]> git.proxmox.com Git - efi-boot-shim.git/blame_incremental - README.md
Tweak the UUID handling to be clearer
[efi-boot-shim.git] / README.md
... / ...
CommitLineData
1# shim, a first-stage UEFI bootloader
2
3shim is a trivial EFI application that, when run, attempts to open and
4execute another application. It will initially attempt to do this via the
5standard EFI `LoadImage()` and `StartImage()` calls. If these fail (because Secure
6Boot is enabled and the binary is not signed with an appropriate key, for
7instance) it will then validate the binary against a built-in certificate. If
8this succeeds and if the binary or signing key are not forbidden then shim
9will relocate and execute the binary.
10
11shim will also install a protocol which permits the second-stage bootloader
12to perform similar binary validation. This protocol has a GUID as described
13in the shim.h header file and provides a single entry point. On 64-bit systems
14this entry point expects to be called with SysV ABI rather than MSABI, so calls
15to it should not be wrapped.
16
17On systems with a TPM chip enabled and supported by the system firmware,
18shim will extend various PCRs with the digests of the targets it is
19loading. A full list is in the file [README.tpm](README.tpm) .
20
21To use shim, simply place a DER-encoded public certificate in a file such as
22pub.cer and build with `make VENDOR_CERT_FILE=pub.cer`.
23
24There are a couple of build options, and a couple of ways to customize the
25build, described in [BUILDING](BUILDING).
26
27See the [test plan](testplan.txt), and file a ticket if anything fails!