2012-08-14 19:53:38 +00:00
|
|
|
commit 032fac327b8db7af06509c730934a5c70bb74122
|
2012-08-14 20:22:04 +00:00
|
|
|
From: Matthew Garrett <mjg@redhat.com>
|
2012-08-14 19:53:38 +00:00
|
|
|
Date: Mon Aug 13 14:46:51 2012 -0400
|
2012-08-14 20:22:04 +00:00
|
|
|
Subject: Don't permit insmod on secure boot
|
2012-08-14 19:53:38 +00:00
|
|
|
|
|
|
|
diff --git a/grub-core/kern/corecmd.c b/grub-core/kern/corecmd.c
|
|
|
|
index eec575c..3df9dbd 100644
|
|
|
|
--- a/grub-core/kern/corecmd.c
|
|
|
|
+++ b/grub-core/kern/corecmd.c
|
|
|
|
@@ -28,6 +28,10 @@
|
|
|
|
#include <grub/command.h>
|
|
|
|
#include <grub/i18n.h>
|
|
|
|
|
|
|
|
+#ifdef GRUB_MACHINE_EFI
|
|
|
|
+#include <grub/efi/efi.h>
|
|
|
|
+#endif
|
|
|
|
+
|
|
|
|
/* set ENVVAR=VALUE */
|
|
|
|
static grub_err_t
|
|
|
|
grub_core_cmd_set (struct grub_command *cmd __attribute__ ((unused)),
|
|
|
|
@@ -81,6 +85,11 @@ grub_core_cmd_insmod (struct grub_command *cmd __attribute__ ((unused)),
|
|
|
|
{
|
|
|
|
grub_dl_t mod;
|
|
|
|
|
|
|
|
+#ifdef GRUB_MACHINE_EFI
|
|
|
|
+ if (grub_efi_secure_boot())
|
|
|
|
+ return grub_error (GRUB_ERR_ACCESS_DENIED, N_("Secure Boot forbids insmod"));
|
|
|
|
+#endif
|
|
|
|
+
|
|
|
|
if (argc == 0)
|
|
|
|
return grub_error (GRUB_ERR_BAD_ARGUMENT, N_("one argument expected"));
|
|
|
|
|
|
|
|
diff --git a/grub-core/kern/efi/efi.c b/grub-core/kern/efi/efi.c
|
|
|
|
index 02d2f9a..4bafd16 100644
|
|
|
|
--- a/grub-core/kern/efi/efi.c
|
|
|
|
+++ b/grub-core/kern/efi/efi.c
|
|
|
|
@@ -229,6 +229,34 @@ grub_efi_get_variable (const char *var, const grub_efi_guid_t *guid,
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
+grub_efi_boolean_t
|
|
|
|
+grub_efi_secure_boot (void)
|
|
|
|
+{
|
|
|
|
+ grub_efi_guid_t efi_var_guid = GRUB_EFI_GLOBAL_VARIABLE_GUID;
|
|
|
|
+ grub_size_t datasize;
|
|
|
|
+ char *secure_boot = NULL;
|
|
|
|
+ char *setup_mode = NULL;
|
|
|
|
+ grub_efi_boolean_t ret = 0;
|
|
|
|
+
|
|
|
|
+ secure_boot = grub_efi_get_variable("SecureBoot", &efi_var_guid, &datasize);
|
|
|
|
+
|
|
|
|
+ if (datasize != 1 || !secure_boot)
|
|
|
|
+ goto out;
|
|
|
|
+
|
|
|
|
+ setup_mode = grub_efi_get_variable("SetupMode", &efi_var_guid, &datasize);
|
|
|
|
+
|
|
|
|
+ if (datasize != 1 || !setup_mode)
|
|
|
|
+ goto out;
|
|
|
|
+
|
|
|
|
+ if (*secure_boot && !*setup_mode)
|
|
|
|
+ ret = 1;
|
|
|
|
+
|
|
|
|
+ out:
|
|
|
|
+ grub_free (secure_boot);
|
|
|
|
+ grub_free (setup_mode);
|
|
|
|
+ return ret;
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
#pragma GCC diagnostic ignored "-Wcast-align"
|
|
|
|
|
|
|
|
/* Search the mods section from the PE32/PE32+ image. This code uses
|
|
|
|
diff --git a/include/grub/efi/efi.h b/include/grub/efi/efi.h
|
|
|
|
index 1b0e7ae..153ac7a 100644
|
|
|
|
--- a/include/grub/efi/efi.h
|
|
|
|
+++ b/include/grub/efi/efi.h
|
|
|
|
@@ -67,6 +67,7 @@ grub_err_t EXPORT_FUNC (grub_efi_set_virtual_address_map) (grub_efi_uintn_t memo
|
|
|
|
void *EXPORT_FUNC (grub_efi_get_variable) (const char *variable,
|
|
|
|
const grub_efi_guid_t *guid,
|
|
|
|
grub_size_t *datasize_out);
|
|
|
|
+grub_efi_boolean_t EXPORT_FUNC (grub_efi_secure_boot) (void);
|
|
|
|
int
|
|
|
|
EXPORT_FUNC (grub_efi_compare_device_paths) (const grub_efi_device_path_t *dp1,
|
|
|
|
const grub_efi_device_path_t *dp2);
|