-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Code rebase onto the most recent work implementing Secure Launch protocol being upstreamed to Linux and GRUB #17
Comments
These commits add SLRT support to GRUB: And then you need the latest SLR table header here: |
Overall stateCommits on Possible path of aligning branches
The end result should structurally match |
We have to start from what https://github.com/QubesOS/qubes-grub2 uses, which is 2.06.
Maybe a result of review done on QubesOS/qubes-grub2#13? In that case changes suggested in the review have priority over
If changes on
That would be the best idea, remember to keep signed-off-by lines, we don't want to just steal the code 🙂
This is more or less what we have to do. In the end we will be uploading patches to QubesOS/qubes-grub2#13, so it doesn't make sense to have commits that fix bugs in our previous commits, we can fix the original change instead. |
That's why I thought it's relevant, but it makes no difference.
Yes, that seems to be the cause of the changes. So there is nothing to move to our side and no need to rebase it.
Turns out, those commits were already integrated. Changes are on intel-txt-aem-slrt branch. Cherry-picking with minor adjustments was enough. Some changes looked incomplete and didn't compile or caused warnings, TPM log was always for TPM2.0 which looked like a bug. Will go through the changes again and send PR. |
I've left some comments with focus on next steps in TrenchBoot/grub#13. @rossphilipson some of them apply to your commits in case you're interested, but they are rather small issues that shouldn't change the logic. I also created an issue for gathering changes to the specification in TrenchBoot/documentation#23. I think it would be best to not add them immediately since we will be doing more significant changes (hopefully soon) anyway. |
Closing this issue. The release was published here: TrenchBoot/qubes-antievilmaid#8, and test results are available here: #18. |
Is your feature request related to a problem? Please describe.
The current state of TrenchBoot support has diverged with what was developed for QubesOS AEM for Intel hardware with TPM 1.2. This task aims to update the work and align with the TrenchBoot boot protocol being upstreamed to GRUB and Linux kernel.
Is your feature request related to a new idea or technology that
would benefit the project? Please describe.
This issue is required to ensure Qubes OS AEM supports the most recent TrenchBoot boot protocol upstreamed to GRUB and Linux kernel, which will provide improved security and functionality.
Describe the solution you'd like
Rebase the code to the most recent work implementing Secure Launch protocol and align with the TrenchBoot boot protocol being upstreamed to GRUB and Linux kernel.
Describe alternatives you've considered
N/A
Additional context
This feature request is part of Phase 3 in TrenchBoot as Anti Evil Maid project, as outlined in the documentation: https://docs.dasharo.com/projects/trenchboot-aem-v2/.
Relevant documentation you've consulted
N/A
The text was updated successfully, but these errors were encountered: