Blame SOURCES/0002-MokListRT-Fatal.patch

9eaeed
From 9a2dd0a945720634b9f3608c3b3dfb99fafd4465 Mon Sep 17 00:00:00 2001
9eaeed
From: Patrick Uiterwijk <patrick@puiterwijk.org>
9eaeed
Date: Thu, 6 Dec 2018 10:08:45 +0100
9eaeed
Subject: [PATCH] Make EFI variable copying fatal only on secureboot enabled
9eaeed
 systems
9eaeed
9eaeed
I have come across systems that are unwilling to reserve enough memory for
9eaeed
a MokListRT big enough for big certificates.
9eaeed
This seems to be the case with firmware implementations that do not support
9eaeed
secureboot, which is probably the reason they went with much lower variable
9eaeed
storage.
9eaeed
9eaeed
This patch set makes sure we can still boot on those systems, by only
9eaeed
making the copy action fatal if the system has secure boot enabled, or if
9eaeed
the error was anything other than EFI_INVALID_PARAMETER.
9eaeed
9eaeed
Signed-off-by: Patrick Uiterwijk <patrick@puiterwijk.org>
9eaeed
---
9eaeed
 shim.c | 14 +++++++++++---
9eaeed
 1 file changed, 11 insertions(+), 3 deletions(-)
9eaeed
9eaeed
diff --git a/shim.c b/shim.c
9eaeed
index fcc11eb3..89ef0036 100644
9eaeed
--- a/shim.c
9eaeed
+++ b/shim.c
9eaeed
@@ -2632,9 +2632,17 @@ efi_main (EFI_HANDLE passed_image_handle, EFI_SYSTEM_TABLE *passed_systab)
9eaeed
 die:
9eaeed
 		console_print(L"Something has gone seriously wrong: %s: %r\n",
9eaeed
 			      msgs[msg], efi_status);
9eaeed
-		msleep(5000000);
9eaeed
-		gRT->ResetSystem(EfiResetShutdown, EFI_SECURITY_VIOLATION,
9eaeed
-				 0, NULL);
9eaeed
+		/*
9eaeed
+		 * Make copy failures fatal only if secure_mode is enabled, or
9eaeed
+		 * the error was anything else than EFI_INVALID_PARAMETER.
9eaeed
+		 * There are non-secureboot firmware implementations that don't
9eaeed
+		 * reserve enough EFI variable memory to fit the variable.
9eaeed
+		 */
9eaeed
+		if (secure_mode() || efi_status != EFI_INVALID_PARAMETER) {
9eaeed
+			msleep(5000000);
9eaeed
+			gRT->ResetSystem(EfiResetShutdown, EFI_SECURITY_VIOLATION,
9eaeed
+					 0, NULL);
9eaeed
+		}
9eaeed
 	}
9eaeed
 
9eaeed
 	efi_status = shim_init();