mirror of
https://mirrors.bfsu.edu.cn/git/linux.git
synced 2024-11-11 21:38:32 +08:00
99d5cadfde
This is a preparatory patch for kexec_file_load() lockdown. A locked down kernel needs to prevent unsigned kernel images from being loaded with kexec_file_load(). Currently, the only way to force the signature verification is compiling with KEXEC_VERIFY_SIG. This prevents loading usigned images even when the kernel is not locked down at runtime. This patch splits KEXEC_VERIFY_SIG into KEXEC_SIG and KEXEC_SIG_FORCE. Analogous to the MODULE_SIG and MODULE_SIG_FORCE for modules, KEXEC_SIG turns on the signature verification but allows unsigned images to be loaded. KEXEC_SIG_FORCE disallows images without a valid signature. Signed-off-by: Jiri Bohac <jbohac@suse.cz> Signed-off-by: David Howells <dhowells@redhat.com> Signed-off-by: Matthew Garrett <mjg59@google.com> cc: kexec@lists.infradead.org Signed-off-by: James Morris <jmorris@namei.org>
66 lines
1.6 KiB
C
66 lines
1.6 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
/*
|
|
* Image loader for kexec_file_load system call.
|
|
*
|
|
* Copyright IBM Corp. 2018
|
|
*
|
|
* Author(s): Philipp Rudo <prudo@linux.vnet.ibm.com>
|
|
*/
|
|
|
|
#include <linux/errno.h>
|
|
#include <linux/kernel.h>
|
|
#include <linux/kexec.h>
|
|
#include <asm/ipl.h>
|
|
#include <asm/setup.h>
|
|
|
|
static int kexec_file_add_kernel_image(struct kimage *image,
|
|
struct s390_load_data *data)
|
|
{
|
|
struct kexec_buf buf;
|
|
|
|
buf.image = image;
|
|
|
|
buf.buffer = image->kernel_buf;
|
|
buf.bufsz = image->kernel_buf_len;
|
|
|
|
buf.mem = 0;
|
|
if (image->type == KEXEC_TYPE_CRASH)
|
|
buf.mem += crashk_res.start;
|
|
buf.memsz = buf.bufsz;
|
|
|
|
data->kernel_buf = image->kernel_buf;
|
|
data->kernel_mem = buf.mem;
|
|
data->parm = image->kernel_buf + PARMAREA;
|
|
data->memsz += buf.memsz;
|
|
|
|
ipl_report_add_component(data->report, &buf,
|
|
IPL_RB_COMPONENT_FLAG_SIGNED |
|
|
IPL_RB_COMPONENT_FLAG_VERIFIED,
|
|
IPL_RB_CERT_UNKNOWN);
|
|
return kexec_add_buffer(&buf);
|
|
}
|
|
|
|
static void *s390_image_load(struct kimage *image,
|
|
char *kernel, unsigned long kernel_len,
|
|
char *initrd, unsigned long initrd_len,
|
|
char *cmdline, unsigned long cmdline_len)
|
|
{
|
|
return kexec_file_add_components(image, kexec_file_add_kernel_image);
|
|
}
|
|
|
|
static int s390_image_probe(const char *buf, unsigned long len)
|
|
{
|
|
/* Can't reliably tell if an image is valid. Therefore give the
|
|
* user whatever he wants.
|
|
*/
|
|
return 0;
|
|
}
|
|
|
|
const struct kexec_file_ops s390_kexec_image_ops = {
|
|
.probe = s390_image_probe,
|
|
.load = s390_image_load,
|
|
#ifdef CONFIG_KEXEC_SIG
|
|
.verify_sig = s390_verify_sig,
|
|
#endif /* CONFIG_KEXEC_SIG */
|
|
};
|