f0f4ff2
From 57c0dbcbafaa724313c672830ff0087f56a84c47 Mon Sep 17 00:00:00 2001
306dfcc
From: Matthew Garrett <mjg@redhat.com>
f0f4ff2
Date: Thu, 20 Sep 2012 10:40:56 -0400
f0f4ff2
Subject: [PATCH 01/14] Secure boot: Add new capability
306dfcc
306dfcc
Secure boot adds certain policy requirements, including that root must not
306dfcc
be able to do anything that could cause the kernel to execute arbitrary code.
306dfcc
The simplest way to handle this would seem to be to add a new capability
306dfcc
and gate various functionality on that. We'll then strip it from the initial
306dfcc
capability set if required.
306dfcc
306dfcc
Signed-off-by: Matthew Garrett <mjg@redhat.com>
306dfcc
---
be7ac52
 include/uapi/linux/capability.h | 6 +++++-
306dfcc
 1 file changed, 5 insertions(+), 1 deletion(-)
306dfcc
306dfcc
diff --git a/include/linux/capability.h b/include/linux/capability.h
f0f4ff2
index d10b7ed..4345bc8 100644
be7ac52
--- a/include/uapi/linux/capability.h
be7ac52
+++ b/include/uapi/linux/capability.h
306dfcc
@@ -364,7 +364,11 @@ struct cpu_vfs_cap_data {
306dfcc
 
306dfcc
 #define CAP_BLOCK_SUSPEND    36
306dfcc
 
306dfcc
-#define CAP_LAST_CAP         CAP_BLOCK_SUSPEND
f0f4ff2
+/* Allow things that trivially permit root to modify the running kernel */
306dfcc
+
f0f4ff2
+#define CAP_COMPROMISE_KERNEL  37
306dfcc
+
f0f4ff2
+#define CAP_LAST_CAP         CAP_COMPROMISE_KERNEL
306dfcc
 
306dfcc
 #define cap_valid(x) ((x) >= 0 && (x) <= CAP_LAST_CAP)
306dfcc
 
306dfcc
-- 
f0f4ff2
1.7.11.4
306dfcc
306dfcc
f0f4ff2
From 95fd8148be46036e20fc64c480104d2a2b454e27 Mon Sep 17 00:00:00 2001
306dfcc
From: Matthew Garrett <mjg@redhat.com>
f0f4ff2
Date: Thu, 20 Sep 2012 10:40:57 -0400
f0f4ff2
Subject: [PATCH 02/14] PCI: Lock down BAR access in secure boot environments
306dfcc
306dfcc
Any hardware that can potentially generate DMA has to be locked down from
306dfcc
userspace in order to avoid it being possible for an attacker to cause
306dfcc
arbitrary kernel behaviour. Default to paranoid - in future we can
306dfcc
potentially relax this for sufficiently IOMMU-isolated devices.
306dfcc
306dfcc
Signed-off-by: Matthew Garrett <mjg@redhat.com>
306dfcc
---
306dfcc
 drivers/pci/pci-sysfs.c | 9 +++++++++
306dfcc
 drivers/pci/proc.c      | 8 +++++++-
306dfcc
 drivers/pci/syscall.c   | 2 +-
306dfcc
 3 files changed, 17 insertions(+), 2 deletions(-)
306dfcc
306dfcc
diff --git a/drivers/pci/pci-sysfs.c b/drivers/pci/pci-sysfs.c
f0f4ff2
index 6869009..c03fb85 100644
306dfcc
--- a/drivers/pci/pci-sysfs.c
306dfcc
+++ b/drivers/pci/pci-sysfs.c
c115215
@@ -542,6 +542,9 @@ pci_write_config(struct file* filp, struct kobject *kobj,
306dfcc
 	loff_t init_off = off;
306dfcc
 	u8 *data = (u8*) buf;
306dfcc
 
f0f4ff2
+	if (!capable(CAP_COMPROMISE_KERNEL))
306dfcc
+		return -EPERM;
306dfcc
+
306dfcc
 	if (off > dev->cfg_size)
306dfcc
 		return 0;
306dfcc
 	if (off + count > dev->cfg_size) {
c115215
@@ -844,6 +847,9 @@ pci_mmap_resource(struct kobject *kobj, struct bin_attribute *attr,
306dfcc
 	resource_size_t start, end;
306dfcc
 	int i;
306dfcc
 
