[Bug 1847458] Re: EFI chainloader no longer uses shim lock protocol
Mathieu Trudel-Lapierre
mathieu.tl at gmail.com
Sat Oct 12 12:45:36 UTC 2019
After further discussion with Chris; seems like this might have been a
misunderstanding, looking at two different source trees for the
software.
Chris; can you please confirm whether we've reached consensus on the
state of the chainloader code for SB? From my read, the patches look to
be properly applied, and chainloading Windows certainly works for me
here.
** Changed in: grub2 (Ubuntu Eoan)
Status: New => Incomplete
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to grub2 in Ubuntu.
https://bugs.launchpad.net/bugs/1847458
Title:
EFI chainloader no longer uses shim lock protocol
Status in grub2 package in Ubuntu:
Incomplete
Status in grub2 source package in Eoan:
Incomplete
Bug description:
GRUB versions pre-eoan contain modifications to the EFI chainloader
command (grub-core/loader/efi/chainloader.c) which allow a chainloaded
bootloader to be verified using the shim lock EFI protocol (which
validates an image against signatures enrolled in the UEFI db, MOK db
and shim's built-in vendor certificate). The verified bootloader is
subsequently executed directly without the use of the LoadImage() and
StartImage() EFI boot services.
This modification was dropped in the GRUB update in eoan (2.04) - the
EFI chainloader command now always uses the LoadImage() and
StartImage() EFI boot services, which requires a bootloader to be
verified using a signature enrolled in the UEFI db. It's no longer
possible to chainload another bootloader that has to be verified by a
signature in the MOK db or shim's built-in vendor certificate.
I'm not sure if this is a deliberate change or an oversight.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/grub2/+bug/1847458/+subscriptions
More information about the foundations-bugs
mailing list