2018-04-11 18:42:03 +00:00
|
|
|
|
From eb8fd62e887e624f5c6e7c2ee8512981e8b5be97 Mon Sep 17 00:00:00 2001
|
2012-10-23 14:45:04 +00:00
|
|
|
|
From: Colin Watson <cjwatson@ubuntu.com>
|
|
|
|
|
Date: Tue, 23 Oct 2012 10:40:49 -0400
|
2018-06-19 14:33:22 +00:00
|
|
|
|
Subject: [PATCH 084/246] Don't allow insmod when secure boot is enabled.
|
2012-08-15 13:58:04 +00:00
|
|
|
|
|
2012-10-23 14:45:04 +00:00
|
|
|
|
Hi,
|
|
|
|
|
|
|
|
|
|
Fedora's patch to forbid insmod in UEFI Secure Boot environments is fine
|
|
|
|
|
as far as it goes. However, the insmod command is not the only way that
|
|
|
|
|
modules can be loaded. In particular, the 'normal' command, which
|
|
|
|
|
implements the usual GRUB menu and the fully-featured command prompt,
|
|
|
|
|
will implicitly load commands not currently loaded into memory. This
|
|
|
|
|
permits trivial Secure Boot violations by writing commands implementing
|
|
|
|
|
whatever you want to do and pointing $prefix at the malicious code.
|
|
|
|
|
|
|
|
|
|
I'm currently test-building this patch (replacing your current
|
|
|
|
|
grub-2.00-no-insmod-on-sb.patch), but this should be more correct. It
|
|
|
|
|
moves the check into grub_dl_load_file.
|
2012-08-15 13:58:04 +00:00
|
|
|
|
---
|
2016-08-25 18:42:57 +00:00
|
|
|
|
grub-core/kern/dl.c | 22 ++++++++++++++++++++++
|
2012-08-15 13:58:04 +00:00
|
|
|
|
grub-core/kern/efi/efi.c | 28 ++++++++++++++++++++++++++++
|
|
|
|
|
include/grub/efi/efi.h | 1 +
|
2016-08-25 18:42:57 +00:00
|
|
|
|
3 files changed, 51 insertions(+)
|
2012-08-14 19:53:38 +00:00
|
|
|
|
|
2012-10-23 14:45:04 +00:00
|
|
|
|
diff --git a/grub-core/kern/dl.c b/grub-core/kern/dl.c
|
2018-02-27 18:56:41 +00:00
|
|
|
|
index e394cd96f8c..621070918d4 100644
|
2012-10-23 14:45:04 +00:00
|
|
|
|
--- a/grub-core/kern/dl.c
|
|
|
|
|
+++ b/grub-core/kern/dl.c
|
2016-08-25 18:42:57 +00:00
|
|
|
|
@@ -32,12 +32,21 @@
|
|
|
|
|
#include <grub/env.h>
|
|
|
|
|
#include <grub/cache.h>
|
|
|
|
|
#include <grub/i18n.h>
|
|
|
|
|
+#include <grub/efi/sb.h>
|
|
|
|
|
|
|
|
|
|
/* Platforms where modules are in a readonly area of memory. */
|
|
|
|
|
#if defined(GRUB_MACHINE_QEMU)
|
2014-01-06 16:39:16 +00:00
|
|
|
|
#define GRUB_MODULES_MACHINE_READONLY
|
2012-10-23 14:45:04 +00:00
|
|
|
|
#endif
|
2012-08-14 19:53:38 +00:00
|
|
|
|
|
2014-01-06 16:39:16 +00:00
|
|
|
|
+#ifdef GRUB_MACHINE_EMU
|
|
|
|
|
+#include <sys/mman.h>
|
|
|
|
|
+#endif
|
|
|
|
|
+
|
2012-08-14 19:53:38 +00:00
|
|
|
|
+#ifdef GRUB_MACHINE_EFI
|
|
|
|
|
+#include <grub/efi/efi.h>
|
|
|
|
|
+#endif
|
|
|
|
|
+
|
2012-10-23 14:45:04 +00:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#pragma GCC diagnostic ignored "-Wcast-align"
|
2016-08-25 18:42:57 +00:00
|
|
|
|
@@ -686,6 +695,19 @@ grub_dl_load_file (const char *filename)
|
2012-10-23 14:45:04 +00:00
|
|
|
|
void *core = 0;
|
|
|
|
|
grub_dl_t mod = 0;
|
2012-08-14 19:53:38 +00:00
|
|
|
|
|
|
|
|
|
+#ifdef GRUB_MACHINE_EFI
|
2012-10-23 14:45:04 +00:00
|
|
|
|
+ if (grub_efi_secure_boot ())