f0f4ff2
+	if (!capable(CAP_COMPROMISE_KERNEL))
306dfcc
+		return -EPERM;
306dfcc
+
306dfcc
 	for (i = 0; i < PCI_ROM_RESOURCE; i++)
306dfcc
 		if (res == &pdev->resource[i])
306dfcc
 			break;
c115215
@@ -951,6 +957,9 @@ pci_write_resource_io(struct file *filp, struct kobject *kobj,
306dfcc
 		      struct bin_attribute *attr, char *buf,
306dfcc
 		      loff_t off, size_t count)
306dfcc
 {
f0f4ff2
+	if (!capable(CAP_COMPROMISE_KERNEL))
306dfcc
+		return -EPERM;
306dfcc
+
306dfcc
 	return pci_resource_io(filp, kobj, attr, buf, off, count, true);
306dfcc
 }
306dfcc
 
306dfcc
diff --git a/drivers/pci/proc.c b/drivers/pci/proc.c
f0f4ff2
index 27911b5..ac8c9a5 100644
306dfcc
--- a/drivers/pci/proc.c
306dfcc
+++ b/drivers/pci/proc.c
306dfcc
@@ -135,6 +135,9 @@ proc_bus_pci_write(struct file *file, const char __user *buf, size_t nbytes, lof
306dfcc
 	int size = dp->size;
306dfcc
 	int cnt;
306dfcc
 
f0f4ff2
+	if (!capable(CAP_COMPROMISE_KERNEL))
306dfcc
+		return -EPERM;
306dfcc
+
306dfcc
 	if (pos >= size)
306dfcc
 		return 0;
306dfcc
 	if (nbytes >= size)
306dfcc
@@ -211,6 +214,9 @@ static long proc_bus_pci_ioctl(struct file *file, unsigned int cmd,
306dfcc
 #endif /* HAVE_PCI_MMAP */
306dfcc
 	int ret = 0;
306dfcc
 
f0f4ff2
+	if (!capable(CAP_COMPROMISE_KERNEL))
306dfcc
+		return -EPERM;
306dfcc
+
306dfcc
 	switch (cmd) {
306dfcc
 	case PCIIOC_CONTROLLER:
306dfcc
 		ret = pci_domain_nr(dev->bus);
306dfcc
@@ -251,7 +257,7 @@ static int proc_bus_pci_mmap(struct file *file, struct vm_area_struct *vma)
306dfcc
 	struct pci_filp_private *fpriv = file->private_data;
306dfcc
 	int i, ret;
306dfcc
 
306dfcc
-	if (!capable(CAP_SYS_RAWIO))
f0f4ff2
+	if (!capable(CAP_SYS_RAWIO) || !capable(CAP_COMPROMISE_KERNEL))
306dfcc
 		return -EPERM;
306dfcc
 
306dfcc
 	/* Make sure the caller is mapping a real resource for this device */
306dfcc
diff --git a/drivers/pci/syscall.c b/drivers/pci/syscall.c
f0f4ff2
index e1c1ec5..97e785f 100644
306dfcc
--- a/drivers/pci/syscall.c
306dfcc
+++ b/drivers/pci/syscall.c
306dfcc
@@ -92,7 +92,7 @@ SYSCALL_DEFINE5(pciconfig_write, unsigned long, bus, unsigned long, dfn,
306dfcc
 	u32 dword;
306dfcc
 	int err = 0;
306dfcc
 
306dfcc
-	if (!capable(CAP_SYS_ADMIN))
f0f4ff2
+	if (!capable(CAP_SYS_ADMIN) || !capable(CAP_COMPROMISE_KERNEL))
306dfcc
 		return -EPERM;
306dfcc
 
