Darp11-b (debug + release) targets.
marker so it won’t run by default.
This way secure boot enrollment only happens when the installer is
explicitly run with -s.
Behavior
Enrollment only happens if EFI vars are available and SetupMode is 0x1.
The service is skipped if the marker /persist/.secureboot-enrolled exists.
Uses efi-updatevar to write db, KEK, and PK
Notes
Keys are public; private material is not included.
Testing
Boot in SetupMode, confirm EFI vars updated, then verify /persist/.secureboot-enrolled prevents re-run.
Description of Changes
Type of Change
Related Issues / Tickets
Checklist
make-checksand it passesTesting Instructions
Applicable Targets
aarch64aarch64x86_64x86_64x86_64Installation Method
nixos-rebuild ... switchTest Steps To Verify: