From ac8445852e39bf470cef7d5b261fb83dbea0f4c7 Mon Sep 17 00:00:00 2001 From: Jose Marinho <jose.marinho@arm.com> Date: Mon, 10 May 2021 13:58:50 +0100 Subject: [PATCH] Fixes during 10/05/2021 call --- source/chapter1-about.rst | 56 ----------------------------------- source/chapter2-uefi.rst | 4 +-- source/conventions.rst | 62 +++++++++++++++++++++++++++++++++++++++ source/index.rst | 2 ++ source/references.rst | 4 --- 5 files changed, 66 insertions(+), 62 deletions(-) create mode 100644 source/conventions.rst diff --git a/source/chapter1-about.rst b/source/chapter1-about.rst index 0eb050e..aaa0d5c 100644 --- a/source/chapter1-about.rst +++ b/source/chapter1-about.rst @@ -113,59 +113,3 @@ secondary partition. .. image:: images/rollback_protection_simple.png :width: 200px :align: center - -Conventions Used in this Document -================================= - -The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", -"SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be -interpreted as described in :rfc:`2119`. - -Terms and abbreviations -======================= - -This document uses the following terms and abbreviations. - -.. glossary:: - - UEFI - Unified Extensible Firmware Interface. - - Anti-brickable - A system is said to be a brick if it cannot boot for a firmware behavior issue - and no firmware update is possible. Anti-Brickable protection is a set of measures - to protect against this risk for any firmware component. - - Boot firmware - Firmware that brings up operating system - - EBBR - Embedded Base Boot Requirements - - Boot Loader stage 1 (BL1) - AP Trusted ROM - - Boot Loader stage 2 (BL2) - Trusted Boot Firmware - - Boot Loader stage 3-1 (BL31) - EL3 Runtime Firmware - - Boot Loader stage 3-2 (BL32) - Secure-EL1 Payload (optional) - - Boot Loader stage 3-3 (BL33) - Non-trusted Firmware - - SCP Firmware - System Control Processor firmware - - PSGB - Platform Security Boot Guide - - Trusted Substrate - Set of firmwares that control security and trust aspects of a platform. - For instance device identity management firmware. - - FFA - Arm Firmware Framework for Armv-8A diff --git a/source/chapter2-uefi.rst b/source/chapter2-uefi.rst index 4edb6d5..420631f 100644 --- a/source/chapter2-uefi.rst +++ b/source/chapter2-uefi.rst @@ -101,7 +101,7 @@ The OS must accept each image, that has an acceptance pending, by using a capsul Update permission verification ------------------------------ -The FW management guidelines in [NIST_800_193]_ spacify that the system should check: +The FW management guidelines in [NIST_800_193]_ specify that the system should check: #. FW image authenticity. #. FW update procedure authorization. @@ -114,7 +114,7 @@ Capsule authorization ^^^^^^^^^^^^^^^^^^^^^ The OS can expose the UpdateCapsule interface to any non-priveliged system user. -The FW updates initiator or the FW update package creator should +The FW updates initiator or the FW update package creator should be an authorized user [NIST_800_193]_. The capsule or the FW images contained in the capsule should be signed by a platform owner key. diff --git a/source/conventions.rst b/source/conventions.rst new file mode 100644 index 0000000..633d6da --- /dev/null +++ b/source/conventions.rst @@ -0,0 +1,62 @@ + +*********** +Conventions +*********** + +Conventions Used in this Document +================================= + +The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", +"SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be +interpreted as described in :rfc:`2119`. + +Terms and abbreviations +======================= + +This document uses the following terms and abbreviations. + +.. glossary:: + + UEFI + Unified Extensible Firmware Interface. + + Anti-brickable + A system is said to be a brick if it cannot boot for a firmware behavior issue + and no firmware update is possible. Anti-Brickable protection is a set of measures + to protect against this risk for any firmware component. + + Boot firmware + Firmware that brings up operating system + + EBBR + Embedded Base Boot Requirements + + Boot Loader stage 1 (BL1) + AP Trusted ROM + + Boot Loader stage 2 (BL2) + Trusted Boot Firmware + + Boot Loader stage 3-1 (BL31) + EL3 Runtime Firmware + + Boot Loader stage 3-2 (BL32) + Secure-EL1 Payload (optional) + + Boot Loader stage 3-3 (BL33) + Non-trusted Firmware + + SCP Firmware + System Control Processor firmware + + PSGB + Platform Security Boot Guide + + Trusted Substrate + Set of firmwares that control security and trust aspects of a platform. + For instance device identity management firmware. + + FFA + Arm Firmware Framework for Armv-8A + + diff --git a/source/index.rst b/source/index.rst index 03b0d1f..670071e 100644 --- a/source/index.rst +++ b/source/index.rst @@ -18,10 +18,12 @@ Creative Commons, PO Box 1866, Mountain View, CA 94042, USA. :alt: Creative Commons License :align: right + .. toctree:: :numbered: chapter1-about chapter2-uefi chapter3-fwupdate + conventions references diff --git a/source/references.rst b/source/references.rst index f45eec7..a4b6772 100644 --- a/source/references.rst +++ b/source/references.rst @@ -1,9 +1,5 @@ .. SPDX-License-Identifier: CC-BY-SA-4.0 -********** -References -********** - .. [UEFI] `Unified Extensable Firmware Interface Specification v2.9 <https://uefi.org/sites/default/files/resources/UEFI_Spec_2_9_2021_03_18.pdf>`_, February 2020, `UEFI Forum <http://www.uefi.org>`_ -- GitLab