306dfcc
 	dev = pci_get_bus_and_slot(bus, dfn);
306dfcc
-- 
f0f4ff2
1.7.11.4
306dfcc
306dfcc
f0f4ff2
From 2d23d2726583d79062e58abcc32c7dd027d312aa Mon Sep 17 00:00:00 2001
306dfcc
From: Matthew Garrett <mjg@redhat.com>
f0f4ff2
Date: Thu, 20 Sep 2012 10:40:58 -0400
f0f4ff2
Subject: [PATCH 03/14] x86: Lock down IO port access in secure boot
306dfcc
 environments
306dfcc
306dfcc
IO port access would permit users to gain access to PCI configuration
306dfcc
registers, which in turn (on a lot of hardware) give access to MMIO register
306dfcc
space. This would potentially permit root to trigger arbitrary DMA, so lock
306dfcc
it down by default.
306dfcc
306dfcc
Signed-off-by: Matthew Garrett <mjg@redhat.com>
306dfcc
---
306dfcc
 arch/x86/kernel/ioport.c | 4 ++--
306dfcc
 drivers/char/mem.c       | 3 +++
306dfcc
 2 files changed, 5 insertions(+), 2 deletions(-)
306dfcc
306dfcc
diff --git a/arch/x86/kernel/ioport.c b/arch/x86/kernel/ioport.c
f0f4ff2
index 8c96897..a2578c4 100644
306dfcc
--- a/arch/x86/kernel/ioport.c
306dfcc
+++ b/arch/x86/kernel/ioport.c
306dfcc
@@ -28,7 +28,7 @@ asmlinkage long sys_ioperm(unsigned long from, unsigned long num, int turn_on)
306dfcc
 
306dfcc
 	if ((from + num <= from) || (from + num > IO_BITMAP_BITS))
306dfcc
 		return -EINVAL;
306dfcc
-	if (turn_on && !capable(CAP_SYS_RAWIO))
f0f4ff2
+	if (turn_on && (!capable(CAP_SYS_RAWIO) || !capable(CAP_COMPROMISE_KERNEL)))
306dfcc
 		return -EPERM;
306dfcc
 
306dfcc
 	/*
306dfcc
@@ -102,7 +102,7 @@ long sys_iopl(unsigned int level, struct pt_regs *regs)
306dfcc
 		return -EINVAL;
306dfcc
 	/* Trying to gain more privileges? */
306dfcc
 	if (level > old) {
306dfcc
-		if (!capable(CAP_SYS_RAWIO))
f0f4ff2
+		if (!capable(CAP_SYS_RAWIO) || !capable(CAP_COMPROMISE_KERNEL))
306dfcc
 			return -EPERM;
306dfcc
 	}
306dfcc
 	regs->flags = (regs->flags & ~X86_EFLAGS_IOPL) | (level << 12);
306dfcc
diff --git a/drivers/char/mem.c b/drivers/char/mem.c
f0f4ff2
index e5eedfa..1e0a660 100644
306dfcc
--- a/drivers/char/mem.c
306dfcc
+++ b/drivers/char/mem.c
306dfcc
@@ -597,6 +597,9 @@ static ssize_t write_port(struct file *file, const char __user *buf,
306dfcc
 	unsigned long i = *ppos;
306dfcc
 	const char __user * tmp = buf;
306dfcc
 
f0f4ff2
+	if (!capable(CAP_COMPROMISE_KERNEL))
306dfcc
+		return -EPERM;
306dfcc
+
306dfcc
 	if (!access_ok(VERIFY_READ, buf, count))
306dfcc
 		return -EFAULT;
306dfcc
 	while (count-- > 0 && i < 65536) {
306dfcc
-- 
f0f4ff2
1.7.11.4
306dfcc
306dfcc
f0f4ff2
From e063cb2f3a667d2540682d4bdbef91fdb23b1a84 Mon Sep 17 00:00:00 2001
306dfcc
From: Matthew Garrett <mjg@redhat.com>
f0f4ff2
Date: Thu, 20 Sep 2012 10:40:59 -0400
f0f4ff2
Subject: [PATCH 04/14] ACPI: Limit access to custom_method
306dfcc
306dfcc
It must be impossible for even root to get code executed in kernel context
306dfcc
under a secure boot environment. custom_method effectively allows arbitrary
306dfcc
access to system memory, so it needs to have a capability check here.
306dfcc
306dfcc
Signed-off-by: Matthew Garrett <mjg@redhat.com>
306dfcc
---
306dfcc
 drivers/acpi/custom_method.c | 3 +++
306dfcc
 1 file changed, 3 insertions(+)
306dfcc
306dfcc
diff --git a/drivers/acpi/custom_method.c b/drivers/acpi/custom_method.c
f0f4ff2
index 5d42c24..247d58b 100644
306dfcc
--- a/drivers/acpi/custom_method.c
306dfcc
+++ b/drivers/acpi/custom_method.c
306dfcc
@@ -29,6 +29,9 @@ static ssize_t cm_write(struct file *file, const char __user * user_buf,
306dfcc
 	struct acpi_table_header table;
306dfcc
 	acpi_status status;
306dfcc
 
