You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
catch-fail - trap failure and sleep so as to enter a melange build for dbug
catch-fail - trap and sleep to enter a melange build for debug
Usage: catch-fail op
catch-fail is used to help debug a melange build. In a 'run' section
you can add at the top:
eval $(/home/build/catch-fail eval-trap 1h)
stubby talk at All Systems Go conference September 2023.
All Systems Go 2023: Kernel command line and UKI; systemd-stub and the ‘stubby’ alternative
This talk is was given 2023-09-14 in Berlin at the All Systems Go 2023 conference.
It is available online from all-systems-go conference here.
Abstract
Modification of the kernel command line has historically been one of the easiest ways to customize system behavior. Bootloaders allow for persistent changes via config-files and on-the-fly changes interactively during system boot.
System behavior changes made via the kernel command line are not limited to the kernel itself. Userspace applications from installers to init systems and beyond also take input from /proc/cmdline.
It is clear that some kernel command line options are desirable (console=ttyS0 verbose) and possibly even necessary. Others, such as the cromulent 'init=/bin/sh', can allow circumvention of benefits that Secureboot and TPM provide.
A change in process at work meant that internal IT would be managing my work-provided laptop.
While I do not expect management to leak any personal sensitive data that was on the machine,
it does represent an increase in the potential for such a thing to happen.
I bought a Yubikey (5c).
The goal was to store "personal" GPG and SSH credentials on the yubikey so that they
would not be available to a compromised system, or inadvertantly get backed up.
The setup seems to work pretty well. Here is what I did.