Commit be77004b authored by Josh Boyer's avatar Josh Boyer Committed by Tim Gardner

UBUNTU: SAUCE: (noup) efi: Disable secure boot if shim is in insecure mode

BugLink: http://bugs.launchpad.net/bugs/1571691
git://pkgs.fedoraproject.org/rpms/kernel.git

A user can manually tell the shim boot loader to disable validation of
images it loads.  When a user does this, it creates a UEFI variable called
MokSBState that does not have the runtime attribute set.  Given that the
user explicitly disabled validation, we can honor that and not enable
secure boot mode if that variable is set.
Signed-off-by: default avatarJosh Boyer <jwboyer@fedoraproject.org>
Signed-off-by: default avatarTim Gardner <tim.gardner@canonical.com>
Signed-off-by: default avatarAndy Whitcroft <andy.whitcroft@canonical.com>
Signed-off-by: default avatarKamal Mostafa <kamal@canonical.com>
parent 89052b26
......@@ -850,8 +850,9 @@ setup_gop64(struct screen_info *si, efi_guid_t *proto,
static int get_secure_boot(void)
{
u8 sb, setup;
u8 sb, setup, moksbstate;
unsigned long datasize = sizeof(sb);
u32 attr;
efi_guid_t var_guid = EFI_GLOBAL_VARIABLE_GUID;
efi_status_t status;
......@@ -875,6 +876,23 @@ static int get_secure_boot(void)
if (setup == 1)
return 0;
/* See if a user has put shim into insecure_mode. If so, and the variable
* doesn't have the runtime attribute set, we might as well honor that.
*/
var_guid = EFI_SHIM_LOCK_GUID;
status = efi_early->call((unsigned long)sys_table->runtime->get_variable,
L"MokSBState", &var_guid, &attr, &datasize,
&moksbstate);
/* If it fails, we don't care why. Default to secure */
if (status != EFI_SUCCESS)
return 1;
if (!(attr & EFI_VARIABLE_RUNTIME_ACCESS)) {
if (moksbstate == 1)
return 0;
}
return 1;
}
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment