Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

iot2050-efivarfs-helper: handle efivarfs dynamically during runtime #578

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

rakeshk7097
Copy link

Instead of enforcing a persistent read-write (rw) mount via /etc/fstab, this change ensures efivarfs is mounted and remounted dynamically during command execution. This approach improves flexibility, avoids potential conflicts, and ensures efivarfs is available with the correct permissions only when needed.
Key improvements:

  • Removed the need for a persistent rw entry in /etc/fstab.
  • Ensures efivarfs is correctly mounted and remounted as needed during execution.
  • Prevents unnecessary system-wide modifications while maintaining secure access.

This update enhances robustness and ensures a controlled, on-demand handling of efivarfs.

Instead of enforcing a persistent read-write (rw) mount via /etc/fstab,
this change ensures efivarfs is mounted and remounted dynamically during
command execution. This approach improves flexibility, avoids potential
conflicts, and ensures efivarfs is available with the correct permissions
only when needed.
Key improvements:

* Removed the need for a persistent rw entry in /etc/fstab.
* Ensures efivarfs is correctly mounted and remounted as needed during execution.
* Prevents unnecessary system-wide modifications while maintaining secure access.

This update enhances robustness and ensures a controlled, on-demand handling of
efivarfs.

Signed-off-by: Rakesh Kumar <[email protected]>
@rakeshk7097
Copy link
Author

@BaochengSu , could you please review the changes, thanks!

@rakeshk7097
Copy link
Author

Changes have been tested on iot2050 device, below are the logs

`root@iot2050:~# iot2050-efivarfs-helper -- -f db.auth db
Checking for the kernel module tee_stmm_efi... Done.
Checking for the service tee-supplicant... Done.
Checking for efivarfs mounting... Not mounted. Mounting efivarfs ...Attempting to mount efivarfs as read-write...Mount successful.
Attempting to remount as read-write...Remount as read-write successful.
Done.
Checking for the efitools installation... Done.
Removing the immutable flag of /sys/firmware/efi/efivars/KEK-8be4df61-93ca-11d2-aa0d-00e098032b8c... Done.
Removing the immutable flag of /sys/firmware/efi/efivars/PK-8be4df61-93ca-11d2-aa0d-00e098032b8c... Done.
Performing efi-updatevar -f db.auth db... Done.

Return code: 0

Adding the immutable flag of /sys/firmware/efi/efivars/db-d719b2cb-3d3a-4596-a3bc-dad00e67656f... Done.
Adding the immutable flag of /sys/firmware/efi/efivars/KEK-8be4df61-93ca-11d2-aa0d-00e098032b8c... Done.
Adding the immutable flag of /sys/firmware/efi/efivars/PK-8be4df61-93ca-11d2-aa0d-00e098032b8c... Done.

root@iot2050:~# iot2050-efivarfs-helper -- -f nodb.auth db
Checking for the kernel module tee_stmm_efi... Done.
Checking for the service tee-supplicant... Done.
Checking for efivarfs mounting... efivarfs mounted as read-only. Attempting to remount efivarfs as read-write...Remount successful.
Done.
Checking for the efitools installation... Done.
Removing the immutable flag of /sys/firmware/efi/efivars/db-d719b2cb-3d3a-4596-a3bc-dad00e67656f... Done.
Removing the immutable flag of /sys/firmware/efi/efivars/KEK-8be4df61-93ca-11d2-aa0d-00e098032b8c... Done.
Removing the immutable flag of /sys/firmware/efi/efivars/PK-8be4df61-93ca-11d2-aa0d-00e098032b8c... Done.
Performing efi-updatevar -f nodb.auth db... Done.

Return code: 0

Adding the immutable flag of /sys/firmware/efi/efivars/KEK-8be4df61-93ca-11d2-aa0d-00e098032b8c... Done.
Adding the immutable flag of /sys/firmware/efi/efivars/PK-8be4df61-93ca-11d2-aa0d-00e098032b8c... Done.`

if mount_err_msg == 'not mounted.':
'''
By default, the kernel or systemd mounts efivarfs as read-only (ro) to prevent
accidental modifications to UEFI variables, which are critical for system operation.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I doubt that. Also efibootmgr needs this as r/w, and I don't think it remounts it on demand.

Furthermore, your patch leaves efivarfs r/w mounted behind - where is the improvement then?

Copy link
Collaborator

@BaochengSu BaochengSu Feb 6, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I guess most of the related tools/applications expect this efivarfs mounted as R/W for a normal operation.

Additionally, there is already an immutable flag on the efivarfs, which need to be toggled before/after the manipulating of the security database. And the current script has been handling this flag - remove this immutable flag before any efivarfs update, then added it back after the operation, under the root permission. I think this is the mechanism part, and the policy part is left to the tools/application or even level 8.

BTW, the latest head has an issue on the r/w efivarfs: even declared as r/w in the /etc/fstab, the filesystem is still mounted as ro. A bisection told me it was due to the latest kernel update, however, hadn't got the enough time to dive deeper. Workaround is to remount the efivarfs.

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks @BaochengSu and @jan-kiszka for you inputs,

Yes, In the older kernel version (6.1.54-cip6), remounting efivarfs as read-write was working fine. However, in the newer kernel version (6.1.102-cip26), which we are currently using, efivarfs is not being mounted as read-write at any stage of the boot process.

We have attempted to mount efivarfs as read-write both in the initramfs and using a systemd service running at the multi-user.target phase, but in all cases, the system does not allow it.
However, once the system has fully booted, we are able to successfully remount efivarfs as read-write using the following command:

mount -o remount,rw /sys/firmware/efi/efivars

Copy link
Collaborator

@BaochengSu BaochengSu Feb 6, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@rakeshk7097 , I think the real issue here is that the efivarfs is mounted as read-only. (Maybe our backporting of the efi_stmm has some flow?) The current postinit of adding the r/w into fstab is already a workaround...

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think eventually we will fix the readonly issue, before then, I think downstream can hold their own whatever workaround, just make it easier to be 'uninstalled'.

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sure @BaochengSu , thanks for your input on this.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants