Revert "Set secure_boot flag in Kernel Zero-Page (#7482)"
authorMichael Niewöhner <foss@mniewoehner.de>
Wed, 20 Feb 2019 19:14:15 +0000 (20:14 +0100)
committerMichael Niewöhner <foss@mniewoehner.de>
Wed, 20 Feb 2019 19:14:15 +0000 (20:14 +0100)
This reverts commit b4f9f2a62fd003a30a304a25b3b6ffc4048d0f24.

Revert this because a) the quiet bug is fixed in linux and b)
Documentation/boot.txt says "All other fields should be zero."

src/boot/efi/linux.c
src/boot/efi/linux.h
src/boot/efi/stub.c

index 5b4c085..33d51db 100644 (file)
@@ -72,7 +72,7 @@ static VOID linux_efi_handover(EFI_HANDLE image, struct SetupHeader *setup) {
 EFI_STATUS linux_exec(EFI_HANDLE *image,
                       CHAR8 *cmdline, UINTN cmdline_len,
                       UINTN linux_addr,
-                      UINTN initrd_addr, UINTN initrd_size, BOOLEAN secure) {
+                      UINTN initrd_addr, UINTN initrd_size) {
         struct SetupHeader *image_setup;
         struct SetupHeader *boot_setup;
         EFI_PHYSICAL_ADDRESS addr;
@@ -95,17 +95,6 @@ EFI_STATUS linux_exec(EFI_HANDLE *image,
         CopyMem(boot_setup, image_setup, sizeof(struct SetupHeader));
         boot_setup->loader_id = 0xff;
 
-        if (secure) {
-                /* set secure boot flag in linux kernel zero page, see
-                   - Documentation/x86/zero-page.txt
-                   - arch/x86/include/uapi/asm/bootparam.h
-                   - drivers/firmware/efi/libstub/secureboot.c
-                   in the linux kernel source tree
-                   Possible values: 0 (unassigned), 1 (undetected), 2 (disabled), 3 (enabled)
-                */
-                boot_setup->boot_sector[0x1ec] = 3;
-        }
-
         boot_setup->code32_start = (UINT32)linux_addr + (image_setup->setup_secs+1) * 512;
 
         if (cmdline) {
index 2458a2f..4cae997 100644 (file)
@@ -4,4 +4,4 @@
 EFI_STATUS linux_exec(EFI_HANDLE *image,
                       CHAR8 *cmdline, UINTN cmdline_size,
                       UINTN linux_addr,
-                      UINTN initrd_addr, UINTN initrd_size, BOOLEAN secure);
+                      UINTN initrd_addr, UINTN initrd_size);
index 6b07879..2a60f38 100644 (file)
@@ -124,7 +124,7 @@ EFI_STATUS efi_main(EFI_HANDLE image, EFI_SYSTEM_TABLE *sys_table) {
 
         err = linux_exec(image, cmdline, cmdline_len,
                          (UINTN)loaded_image->ImageBase + addrs[1],
-                         (UINTN)loaded_image->ImageBase + addrs[2], szs[2], secure);
+                         (UINTN)loaded_image->ImageBase + addrs[2], szs[2]);
 
         graphics_mode(FALSE);
         Print(L"Execution of embedded linux image failed: %r\n", err);