x86/loader: expose unpatched kernel
Add a new "etc/boot/kernel" fw_cfg file, containing the kernel without the setup header patches. Intended use is booting in UEFI with secure boot enabled, where the setup header patching breaks secure boot verification. Needs OVMF changes too to be actually useful. Signed-off-by: Gerd Hoffmann <kraxel@redhat.com> Message-ID: <20240905141211.1253307-5-kraxel@redhat.com>
This commit is contained in:
parent
214191f6b5
commit
f2594d9284
@ -962,6 +962,9 @@ void x86_load_linux(X86MachineState *x86ms,
|
||||
sev_load_ctx.setup_data = (char *)setup;
|
||||
sev_load_ctx.setup_size = setup_size;
|
||||
|
||||
/* kernel without setup header patches */
|
||||
fw_cfg_add_file(fw_cfg, "etc/boot/kernel", kernel, kernel_size);
|
||||
|
||||
if (sev_enabled()) {
|
||||
sev_add_kernel_loader_hashes(&sev_load_ctx, &error_fatal);
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user