f0f4ff2
+	if (!capable(CAP_COMPROMISE_KERNEL))
306dfcc
+		return -EPERM;
306dfcc
+
306dfcc
 	if (!(*ppos)) {
306dfcc
 		/* parse the table header to get the table length */
306dfcc
 		if (count <= sizeof(struct acpi_table_header))
306dfcc
-- 
f0f4ff2
1.7.11.4
306dfcc
306dfcc
f0f4ff2
From a1cccbd084c7355dcb2be7ae2934f168ce9ba9d5 Mon Sep 17 00:00:00 2001
306dfcc
From: Matthew Garrett <mjg@redhat.com>
f0f4ff2
Date: Thu, 20 Sep 2012 10:41:00 -0400
f0f4ff2
Subject: [PATCH 05/14] asus-wmi: Restrict debugfs interface
306dfcc
306dfcc
We have no way of validating what all of the Asus WMI methods do on a
306dfcc
given machine, and there's a risk that some will allow hardware state to
306dfcc
be manipulated in such a way that arbitrary code can be executed in the
306dfcc
kernel. Add a capability check to prevent that.
306dfcc
306dfcc
Signed-off-by: Matthew Garrett <mjg@redhat.com>
306dfcc
---
306dfcc
 drivers/platform/x86/asus-wmi.c | 9 +++++++++
306dfcc
 1 file changed, 9 insertions(+)
306dfcc
306dfcc
diff --git a/drivers/platform/x86/asus-wmi.c b/drivers/platform/x86/asus-wmi.c
f0f4ff2
index 2eb9fe8..61e055d 100644
306dfcc
--- a/drivers/platform/x86/asus-wmi.c
306dfcc
+++ b/drivers/platform/x86/asus-wmi.c
f0f4ff2
@@ -1523,6 +1523,9 @@ static int show_dsts(struct seq_file *m, void *data)
306dfcc
 	int err;
306dfcc
 	u32 retval = -1;
306dfcc
 
f0f4ff2
+	if (!capable(CAP_COMPROMISE_KERNEL))
306dfcc
+		return -EPERM;
306dfcc
+
306dfcc
 	err = asus_wmi_get_devstate(asus, asus->debug.dev_id, &retval);
306dfcc
 
306dfcc
 	if (err < 0)
f0f4ff2
@@ -1539,6 +1542,9 @@ static int show_devs(struct seq_file *m, void *data)
306dfcc
 	int err;
306dfcc
 	u32 retval = -1;
306dfcc
 
f0f4ff2
+	if (!capable(CAP_COMPROMISE_KERNEL))
306dfcc
+		return -EPERM;
306dfcc
+
306dfcc
 	err = asus_wmi_set_devstate(asus->debug.dev_id, asus->debug.ctrl_param,
306dfcc
 				    &retval);
306dfcc
 
f0f4ff2
@@ -1563,6 +1569,9 @@ static int show_call(struct seq_file *m, void *data)
306dfcc
 	union acpi_object *obj;
306dfcc
 	acpi_status status;
306dfcc
 
