I'm Harshit, and I'm interested in the Secure Boot Support project for GSoC 2026.
Before reaching out, I went through Kamil Aronowski's talk from Qubes OS Summit 2025, Piotr Król's talks from Summit 2024 and the Xen Winter Meetup, your own development update from Summit 2025, and issues #4371 and #8206 on GitHub. So I have a rough picture of what the project involves building a tool to package and sign a Unified Kernel Image, hook it into the update mechanism, and add a fallback boot entry. I also noticed UKI packaging didn't make it into R4.3, which makes this feel like a well-timed contribution.
I understand the Microsoft signing path is blocked for now because of upstream Xen issues (SBAT, NX_COMPAT, the .reloc crash), so the practical approach is user-generated keys via MOK enrollment and that's what this project is building toward.
I'm comfortable with Python and Bash. Right now I'm setting up QEMU with OVMF to try to reproduce the shim_lock and SBAT mismatch errors from #4371 before writing anything.
If my understanding is off somewhere, I'd genuinely like to know. And if there are any good starting points or open issues related to this work, I'd love to dig in.
Thanks!
Harshit Bhalani