Am Fr., 23. Juni 2023 um 15:41 Uhr schrieb Ard Biesheuvel <a...@kernel.org>:
> On Thu, 22 Jun 2023 at 11:41, Tobias Powalowski > <tobias.powalow...@googlemail.com> wrote: > > > > Hi tackled it down to this commit: > > > https://git.savannah.gnu.org/cgit/grub.git/commit/?id=6a080b9cde0be5d08b71daf17a806067e32fc13f > > starting with this commit shim verification fails for kernel hash with > bad shim verification and makes Secure Boot impossible. > > Could you elaborate on your setup? How are you signing and > authenticating the kernel image? > > GRUB calls LoadImage/StartImage, and these calls will be intercepted > by shim to implement its own authentication. The expectation here is > that the kernel's PE image is signed with a MOK key. > Hi, here is how it worked before: Add the kernel and grub hashes through MOK manager. After adding those grub was able to boot the hashed kernel. On the installation medium I cannot expect someone already has a MOK certificate, though hashes needs to be used in first place. greetings tpowa -- Tobias Powalowski Arch Linux Developer & Package Maintainer (tpowa) https://www.archlinux.org <http://www.archlinux.org> tp...@archlinux.org Archboot Developer https://archboot.com
_______________________________________________ Grub-devel mailing list Grub-devel@gnu.org https://lists.gnu.org/mailman/listinfo/grub-devel