f0f4ff2
+	if (!capable(CAP_COMPROMISE_KERNEL))
306dfcc
+		return -EPERM;
306dfcc
+
306dfcc
 	status = wmi_evaluate_method(ASUS_WMI_MGMT_GUID,
306dfcc
 				     1, asus->debug.method_id,
306dfcc
 				     &input, &output);
306dfcc
-- 
f0f4ff2
1.7.11.4
306dfcc
306dfcc
f0f4ff2
From 1c9e53b626268f82509062751eda14e8572717cf Mon Sep 17 00:00:00 2001
306dfcc
From: Matthew Garrett <mjg@redhat.com>
f0f4ff2
Date: Thu, 20 Sep 2012 10:41:01 -0400
f0f4ff2
Subject: [PATCH 06/14] Restrict /dev/mem and /dev/kmem in secure boot setups
306dfcc
306dfcc
Allowing users to write to address space makes it possible for the kernel
306dfcc
to be subverted. Restrict this when we need to protect the kernel.
306dfcc
306dfcc
Signed-off-by: Matthew Garrett <mjg@redhat.com>
306dfcc
---
306dfcc
 drivers/char/mem.c | 6 ++++++
306dfcc
 1 file changed, 6 insertions(+)
306dfcc
306dfcc
diff --git a/drivers/char/mem.c b/drivers/char/mem.c
f0f4ff2
index 1e0a660..33eb947 100644
306dfcc
--- a/drivers/char/mem.c
306dfcc
+++ b/drivers/char/mem.c
306dfcc
@@ -158,6 +158,9 @@ static ssize_t write_mem(struct file *file, const char __user *buf,
306dfcc
 	unsigned long copied;
306dfcc
 	void *ptr;
306dfcc
 
f0f4ff2
+	if (!capable(CAP_COMPROMISE_KERNEL))
306dfcc
+		return -EPERM;
306dfcc
+
306dfcc
 	if (!valid_phys_addr_range(p, count))
306dfcc
 		return -EFAULT;
306dfcc
 
306dfcc
@@ -530,6 +533,9 @@ static ssize_t write_kmem(struct file *file, const char __user *buf,
306dfcc
 	char * kbuf; /* k-addr because vwrite() takes vmlist_lock rwlock */
306dfcc
 	int err = 0;
306dfcc
 
f0f4ff2
+	if (!capable(CAP_COMPROMISE_KERNEL))
306dfcc
+		return -EPERM;
306dfcc
+
306dfcc
 	if (p < (unsigned long) high_memory) {
306dfcc
 		unsigned long to_write = min_t(unsigned long, count,
306dfcc
 					       (unsigned long)high_memory - p);
306dfcc
-- 
f0f4ff2
1.7.11.4
306dfcc
306dfcc
f0f4ff2
From fbf919bf372b9a7a08bdacac8129d47ced1b1f19 Mon Sep 17 00:00:00 2001
306dfcc
From: Josh Boyer <jwboyer@redhat.com>
f0f4ff2
Date: Thu, 20 Sep 2012 10:41:02 -0400
f0f4ff2
Subject: [PATCH 07/14] Secure boot: Add a dummy kernel parameter that will
306dfcc
 switch on Secure Boot mode
306dfcc
f0f4ff2
This forcibly drops CAP_COMPROMISE_KERNEL from both cap_permitted and cap_bset
306dfcc
in the init_cred struct, which everything else inherits from.  This works on
306dfcc
any machine and can be used to develop even if the box doesn't have UEFI.
306dfcc
306dfcc
Signed-off-by: Josh Boyer <jwboyer@redhat.com>
306dfcc
---
f0f4ff2
 Documentation/kernel-parameters.txt |  7 +++++++
f0f4ff2
 kernel/cred.c                       | 17 +++++++++++++++++
f0f4ff2
 2 files changed, 24 insertions(+)
306dfcc
f0f4ff2
diff --git a/Documentation/kernel-parameters.txt b/Documentation/kernel-parameters.txt
f0f4ff2
index 9b2b8d3..93978d5 100644
f0f4ff2
--- a/Documentation/kernel-parameters.txt
f0f4ff2
+++ b/Documentation/kernel-parameters.txt
f0f4ff2
@@ -2562,6 +2562,13 @@ bytes respectively. Such letter suffixes can also be entirely omitted.
f0f4ff2
 			Note: increases power consumption, thus should only be
f0f4ff2
 			enabled if running jitter sensitive (HPC/RT) workloads.
f0f4ff2
 
