Хотела бы найти подработку копирайтером, рерайтером

2017-11-29 Thread polinarom00052
Добрый час! Я хочу предложить услуги по оптимизации веб сайта SEO-текстами. Сообщить о подробностях?

[PATCH] x86: move parse_early_param to earlier code for add_efi_memmap

2017-11-29 Thread Dave Young
'add_efi_memmap' is an early param, but do_add_efi_memmap() has no chance to run because the code path is before parse_early_param(). I believe it worked when the param was introduced but probably later some other changes caused the wrong order and nobody noticed it. Move parse_early_param before

Re: [GIT PULL] hash addresses printed with %p

2017-11-29 Thread Linus Torvalds
On Wed, Nov 29, 2017 at 1:14 PM, Linus Torvalds wrote: > > Not because %pK itself changed, but because the semantics of %p did. > The baseline moved, and the "safe" version did not. Btw, that baseline for me is now that I can do ./scripts/leaking_addresses.pl | wc -l 18 and of those 18 hits

[PATCH 2/4] MODSIGN: print appropriate status message when getting UEFI certificates list

2017-11-29 Thread Lee, Chun-Yi
When getting certificates list from UEFI variable, the original error message shows the state number from UEFI firmware. It's hard to be read by human. This patch changed the error message to show the appropriate string. The message will be showed as: [0.788529] MODSIGN: Couldn't get UEFI Mok

[PATCH 4/4] MODSIGN: checking the blacklisted hash before loading a kernel module

2017-11-29 Thread Lee, Chun-Yi
This patch adds the logic for checking the kernel module's hash base on blacklist. The hash must be generated by sha256 and enrolled to dbx/mokx. For example: sha256sum sample.ko mokutil --mokx --import-hash $HASH_RESULT Whether the signature on ko file is stripped or not, the has

[PATCH 3/4] MODSIGN: load blacklist from MOKx

2017-11-29 Thread Lee, Chun-Yi
This patch adds the logic to load the blacklisted hash and certificates from MOKx which is maintained by shim bootloader. Cc: David Howells Cc: Josh Boyer Signed-off-by: "Lee, Chun-Yi" --- certs/load_uefi.c | 16 +--- 1 file changed, 13 insertions(+), 3 deletions(-) diff --git a/c

[PATCH 1/4] MODSIGN: do not load mok when secure boot disabled

2017-11-29 Thread Lee, Chun-Yi
The mok can not be trusted when the secure boot is disabled. Which means that the kernel embedded certificate is the only trusted key. Due to db/dbx are authenticated variables, they needs manufacturer's KEK for update. So db/dbx are secure when secureboot disabled. Cc: David Howells Cc: Josh B

[PATCH 0/4] Using the hash in MOKx to blacklist kernel module

2017-11-29 Thread Lee, Chun-Yi
This patch set is base on the efi-lock-down and keys-uefi branchs in David Howells's linux-fs git tree. The main purpose is using the MOKx to blacklist kernel module. As the MOK (Machine Owner Key), MOKx is a EFI boot time variable which is maintained by shim boot loader. We can enroll the hash of

[PATCH 0/4] Using the hash in MOKx to blacklist kernel module

2017-11-29 Thread Lee, Chun-Yi
This patch set is base on the efi-lock-down and keys-uefi branchs in David Howells's linux-fs git tree. The main purpose is using the MOKx to blacklist kernel module. As the MOK (Machine Owner Key), MOKx is a EFI boot time variable which is maintained by shim boot loader. We can enroll the hash of