[PATCH v5 01/12] integrity: Introduce a Linux keyring called machine

Jarkko Sakkinen jarkko at kernel.org
Thu Sep 9 13:55:56 UTC 2021

On Tue, 2021-09-07 at 12:00 -0400, Eric Snowberg wrote:
> Many UEFI Linux distributions boot using shim.  The UEFI shim provides
> what is called Machine Owner Keys (MOK). Shim uses both the UEFI Secure
> Boot DB and MOK keys to validate the next step in the boot chain.  The
> MOK facility can be used to import user generated keys.  These keys can
> be used to sign an end-users development kernel build.  When Linux
> boots, both UEFI Secure Boot DB and MOK keys get loaded in the Linux
> .platform keyring.
> Add a new Linux keyring called machine.  This keyring shall contain just
> MOK CA keys and not the remaining keys in the platform keyring. This new
> machine keyring will be used in follow on patches.  Unlike keys in the
> platform keyring, keys contained in the machine keyring will be trusted
> within the kernel if the end-user has chosen to do so.
> Signed-off-by: Eric Snowberg <eric.snowberg at oracle.com>

I guess this is somewhat sealed so

Reviewed-by: Jarkko Sakkinen <jarkko at kernel.org>


More information about the Linux-security-module-archive mailing list