f0f4ff2
+	secureboot_enable=
f0f4ff2
+			[KNL] Enables an emulated UEFI Secure Boot mode.  This
f0f4ff2
+			locks down various aspects of the kernel guarded by the
f0f4ff2
+			CAP_COMPROMISE_KERNEL capability.  This includes things
f0f4ff2
+			like /dev/mem, IO port access, and other areas.  It can
f0f4ff2
+			be used on non-UEFI machines for testing purposes.
f0f4ff2
+
f0f4ff2
 	security=	[SECURITY] Choose a security module to enable at boot.
f0f4ff2
 			If this boot parameter is not specified, only the first
f0f4ff2
 			security module asking for security registration will be
306dfcc
diff --git a/kernel/cred.c b/kernel/cred.c
f0f4ff2
index de728ac..7e6e83f 100644
306dfcc
--- a/kernel/cred.c
306dfcc
+++ b/kernel/cred.c
f0f4ff2
@@ -623,6 +623,23 @@ void __init cred_init(void)
306dfcc
 				     0, SLAB_HWCACHE_ALIGN|SLAB_PANIC, NULL);
306dfcc
 }
306dfcc
 
f0f4ff2
+void __init secureboot_enable()
306dfcc
+{
f0f4ff2
+	pr_info("Secure boot enabled\n");
f0f4ff2
+	cap_lower((&init_cred)->cap_bset, CAP_COMPROMISE_KERNEL);
f0f4ff2
+	cap_lower((&init_cred)->cap_permitted, CAP_COMPROMISE_KERNEL);
f0f4ff2
+}
306dfcc
+
f0f4ff2
+/* Dummy Secure Boot enable option to fake out UEFI SB=1 */
f0f4ff2
+static int __init secureboot_enable_opt(char *str)
f0f4ff2
+{
306dfcc
+	int sb_enable = !!simple_strtol(str, NULL, 0);
f0f4ff2
+	if (sb_enable)
f0f4ff2
+		secureboot_enable();
306dfcc
+	return 1;
306dfcc
+}
f0f4ff2
+__setup("secureboot_enable=", secureboot_enable_opt);
306dfcc
+
306dfcc
 /**
306dfcc
  * prepare_kernel_cred - Prepare a set of credentials for a kernel service
306dfcc
  * @daemon: A userspace daemon to be used as a reference
306dfcc
-- 
f0f4ff2
1.7.11.4
306dfcc
306dfcc
f0f4ff2
From 43ed7865d867ae692e30227d66fa58cdecbd9269 Mon Sep 17 00:00:00 2001
306dfcc
From: Matthew Garrett <mjg@redhat.com>
f0f4ff2
Date: Thu, 20 Sep 2012 10:41:03 -0400
f0f4ff2
Subject: [PATCH 08/14] efi: Enable secure boot lockdown automatically when
306dfcc
 enabled in firmware
306dfcc
306dfcc
The firmware has a set of flags that indicate whether secure boot is enabled
306dfcc
and enforcing. Use them to indicate whether the kernel should lock itself
306dfcc
down.
306dfcc
306dfcc
Signed-off-by: Matthew Garrett <mjg@redhat.com>
306dfcc
---
f0f4ff2
 Documentation/x86/zero-page.txt  |  2 ++
306dfcc
 arch/x86/boot/compressed/eboot.c | 32 ++++++++++++++++++++++++++++++++
306dfcc
 arch/x86/include/asm/bootparam.h |  3 ++-
306dfcc
 arch/x86/kernel/setup.c          |  3 +++
306dfcc
 include/linux/cred.h             |  2 ++
f0f4ff2
 5 files changed, 41 insertions(+), 1 deletion(-)
f0f4ff2
f0f4ff2
diff --git a/Documentation/x86/zero-page.txt b/Documentation/x86/zero-page.txt
f0f4ff2
index cf5437d..7f9ed48 100644
f0f4ff2
--- a/Documentation/x86/zero-page.txt
f0f4ff2
+++ b/Documentation/x86/zero-page.txt
f0f4ff2
@@ -27,6 +27,8 @@ Offset	Proto	Name		Meaning
f0f4ff2
 1E9/001	ALL	eddbuf_entries	Number of entries in eddbuf (below)
f0f4ff2
 1EA/001	ALL	edd_mbr_sig_buf_entries	Number of entries in edd_mbr_sig_buffer
f0f4ff2
 				(below)
f0f4ff2
+1EB/001	ALL	kbd_status	Numlock is enabled
f0f4ff2
+1EC/001	ALL	secure_boot	Kernel should enable secure boot lockdowns
f0f4ff2
 290/040	ALL	edd_mbr_sig_buffer EDD MBR signatures
f0f4ff2
 2D0/A00	ALL	e820_map	E820 memory map table
f0f4ff2
 				(array of struct e820entry)
306dfcc
diff --git a/arch/x86/boot/compressed/eboot.c b/arch/x86/boot/compressed/eboot.c
306dfcc
index b3e0227..3789356 100644
306dfcc
--- a/arch/x86/boot/compressed/eboot.c
306dfcc
+++ b/arch/x86/boot/compressed/eboot.c
306dfcc
@@ -724,6 +724,36 @@ fail:
306dfcc
 	return status;
306dfcc
 }
306dfcc
 
