grub2/0135-tpm-Don-t-propagate-TPM-measurement-errors-to-the-ve.patch

63 lines
2.2 KiB
Diff
Raw Normal View History

2022-03-07 17:05:00 +08:00
From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
2020-07-29 20:47:36 +08:00
From: Javier Martinez Canillas <javierm@redhat.com>
Date: Sat, 16 May 2020 11:33:18 +0200
2022-03-07 17:05:00 +08:00
Subject: [PATCH] tpm: Don't propagate TPM measurement errors to the verifiers
layer
2020-07-29 20:47:36 +08:00
Currently if the EFI firmware fails to do a TPM measurement for a file,
the error will be propagated to the verifiers framework and so opening
the file will not succeed.
This mean that buggy firmwares will prevent the system to boot since the
loader won't be able to open any file. But failing to do TPM measurements
shouldn't be a fatal error and the system should still be able to boot.
Signed-off-by: Javier Martinez Canillas <javierm@redhat.com>
---
grub-core/commands/tpm.c | 14 +++++++-------
1 file changed, 7 insertions(+), 7 deletions(-)
diff --git a/grub-core/commands/tpm.c b/grub-core/commands/tpm.c
2022-03-07 17:05:00 +08:00
index 2052c36eaba..e287d042e6b 100644
2020-07-29 20:47:36 +08:00
--- a/grub-core/commands/tpm.c
+++ b/grub-core/commands/tpm.c
2022-03-07 17:05:00 +08:00
@@ -42,7 +42,8 @@ grub_tpm_verify_init (grub_file_t io,
2020-07-29 20:47:36 +08:00
static grub_err_t
grub_tpm_verify_write (void *context, void *buf, grub_size_t size)
{
- return grub_tpm_measure (buf, size, GRUB_BINARY_PCR, context);
+ grub_tpm_measure (buf, size, GRUB_BINARY_PCR, context);
+ return GRUB_ERR_NONE;
}
static grub_err_t
2022-03-07 17:05:00 +08:00
@@ -50,7 +51,6 @@ grub_tpm_verify_string (char *str, enum grub_verify_string_type type)
2020-07-29 20:47:36 +08:00
{
const char *prefix = NULL;
char *description;
- grub_err_t status;
switch (type)
{
2022-03-07 17:05:00 +08:00
@@ -66,15 +66,15 @@ grub_tpm_verify_string (char *str, enum grub_verify_string_type type)
2020-07-29 20:47:36 +08:00
}
description = grub_malloc (grub_strlen (str) + grub_strlen (prefix) + 1);
if (!description)
- return grub_errno;
+ return GRUB_ERR_NONE;
grub_memcpy (description, prefix, grub_strlen (prefix));
grub_memcpy (description + grub_strlen (prefix), str,
grub_strlen (str) + 1);
- status =
- grub_tpm_measure ((unsigned char *) str, grub_strlen (str),
- GRUB_STRING_PCR, description);
+
+ grub_tpm_measure ((unsigned char *) str, grub_strlen (str), GRUB_STRING_PCR,
+ description);
grub_free (description);
- return status;
+ return GRUB_ERR_NONE;
}
struct grub_file_verifier grub_tpm_verifier = {