2016-05-25 15:13:52 +00:00
|
|
|
From 0000dc9edd5997cc49b8893a9d5407f89dfa1307 Mon Sep 17 00:00:00 2001
|
2014-08-20 17:22:24 +00:00
|
|
|
From: Matthew Garrett <matthew.garrett@nebula.com>
|
|
|
|
Date: Fri, 9 Aug 2013 18:36:30 -0400
|
2016-05-25 15:13:52 +00:00
|
|
|
Subject: [PATCH] Add option to automatically enforce module signatures when in
|
|
|
|
Secure Boot mode
|
2014-08-20 17:22:24 +00:00
|
|
|
|
|
|
|
UEFI Secure Boot provides a mechanism for ensuring that the firmware will
|
|
|
|
only load signed bootloaders and kernels. Certain use cases may also
|
|
|
|
require that all kernel modules also be signed. Add a configuration option
|
|
|
|
that enforces this automatically when enabled.
|
|
|
|
|
|
|
|
Signed-off-by: Matthew Garrett <matthew.garrett@nebula.com>
|
|
|
|
---
|
|
|
|
Documentation/x86/zero-page.txt | 2 ++
|
2016-05-25 15:13:52 +00:00
|
|
|
arch/x86/Kconfig | 11 ++++++
|
2016-05-16 22:50:03 +00:00
|
|
|
arch/x86/boot/compressed/eboot.c | 66 +++++++++++++++++++++++++++++++++++
|
|
|
|
arch/x86/include/uapi/asm/bootparam.h | 3 +-
|
|
|
|
arch/x86/kernel/setup.c | 6 ++++
|
|
|
|
include/linux/module.h | 6 ++++
|
|
|
|
kernel/module.c | 7 ++++
|
2016-05-25 15:13:52 +00:00
|
|
|
7 files changed, 100 insertions(+), 1 deletion(-)
|
2014-08-20 17:22:24 +00:00
|
|
|
|
|
|
|
diff --git a/Documentation/x86/zero-page.txt b/Documentation/x86/zero-page.txt
|
2016-05-25 15:13:52 +00:00
|
|
|
index 95a4d34af3fd..b8527c6b7646 100644
|
2014-08-20 17:22:24 +00:00
|
|
|
--- a/Documentation/x86/zero-page.txt
|
|
|
|
+++ b/Documentation/x86/zero-page.txt
|
2015-09-09 15:10:06 +00:00
|
|
|
@@ -31,6 +31,8 @@ Offset Proto Name Meaning
|
2014-08-20 17:22:24 +00:00
|
|
|
1E9/001 ALL eddbuf_entries Number of entries in eddbuf (below)
|
|
|
|
1EA/001 ALL edd_mbr_sig_buf_entries Number of entries in edd_mbr_sig_buffer
|
|
|
|
(below)
|
|
|
|
+1EB/001 ALL kbd_status Numlock is enabled
|
|
|
|
+1EC/001 ALL secure_boot Secure boot is enabled in the firmware
|
|
|
|
1EF/001 ALL sentinel Used to detect broken bootloaders
|
|
|
|
290/040 ALL edd_mbr_sig_buffer EDD MBR signatures
|
|
|
|
2D0/A00 ALL e820_map E820 memory map table
|
|
|
|
diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig
|
2016-05-25 15:13:52 +00:00
|
|
|
index 0a7b885964ba..29b8ba9ae713 100644
|
2014-08-20 17:22:24 +00:00
|
|
|
--- a/arch/x86/Kconfig
|
|
|
|
+++ b/arch/x86/Kconfig
|
2016-05-25 15:13:52 +00:00
|
|
|
@@ -1776,6 +1776,17 @@ config EFI_MIXED
|
2014-08-20 17:22:24 +00:00
|
|
|
|
|
|
|
If unsure, say N.
|
|
|
|
|
|
|
|
+config EFI_SECURE_BOOT_SIG_ENFORCE
|
2016-05-25 15:13:52 +00:00
|
|
|
+ def_bool n
|
|
|
|
+ depends on EFI
|
2014-08-20 17:22:24 +00:00
|
|
|
+ prompt "Force module signing when UEFI Secure Boot is enabled"
|
|
|
|
+ ---help---
|
|
|
|
+ UEFI Secure Boot provides a mechanism for ensuring that the
|
|
|
|
+ firmware will only load signed bootloaders and kernels. Certain
|
|
|
|
+ use cases may also require that all kernel modules also be signed.
|
|
|
|
+ Say Y here to automatically enable module signature enforcement
|
|
|
|
+ when a system boots with UEFI Secure Boot enabled.
|
|
|
|
+
|
|
|
|
config SECCOMP
|
|
|
|
def_bool y
|
|
|
|
prompt "Enable seccomp to safely compute untrusted bytecode"
|
|
|
|
diff --git a/arch/x86/boot/compressed/eboot.c b/arch/x86/boot/compressed/eboot.c
|
2016-05-25 15:13:52 +00:00
|
|
|
index 52fef606bc54..6b8b9a775b46 100644
|
2014-08-20 17:22:24 +00:00
|
|
|
--- a/arch/x86/boot/compressed/eboot.c
|
|
|
|
+++ b/arch/x86/boot/compressed/eboot.c
|
|
|
|
@@ -12,6 +12,7 @@
|
|
|
|
#include <asm/efi.h>
|
|
|
|
#include <asm/setup.h>
|
|
|
|
#include <asm/desc.h>
|
|
|
|
+#include <asm/bootparam_utils.h>
|
|
|
|
|
2015-02-16 15:01:09 +00:00
|
|
|
#include "../string.h"
|
|
|
|
#include "eboot.h"
|
2016-05-16 22:50:03 +00:00
|
|
|
@@ -571,6 +572,67 @@ free_handle:
|
|
|
|
efi_call_early(free_pool, pci_handle);
|
2014-08-20 17:22:24 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
+static int get_secure_boot(void)
|
|
|
|
+{
|
|
|
|
+ u8 sb, setup;
|
|
|
|
+ unsigned long datasize = sizeof(sb);
|
|
|
|
+ efi_guid_t var_guid = EFI_GLOBAL_VARIABLE_GUID;
|
|
|
|
+ efi_status_t status;
|
|
|
|
+
|
|
|
|
+ status = efi_early->call((unsigned long)sys_table->runtime->get_variable,
|
|
|
|
+ L"SecureBoot", &var_guid, NULL, &datasize, &sb);
|
|
|
|
+
|
|
|
|
+ if (status != EFI_SUCCESS)
|
|
|
|
+ return 0;
|
|
|
|
+
|
|
|
|
+ if (sb == 0)
|
|
|
|
+ return 0;
|
|
|
|
+
|
|
|
|
+
|
|
|
|
+ status = efi_early->call((unsigned long)sys_table->runtime->get_variable,
|
|
|
|
+ L"SetupMode", &var_guid, NULL, &datasize,
|
|
|
|
+ &setup);
|
|
|
|
+
|
|
|
|
+ if (status != EFI_SUCCESS)
|
|
|
|
+ return 0;
|
|
|
|
+
|
|
|
|
+ if (setup == 1)
|
|
|
|
+ return 0;
|
|
|
|
+
|
|
|
|
+ return 1;
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+
|
2016-05-16 22:50:03 +00:00
|
|
|
+/*
|
|
|
|
+ * See if we have Graphics Output Protocol
|
|
|
|
+ */
|
|
|
|
+static efi_status_t setup_gop(struct screen_info *si, efi_guid_t *proto,
|
|
|
|
+ unsigned long size)
|
|
|
|
+{
|
|
|
|
+ efi_status_t status;
|
|
|
|
+ void **gop_handle = NULL;
|
|
|
|
+
|
|
|
|
+ status = efi_call_early(allocate_pool, EFI_LOADER_DATA,
|
|
|
|
+ size, (void **)&gop_handle);
|
|
|
|
+ if (status != EFI_SUCCESS)
|
|
|
|
+ return status;
|
|
|
|
+
|
|
|
|
+ status = efi_call_early(locate_handle,
|
|
|
|
+ EFI_LOCATE_BY_PROTOCOL,
|
|
|
|
+ proto, NULL, &size, gop_handle);
|
|
|
|
+ if (status != EFI_SUCCESS)
|
|
|
|
+ goto free_handle;
|
|
|
|
+
|
|
|
|
+ if (efi_early->is64)
|
|
|
|
+ status = setup_gop64(si, proto, size, gop_handle);
|
|
|
|
+ else
|
|
|
|
+ status = setup_gop32(si, proto, size, gop_handle);
|
|
|
|
+
|
|
|
|
+free_handle:
|
|
|
|
+ efi_call_early(free_pool, gop_handle);
|
|
|
|
+ return status;
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
static efi_status_t
|
|
|
|
setup_uga32(void **uga_handle, unsigned long size, u32 *width, u32 *height)
|
|
|
|
{
|
|
|
|
@@ -1126,6 +1188,10 @@ struct boot_params *efi_main(struct efi_config *c,
|
2014-08-20 17:22:24 +00:00
|
|
|
else
|
|
|
|
setup_boot_services32(efi_early);
|
|
|
|
|
|
|
|
+ sanitize_boot_params(boot_params);
|
|
|
|
+
|
|
|
|
+ boot_params->secure_boot = get_secure_boot();
|
|
|
|
+
|
|
|
|
setup_graphics(boot_params);
|
|
|
|
|
2014-09-29 13:54:15 +00:00
|
|
|
setup_efi_pci(boot_params);
|
2014-08-20 17:22:24 +00:00
|
|
|
diff --git a/arch/x86/include/uapi/asm/bootparam.h b/arch/x86/include/uapi/asm/bootparam.h
|
2016-05-25 15:13:52 +00:00
|
|
|
index c18ce67495fa..2b3e5427097b 100644
|
2014-08-20 17:22:24 +00:00
|
|
|
--- a/arch/x86/include/uapi/asm/bootparam.h
|
|
|
|
+++ b/arch/x86/include/uapi/asm/bootparam.h
|
2015-04-14 13:54:01 +00:00
|
|
|
@@ -134,7 +134,8 @@ struct boot_params {
|
2014-08-20 17:22:24 +00:00
|
|
|
__u8 eddbuf_entries; /* 0x1e9 */
|
|
|
|
__u8 edd_mbr_sig_buf_entries; /* 0x1ea */
|
|
|
|
__u8 kbd_status; /* 0x1eb */
|
|
|
|
- __u8 _pad5[3]; /* 0x1ec */
|
|
|
|
+ __u8 secure_boot; /* 0x1ec */
|
|
|
|
+ __u8 _pad5[2]; /* 0x1ed */
|
|
|
|
/*
|
|
|
|
* The sentinel is set to a nonzero value (0xff) in header.S.
|
|
|
|
*
|
|
|
|
diff --git a/arch/x86/kernel/setup.c b/arch/x86/kernel/setup.c
|
2016-05-25 15:13:52 +00:00
|
|
|
index c4e7b3991b60..bdb9881c7afd 100644
|
2014-08-20 17:22:24 +00:00
|
|
|
--- a/arch/x86/kernel/setup.c
|
|
|
|
+++ b/arch/x86/kernel/setup.c
|
2016-05-25 15:13:52 +00:00
|
|
|
@@ -1152,6 +1152,12 @@ void __init setup_arch(char **cmdline_p)
|
2014-08-20 17:22:24 +00:00
|
|
|
|
|
|
|
io_delay_init();
|
|
|
|
|
|
|
|
+#ifdef CONFIG_EFI_SECURE_BOOT_SIG_ENFORCE
|
|
|
|
+ if (boot_params.secure_boot) {
|
|
|
|
+ enforce_signed_modules();
|
|
|
|
+ }
|
|
|
|
+#endif
|
|
|
|
+
|
|
|
|
/*
|
|
|
|
* Parse the ACPI tables for possible boot-time SMP configuration.
|
|
|
|
*/
|
|
|
|
diff --git a/include/linux/module.h b/include/linux/module.h
|
2016-05-25 15:13:52 +00:00
|
|
|
index 082298a09df1..38d0597f7615 100644
|
2014-08-20 17:22:24 +00:00
|
|
|
--- a/include/linux/module.h
|
|
|
|
+++ b/include/linux/module.h
|
2015-09-09 15:10:06 +00:00
|
|
|
@@ -273,6 +273,12 @@ const struct exception_table_entry *search_exception_tables(unsigned long add);
|
2014-08-20 17:22:24 +00:00
|
|
|
|
|
|
|
struct notifier_block;
|
|
|
|
|
|
|
|
+#ifdef CONFIG_MODULE_SIG
|
|
|
|
+extern void enforce_signed_modules(void);
|
|
|
|
+#else
|
|
|
|
+static inline void enforce_signed_modules(void) {};
|
|
|
|
+#endif
|
|
|
|
+
|
|
|
|
#ifdef CONFIG_MODULES
|
|
|
|
|
|
|
|
extern int modules_disabled; /* for sysctl */
|
|
|
|
diff --git a/kernel/module.c b/kernel/module.c
|
2016-05-25 15:13:52 +00:00
|
|
|
index 3c384968f553..ea484f3a35b2 100644
|
2014-08-20 17:22:24 +00:00
|
|
|
--- a/kernel/module.c
|
|
|
|
+++ b/kernel/module.c
|
2016-05-25 15:13:52 +00:00
|
|
|
@@ -4200,6 +4200,13 @@ void module_layout(struct module *mod,
|
2014-08-20 17:22:24 +00:00
|
|
|
EXPORT_SYMBOL(module_layout);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
+#ifdef CONFIG_MODULE_SIG
|
|
|
|
+void enforce_signed_modules(void)
|
|
|
|
+{
|
|
|
|
+ sig_enforce = true;
|
|
|
|
+}
|
|
|
|
+#endif
|
|
|
|
+
|
|
|
|
bool secure_modules(void)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_MODULE_SIG
|
2015-09-09 15:10:06 +00:00
|
|
|
--
|
2016-05-16 22:50:03 +00:00
|
|
|
2.5.5
|
2015-09-09 15:10:06 +00:00
|
|
|
|