lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sun, 03 Jun 2012 21:40:27 +0100 From: Matt Fleming <matt.fleming@...el.com> To: "H. Peter Anvin" <hpa@...or.com> Cc: Henrik Rydberg <rydberg@...omail.se>, Ingo Molnar <mingo@...nel.org>, linux-kernel@...r.kernel.org, Jordan Justen <jordan.l.justen@...el.com>, Matthew Garrett <mjg@...hat.com> Subject: Re: [GIT PULL] x86/efi changes for v3.5 On Sat, 2012-06-02 at 20:13 -0700, H. Peter Anvin wrote: > On 06/02/2012 11:38 AM, Henrik Rydberg wrote: > > Hi Ingo, Hans Peter, Matt, Jordan, > > > >> This patchset makes changes to the bzImage EFI header, so that > >> it can be signed with a secure boot signature tool. It should > >> not affect anyone who is not using the EFI self-boot feature in > >> any way. > > > > Commit 2e064b1 (Fix issue of overlapping .reloc section for EFI_STUB) > > breaks EFI boot on my MacBookAir3,1. The efi firmware no longer > > recognizes the bzImage and falls back to BIOS emulation boot. > > > > Reverting 2e064b1 works for me, but I am happy to test other options > > as well. > > > > Matt, Jordan, > > Could you look into this please? Yeah, there's a bug report for this here, https://bugzilla.kernel.org/show_bug.cgi?id=43309 I suspect that older firmware doesn't handle a zero .reloc section properly. So, unfortunately we will have to leave the .reloc section with a dummy reloc, rather than having one with no entries. I'll put a patch together. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists