<feed xmlns='http://www.w3.org/2005/Atom'>
<title>efi-boot-shim.git, branch 15.5-rc2</title>
<subtitle> (mirror of https://github.com/vyos/efi-boot-shim.git)
</subtitle>
<id>https://git.amelek.net/vyos/efi-boot-shim.git/atom?h=15.5-rc2</id>
<link rel='self' href='https://git.amelek.net/vyos/efi-boot-shim.git/atom?h=15.5-rc2'/>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/efi-boot-shim.git/'/>
<updated>2021-12-10T22:08:21+00:00</updated>
<entry>
<title>Minor coverity fixes</title>
<updated>2021-12-10T22:08:21+00:00</updated>
<author>
<name>Peter Jones</name>
<email>pjones@redhat.com</email>
</author>
<published>2021-12-09T22:21:45+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/efi-boot-shim.git/commit/?id=d0df9304c7a777557e1925dc9f75406ec00e6179'/>
<id>urn:sha1:d0df9304c7a777557e1925dc9f75406ec00e6179</id>
<content type='text'>
- one missing free
- one minor deadcode issue
- two unchecked allocations
- one debug hexdump of a variable we just freed

Signed-off-by: Peter Jones &lt;pjones@redhat.com&gt;
</content>
</entry>
<entry>
<title>stdarg: use sysv varargs when we build with coverity</title>
<updated>2021-12-10T22:08:21+00:00</updated>
<author>
<name>Peter Jones</name>
<email>pjones@redhat.com</email>
</author>
<published>2021-12-10T21:18:41+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/efi-boot-shim.git/commit/?id=2e78cd93390f83648a20b5b3bb934f846537e54c'/>
<id>urn:sha1:2e78cd93390f83648a20b5b3bb934f846537e54c</id>
<content type='text'>
cov-analysis-linux64-2020.09 is a lot more successful than the older
versions at building, but it still has some... issues.  Among them, it
is of the belief that this:

void
foo(char *fmt, ...)
{
  __builtin_va_list ap;

  __builtin_ms_va_start(ap, fmt); /* &lt;- here */
  ...
}

is an uninitialized use of "ap".

This patch adds defined(__COVERITY__) to the list of criteria for using
sysv va lists, which it has no such confusion about.

Signed-off-by: Peter Jones &lt;pjones@redhat.com&gt;
</content>
</entry>
<entry>
<title>shim: Don't stop forever at "Secure Boot not enabled" notification</title>
<updated>2021-12-10T19:59:22+00:00</updated>
<author>
<name>Renaud Métrich</name>
<email>rmetrich@redhat.com</email>
</author>
<published>2021-12-03T12:28:13+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/efi-boot-shim.git/commit/?id=0dd4c78fc0846b36a334068ed5e5495e1d3d5f9f'/>
<id>urn:sha1:0dd4c78fc0846b36a334068ed5e5495e1d3d5f9f</id>
<content type='text'>
Requesting a keystroke when Secure Boot is not enabled and verbosity is
enabled is really annoying.

Signed-off-by: Renaud Métrich &lt;rmetrich@redhat.com&gt;
</content>
</entry>
<entry>
<title>fallback: fix fallback not passing arguments of the first boot option</title>
<updated>2021-12-10T19:56:54+00:00</updated>
<author>
<name>Javier Martinez Canillas</name>
<email>javierm@redhat.com</email>
</author>
<published>2021-11-09T15:39:37+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/efi-boot-shim.git/commit/?id=4804ba077381dcd0288d98e3d08bc87ee77afad1'/>
<id>urn:sha1:4804ba077381dcd0288d98e3d08bc87ee77afad1</id>
<content type='text'>
The buffer used to read the data in the CSV is declared as a stack variable
in the try_boot_csv() function, but a pointer to the arguments field of the
first boot option is stored in the global first_new_option_args variable.

Later, when is used set the arguments to boot the first entry, the variable
points to memory that no longer exists. This leads to booting an entry with
garbage as arguments instead of the correct value.

