Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Custom-signed EFI binaries fail with 0x1A security violation on 15.4-5; works with 15-5 #373

Closed
GerbilSoft opened this issue May 19, 2021 · 2 comments

Comments

@GerbilSoft
Copy link

I'm currently using shim-15-5 on Gentoo, which uses Fedora's 15-5 binary packages. I have a custom Secure Boot key enrolled using Mok and everything's working fine.

On upgrading to shim-15.4-5 manually (since this version isn't in Gentoo yet), all self-signed EFI executables that previously worked with 15-5 are now failing with 0x1A security violation in the shim loader.

I'm unsure what would be causing this, since everything works fine with 15-5.

Signing command I'm using for GRUB: (using sbsigntool-0.9.4)
sbsign --key MOK.priv --cert MOK.pem --output /boot/efi/EFI/gentoo/grubx64.efi grubx64.efi

@steve-mcintyre
Copy link
Collaborator

Hi!

The most likely cause will be that your old binaries don't include SBAT metadata, and that's a hard requirement now when you're using shim 15.3 onwards.

If you're not sure what that is, see https://github.com/rhboot/shim/blob/main/SBAT.md

@GerbilSoft
Copy link
Author

I saw mentions of SBAT in the 15.4 changes but didn't realize that it applied to binaries as well as the firmware. I'll look into adding SBAT sections to the binaries.

Thanks for the pointer.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants