opengnsys_ipxe/src/image
Michael Brown 28184b7c22 [efi] Add support for executing images via a shim
Add support for using a shim as a helper to execute an EFI image.
When a shim has been specified via shim(), the shim image will be
passed to LoadImage() instead of the selected EFI image and the
command line will be prepended with the name of the selected EFI
image.  The selected EFI image will be accessible to the shim via the
virtual filesystem as a hidden file.

Reduce the Secure Boot attack surface by removing, where possible, the
spurious requirement for a third party second stage loader binary such
as GRUB to be used solely in order to call the "shim lock protocol"
entry point.

Do not install the EFI PXE APIs when using a shim, since if shim finds
EFI_PXE_BASE_CODE_PROTOCOL on the loaded image's device handle then it
will attempt to download files afresh instead of using the files
already downloaded by iPXE and exposed via the EFI_SIMPLE_FILE_SYSTEM
protocol.  (Experience shows that there is no point in trying to get a
fix for this upstreamed into shim.)

Signed-off-by: Michael Brown <mcb30@ipxe.org>
2023-05-22 15:37:11 +01:00
..
der.c [crypto] Add DER image format 2016-07-29 01:12:58 +01:00
efi_image.c [efi] Add support for executing images via a shim 2023-05-22 15:37:11 +01:00
elf.c [elf] Reject ELFBoot images requiring virtual addressing 2015-07-29 14:17:09 +01:00
embedded.c [image] Implicitly trust first embedded image 2021-01-27 12:42:31 +00:00
gzip.c [image] Allow single-member archive images to be executed transparently 2021-05-12 13:57:35 +01:00
pem.c [crypto] Expose pem_asn1() for use with non-image data 2017-06-20 10:14:07 +01:00
png.c [png] Fix potential integer overflow 2020-06-04 22:09:11 +01:00
pnm.c [legal] Relicense files under GPL2_OR_LATER_OR_UBDL 2015-03-02 14:17:31 +00:00
script.c [image] Generalise concept of selected image 2023-05-17 14:42:03 +01:00
segment.c [legal] Relicense files under GPL2_OR_LATER_OR_UBDL 2015-03-02 14:17:31 +00:00
zlib.c [image] Allow single-member archive images to be executed transparently 2021-05-12 13:57:35 +01:00