|
|
|
|
|
+ {
|
|
|
|
|
+#if 0
|
|
|
|
|
+ /* This is an error, but grub2-mkconfig still generates a pile of
|
|
|
|
|
+ * insmod commands, so emitting it would be mostly just obnoxious. */
|
|
|
|
|
+ grub_error (GRUB_ERR_ACCESS_DENIED,
|
|
|
|
|
+ "Secure Boot forbids loading module from %s", filename);
|
|
|
|
|
+#endif
|
|
|
|
|
+ return 0;
|
|
|
|
|
+ }
|
2012-08-14 19:53:38 +00:00
|
|
|
|
+#endif
|
|
|
|
|
+
|
2014-01-06 16:39:16 +00:00
|
|
|
|
grub_boot_time ("Loading module %s", filename);
|
|
|
|
|
|
2012-10-23 14:45:04 +00:00
|
|
|
|
file = grub_file_open (filename);
|
2012-08-14 19:53:38 +00:00
|
|
|
|
diff --git a/grub-core/kern/efi/efi.c b/grub-core/kern/efi/efi.c
|
2018-02-27 18:56:41 +00:00
|
|
|
|
index 684ca93f8f4..2588b481e76 100644
|
2012-08-14 19:53:38 +00:00
|
|
|
|
--- a/grub-core/kern/efi/efi.c
|
|
|
|
|
+++ b/grub-core/kern/efi/efi.c
|
2018-01-17 22:04:09 +00:00
|
|
|
|
@@ -269,6 +269,34 @@ grub_efi_get_variable (const char *var, const grub_efi_guid_t *guid,
|
2013-05-02 20:54:52 +00:00
|
|
|
|
return NULL;
|
2012-08-14 19:53:38 +00:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
+grub_efi_boolean_t
|
|
|
|
|
+grub_efi_secure_boot (void)
|
|
|
|
|
+{
|
|
|
|
|
+ grub_efi_guid_t efi_var_guid = GRUB_EFI_GLOBAL_VARIABLE_GUID;
|
|
|
|
|
+ grub_size_t datasize;
|
|
|
|
|
+ char *secure_boot = NULL;
|
|
|
|
|
+ char *setup_mode = NULL;
|
|
|
|
|
+ grub_efi_boolean_t ret = 0;
|
|
|
|
|
+
|
|
|
|
|
+ secure_boot = grub_efi_get_variable("SecureBoot", &efi_var_guid, &datasize);
|
|
|
|
|
+
|
|
|
|
|
+ if (datasize != 1 || !secure_boot)
|
|
|
|
|
+ goto out;
|
|
|
|
|
+
|
|
|
|
|
+ setup_mode = grub_efi_get_variable("SetupMode", &efi_var_guid, &datasize);
|
|
|
|
|
+
|
|
|
|
|
+ if (datasize != 1 || !setup_mode)
|
|
|
|
|
+ goto out;
|
|
|
|
|
+
|
|
|
|
|
+ if (*secure_boot && !*setup_mode)
|
|
|
|
|
+ ret = 1;
|
|
|
|
|
+
|
|
|
|
|
+ out:
|
|
|
|
|
+ grub_free (secure_boot);
|
|
|
|
|
+ grub_free (setup_mode);
|
|
|
|
|
+ return ret;
|
|
|
|
|
+}
|
|
|
|
|
+
|
|
|
|
|
#pragma GCC diagnostic ignored "-Wcast-align"
|
|
|
|
|
|
|
|
|
|
/* Search the mods section from the PE32/PE32+ image. This code uses
|
|
|
|
|
diff --git a/include/grub/efi/efi.h b/include/grub/efi/efi.h
|
2018-02-27 18:56:41 +00:00
|
|
|
|
index 91e29ce66f1..bb3ab7dfdeb 100644
|
2012-08-14 19:53:38 +00:00
|
|
|
|
--- a/include/grub/efi/efi.h
|
|
|
|
|
+++ b/include/grub/efi/efi.h
|
2018-01-17 22:04:09 +00:00
|
|
|
|
@@ -83,6 +83,7 @@ EXPORT_FUNC (grub_efi_set_variable) (const char *var,
|
2012-08-15 13:58:04 +00:00
|
|
|
|
const grub_efi_guid_t *guid,
|
|
|
|
|
void *data,
|
|
|
|
|
grub_size_t datasize);
|
2012-08-14 19:53:38 +00:00
|
|
|
|
+grub_efi_boolean_t EXPORT_FUNC (grub_efi_secure_boot) (void);
|
|
|
|
|
int
|
|
|
|
|
EXPORT_FUNC (grub_efi_compare_device_paths) (const grub_efi_device_path_t *dp1,
|
|
|
|
|
const grub_efi_device_path_t *dp2);
|
2012-08-15 13:58:04 +00:00
|
|
|
|
--
|
2018-06-04 16:28:07 +00:00
|
|
|
|
2.17.1
|
2012-08-15 13:58:04 +00:00
|
|
|
|
|