Bhasker C V
2024-06-20 10:20:01 UTC
Hi,
I generated a pr/pk pair and the kernel is signed. Placed them in the
kernel tree and compiled the kernel.
Could someone tell me what am I doing wrong please ?
Below is the status (I am using loader.efi from linuxfoundation)
When i boot debian stock kernel signed, i see that the secure boot
gets enabled (hence bios and everything else seems to be fine with the
same UEFI loader).
However, when I boot the compiled kernel I get
$ dmesg | grep -i secure
[ 0.007085] Secure boot could not be determined
$ sbverify --list bootx64.efi
warning: data remaining[91472 vs 101160]: gaps between PE/COFF sections?
signature 1
image signature issuers:
- /C=US/ST=Washington/L=Redmond/O=Microsoft Corporation/CN=Microsoft
Corporation UEFI CA 2011
image signature certificates:
- subject: /C=US/ST=Washington/L=Redmond/O=Microsoft
Corporation/OU=MOPR/CN=Microsoft Windows UEFI Driver Publisher
issuer: /C=US/ST=Washington/L=Redmond/O=Microsoft
Corporation/CN=Microsoft Corporation UEFI CA 2011
- subject: /C=US/ST=Washington/L=Redmond/O=Microsoft
Corporation/CN=Microsoft Corporation UEFI CA 2011
issuer: /C=US/ST=Washington/L=Redmond/O=Microsoft
Corporation/CN=Microsoft Corporation Third Party Marketplace Root
$ sbverify --list ./loader.efi
signature 1
image signature issuers:
- /C=GB/ST=England/L=London/O=BHASKER/CN=bcvm.bcvm.bcv
image signature certificates:
- subject: /C=GB/ST=England/L=London/O=BHASKER/CN=bcvm.bcvm.bcv
issuer: /C=GB/ST=England/L=London/O=BHASKER/CN=bcvm.bcvm.bcv
$ sbverify --list ../../linux/k.bcv
signature 1
image signature issuers:
- /C=GB/ST=England/L=London/O=BHASKER/CN=bcvm.bcvm.bcv
image signature certificates:
- subject: /C=GB/ST=England/L=London/O=BHASKER/CN=bcvm.bcvm.bcv
issuer: /C=GB/ST=England/L=London/O=BHASKER/CN=bcvm.bcvm.bcv
I generated a pr/pk pair and the kernel is signed. Placed them in the
kernel tree and compiled the kernel.
Could someone tell me what am I doing wrong please ?
Below is the status (I am using loader.efi from linuxfoundation)
When i boot debian stock kernel signed, i see that the secure boot
gets enabled (hence bios and everything else seems to be fine with the
same UEFI loader).
However, when I boot the compiled kernel I get
$ dmesg | grep -i secure
[ 0.007085] Secure boot could not be determined
$ sbverify --list bootx64.efi
warning: data remaining[91472 vs 101160]: gaps between PE/COFF sections?
signature 1
image signature issuers:
- /C=US/ST=Washington/L=Redmond/O=Microsoft Corporation/CN=Microsoft
Corporation UEFI CA 2011
image signature certificates:
- subject: /C=US/ST=Washington/L=Redmond/O=Microsoft
Corporation/OU=MOPR/CN=Microsoft Windows UEFI Driver Publisher
issuer: /C=US/ST=Washington/L=Redmond/O=Microsoft
Corporation/CN=Microsoft Corporation UEFI CA 2011
- subject: /C=US/ST=Washington/L=Redmond/O=Microsoft
Corporation/CN=Microsoft Corporation UEFI CA 2011
issuer: /C=US/ST=Washington/L=Redmond/O=Microsoft
Corporation/CN=Microsoft Corporation Third Party Marketplace Root
$ sbverify --list ./loader.efi
signature 1
image signature issuers:
- /C=GB/ST=England/L=London/O=BHASKER/CN=bcvm.bcvm.bcv
image signature certificates:
- subject: /C=GB/ST=England/L=London/O=BHASKER/CN=bcvm.bcvm.bcv
issuer: /C=GB/ST=England/L=London/O=BHASKER/CN=bcvm.bcvm.bcv
$ sbverify --list ../../linux/k.bcv
signature 1
image signature issuers:
- /C=GB/ST=England/L=London/O=BHASKER/CN=bcvm.bcvm.bcv
image signature certificates:
- subject: /C=GB/ST=England/L=London/O=BHASKER/CN=bcvm.bcvm.bcv
issuer: /C=GB/ST=England/L=London/O=BHASKER/CN=bcvm.bcvm.bcv