Re: efivarfs: Bad directory entry when variable has / in name

2013-03-20 Thread shea
osed one was braindead and wouldn't work) might be the best option here, I might spin up a patch this weekend. Presumably this is also an issue with the old EFI vars sysfs code? Never used that directly myself (only through efibootmgr). Cheers, Shea Levy -- To unsubscribe from this list:

efivarfs: Bad directory entry when variable has / in name

2013-03-19 Thread shea
. Simply skip such variables when making the sysfs entries 2. Come up with an escaping scheme, e.g. "a single backslash is actually a forward slash, two backslashes are actually a single backslash" or some such. Thoughts? Cheers, Shea Levy P.S. Here is the program I ran to get the probl

Re: Problem mounting efivarfs in 3.9

2013-03-07 Thread shea
ernel.org/cgit/linux/kernel/git/mfleming/efi.git/commit/?h=urgent&id=123abd76edf56c02a76b46d3d673897177ef067b . It's included in the efi-for-3.9-rc2 tag, and cc'd stable. Cheers, Shea Levy -- To unsubscribe from this list: send the line "unsubscribe linux-efi" in the body of

Re: sysfs: cannot create duplicate filename

2013-03-06 Thread shea
Hi Matt, On 2013-03-06 08:19, Matt Fleming wrote: On Tue, 2013-03-05 at 17:39 +0800, Lingzhu Xiang wrote: On 03/03/2013 02:03 AM, Andre Heider wrote: > After a BIOS update I get this in dmesg: > > [0.581554] EFI Variables Facility v0.08 2004-May-17 > [0.584914] [ cut here ]-

Re: Revisiting EFI boot stub config file support

2013-01-02 Thread Shea Levy
On Jan 2, 2013, at 12:43, Matthew Garrett wrote: > On Wed, Jan 02, 2013 at 08:26:29AM -0500, Shea Levy wrote: > >> Hm, ok. Does the boot stub have access to CONFIG_CMDLINE? Or could >> another compile-time setting be added so that distros can ship livecds >> that au

Re: Revisiting EFI boot stub config file support

2013-01-02 Thread Shea Levy
On Jan 1, 2013, at 12:24, "H. Peter Anvin" wrote: > On 01/01/2013 07:55 AM, Shea Levy wrote: >> Hi all, >> >> In March last year, I submitted a patch to enable the EFI boot stub to >> read its config arguments from a file on the ESP, both to help with >&g

Revisiting EFI boot stub config file support

2013-01-01 Thread Shea Levy
tside of the kernel itself, but before I started the work I thought I'd ask here if anyone thought I should instead bring my old patch up-to-date. Thoughts? Thanks, Shea Levy P.S. I am subscribed to linux-efi but not lkml, please include me in any replies to lkml. -- To unsubscribe from

Re: Do not allow MSR or Embedded Controller writes from userspace in secure boot case

2012-11-08 Thread Shea Levy
On 11/08/2012 09:41 AM, Matthew Garrett wrote: On Thu, Nov 08, 2012 at 03:38:33PM +0100, Thomas Renninger wrote: BTW: Who decides what is allowed and what is not? Tree maintainers. I guess it should be the spec. I haven't read the details, but when even Matthew is not sure, it sounds as if t

Re: [RFC] Second attempt at kernel secure boot support

2012-10-31 Thread Shea Levy
On 10/31/2012 01:08 PM, Alan Cox wrote: On Wed, 31 Oct 2012 15:56:35 + Matthew Garrett wrote: 1) Gain root. 2) Modify swap partition directly. 3) Force reboot. 4) Win. Root should not have the ability to elevate themselves to running arbitrary kernel code. Therefore, the above attack need

Re: [RFC] Second attempt at kernel secure boot support

2012-10-31 Thread Shea Levy
On 10/31/2012 01:03 PM, Alan Cox wrote: On Wed, 31 Oct 2012 16:55:04 +0100 (CET) Jiri Kosina wrote: On Wed, 31 Oct 2012, Alan Cox wrote: All this depends on your threat model. If I have physical access to suspend/resume your machine then you already lost. If I don't have physical access then

Re: [RFC] Second attempt at kernel secure boot support

2012-10-31 Thread Shea Levy
On 10/31/2012 11:02 AM, Matthew Garrett wrote: On Wed, Oct 31, 2012 at 03:50:00PM +0100, Jiri Kosina wrote: Reading stored memory image (potentially tampered before reboot) from disk is basically DMA-ing arbitrary data over the whole RAM. I am currently not able to imagine a scenario how this c

Re: [RFC] Second attempt at kernel secure boot support

2012-10-31 Thread Shea Levy
On 10/31/2012 10:54 AM, Josh Boyer wrote: On Wed, Oct 31, 2012 at 10:50 AM, Jiri Kosina wrote: On Mon, 29 Oct 2012, Matthew Garrett wrote: This is pretty much identical to the first patchset, but with the capability renamed (CAP_COMPROMISE_KERNEL) and the kexec patch dropped. If anyone wants