On Wed, Aug 03, 2022 at 05:29:15PM +0100, Daniel P. Berrangé wrote:
On Wed, Aug 03, 2022 at 06:15:24PM +0200, Andrea Bolognani wrote:
> <os firmware='efi'>
> <firmware>
> + <feature enabled='yes' name='secure-boot'/>
> <feature enabled='no' name='enrolled-keys'/>
> </firmware>
> </os>
If we want secureboot disabled, this looks wrong. It just enables
secureboot, but without any keys. We need enabled=no to ask for
a firmware without SecureBoot at all.
Mh. From a practical standpoint, the scenarios
* firmware has secure boot support but there are no enrolled keys
* firmware doesn't have secure boot support
are pretty much equivalent: either way, unsigned code will be allowed
to run.
And, although that doesn't seem the case anywhere at the moment, I
can imagine that at some point a distro will decide to only ship a
single firmware build. That would be comparable to how you can't
really find a motherboard that doesn't come with secure boot support
at this point, and your only choice is whether you want the feature
to be active.
So I don't disagree with you, but I'm also not completely convinced
that we should *not* document a way to disable secure boot while
still picking a firmware build that contains the feature.
Would squashing the diff below be a good enough compromise in your
opinion?
diff --git a/docs/kbase/secureboot.rst b/docs/kbase/secureboot.rst
index 5fa59ad5e2..68732701df 100644
--- a/docs/kbase/secureboot.rst
+++ b/docs/kbase/secureboot.rst
@@ -19,7 +19,17 @@ ask for Secure Boot to be enabled with
</firmware>
</os>
-and for it to be disabled with
+and for it to be disabled with either
+
+::
+
+ <os firmware='efi'>
+ <firmware>
+ <feature enabled='no' name='secure-boot'/>
+ </firmware>
+ </os>
+
+or
::
@@ -30,8 +40,8 @@ and for it to be disabled with
</firmware>
</os>
-These configuration will cause unsigned guest operating systems to
-be rejected and allowed respectively.
+The first configuration will cause unsigned guest operating systems
+to be rejected, while the remaining two will allow running them.
Older libvirt versions
--
Andrea Bolognani / Red Hat / Virtualization