Reported-by: Alexander Larsson &lt;alexl@redhat.com&gt;
Signed-off-by: Javier Martinez Canillas &lt;javierm@redhat.com&gt;
</content>
</entry>
<entry>
<title>Introduce a new MOK variable called MokListTrustedRT</title>
<updated>2021-11-03T15:30:28+00:00</updated>
<author>
<name>Eric Snowberg</name>
<email>eric.snowberg@oracle.com</email>
</author>
<published>2021-10-05T16:06:05+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/efi-boot-shim.git/commit/?id=4e513405b4f1641710115780d19dcec130c5208f'/>
<id>urn:sha1:4e513405b4f1641710115780d19dcec130c5208f</id>
<content type='text'>
Introduce a new MOK variable called MokListTrustedRT.  It allows an end-user
to decide if they want to trust MOKList keys within the soon to be booted
Linux kernel.  This variable does not change any functionality within shim
itself.  When Linux boots, if MokListTrustedRT is set and
EFI_VARIABLE_NON_VOLATILE is not set, keys in MokListRT are loaded into the
.machine keyring instead of the .platform keyring.

Signed-off-by: Eric Snowberg &lt;eric.snowberg@oracle.com&gt;
</content>
</entry>
<entry>
<title>Fix a component version in SBAT.example.md</title>
<updated>2021-11-03T15:28:38+00:00</updated>
<author>
<name>Nicholas Bishop</name>
<email>nicholasbishop@google.com</email>
</author>
<published>2021-10-20T19:24:58+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/efi-boot-shim.git/commit/?id=899314b90113abaaa4b22cd1d82a0fcb2a971850'/>
<id>urn:sha1:899314b90113abaaa4b22cd1d82a0fcb2a971850</id>
<content type='text'>
In the bug2 section, the first Debian `.sbat` has a `grub,1`
component. But at this point in the story, `grub,1` has been revoked by
the update in the bug1 section. Updated it to `grub,2` so that it passes
that check.

Signed-off-by: Nicholas Bishop &lt;nicholasbishop@google.com&gt;
</content>
</entry>
<entry>
<title>Bump the version number to 15.5~rc1</title>
<updated>2021-11-03T15:28:38+00:00</updated>
<author>
<name>Peter Jones</name>
<email>pjones@redhat.com</email>
</author>
<published>2021-10-14T14:28:25+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/efi-boot-shim.git/commit/?id=0199301fd8f8311852228ac974b72d0ae2b0d918'/>
<id>urn:sha1:0199301fd8f8311852228ac974b72d0ae2b0d918</id>
<content type='text'>
Signed-off-by: Peter Jones &lt;pjones@redhat.com&gt;
</content>
</entry>
<entry>
<title>shim: Don't parse load options if invoked from removable media path</title>
<updated>2021-10-12T14:50:44+00:00</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2021-08-04T08:46:45+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/efi-boot-shim.git/commit/?id=b43758465a553d289b9f92aa5892244f19c1a76d'/>
<id>urn:sha1:b43758465a553d289b9f92aa5892244f19c1a76d</id>
<content type='text'>
We see various reports of boot failures because the generated
boot entries contain garbage/tagging that we do not expect, and
that we then parse as a second stage boot loader.
</content>
</entry>
<entry>
<title>Extract is_removable_media_path() out of should_use_fallback()</title>
<updated>2021-10-12T14:50:44+00:00</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2021-08-04T08:43:30+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/efi-boot-shim.git/commit/?id=7cbf1184b612b71e06a3750fe827a94caf726cc7'/>
<id>urn:sha1:7cbf1184b612b71e06a3750fe827a94caf726cc7</id>
<content type='text'>
Simple refactoring that extracts the path checking on the given
loaded image. This will be useful to check if we were booted via
removable media path in other places.
</content>
</entry>
<entry>
<title>docs: update SBAT UEFI variable name</title>
<updated>2021-10-12T14:41:14+00:00</updated>
<author>
<name>Nicholas Bishop</name>
<email>nicholasbishop@google.com</email>
</author>
<published>2021-09-30T15:01:18+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/efi-boot-shim.git/commit/?id=885feafdc1d2af477c48d156f0aa4c19b828cf18'/>
<id>urn:sha1:885feafdc1d2af477c48d156f0aa4c19b828cf18</id>
<content type='text'>
The name of the SBAT UEFI variable changed from "SBAT" to "SbatLevel" in
27da4170f0fb30acde91a37e0256dfcfe76ea69e. Update the documentation to
match.

Signed-off-by: Nicholas Bishop &lt;nicholasbishop@google.com&gt;
</content>
</entry>
</feed>