306dfcc
+static int get_secure_boot(efi_system_table_t *_table)
306dfcc
+{
306dfcc
+	u8 sb, setup;
306dfcc
+	unsigned long datasize = sizeof(sb);
306dfcc
+	efi_guid_t var_guid = EFI_GLOBAL_VARIABLE_GUID;
306dfcc
+	efi_status_t status;
306dfcc
+
306dfcc
+	status = efi_call_phys5(sys_table->runtime->get_variable,
306dfcc
+				L"SecureBoot", &var_guid, NULL, &datasize, &sb);
306dfcc
+
306dfcc
+	if (status != EFI_SUCCESS)
306dfcc
+		return 0;
306dfcc
+
306dfcc
+	if (sb == 0)
306dfcc
+		return 0;
306dfcc
+
306dfcc
+
306dfcc
+	status = efi_call_phys5(sys_table->runtime->get_variable,
306dfcc
+				L"SetupMode", &var_guid, NULL, &datasize,
306dfcc
+				&setup);
306dfcc
+
306dfcc
+	if (status != EFI_SUCCESS)
306dfcc
+		return 0;
306dfcc
+
306dfcc
+	if (setup == 1)
306dfcc
+		return 0;
306dfcc
+
306dfcc
+	return 1;
306dfcc
+}
306dfcc
+
306dfcc
 /*
306dfcc
  * Because the x86 boot code expects to be passed a boot_params we
306dfcc
  * need to create one ourselves (usually the bootloader would create
306dfcc
@@ -1018,6 +1048,8 @@ struct boot_params *efi_main(void *handle, efi_system_table_t *_table,
306dfcc
 	if (sys_table->hdr.signature != EFI_SYSTEM_TABLE_SIGNATURE)
306dfcc
 		goto fail;
306dfcc
 
306dfcc
+	boot_params->secure_boot = get_secure_boot(sys_table);
306dfcc
+
306dfcc
 	setup_graphics(boot_params);
306dfcc
 
306dfcc
 	status = efi_call_phys3(sys_table->boottime->allocate_pool,
306dfcc
diff --git a/arch/x86/include/asm/bootparam.h b/arch/x86/include/asm/bootparam.h
306dfcc
index 2ad874c..c7338e0 100644
306dfcc
--- a/arch/x86/include/asm/bootparam.h
306dfcc
+++ b/arch/x86/include/asm/bootparam.h
306dfcc
@@ -114,7 +114,8 @@ struct boot_params {
306dfcc
 	__u8  eddbuf_entries;				/* 0x1e9 */
306dfcc
 	__u8  edd_mbr_sig_buf_entries;			/* 0x1ea */
306dfcc
 	__u8  kbd_status;				/* 0x1eb */
306dfcc
-	__u8  _pad6[5];					/* 0x1ec */
306dfcc
+	__u8  secure_boot;				/* 0x1ec */
306dfcc
+	__u8  _pad6[4];					/* 0x1ed */
306dfcc
 	struct setup_header hdr;    /* setup header */	/* 0x1f1 */
306dfcc
 	__u8  _pad7[0x290-0x1f1-sizeof(struct setup_header)];
306dfcc
 	__u32 edd_mbr_sig_buffer[EDD_MBR_SIG_MAX];	/* 0x290 */
306dfcc
diff --git a/arch/x86/kernel/setup.c b/arch/x86/kernel/setup.c
306dfcc
index f4b9b80..239bf2a 100644
306dfcc
--- a/arch/x86/kernel/setup.c
306dfcc
+++ b/arch/x86/kernel/setup.c
306dfcc
@@ -947,6 +947,9 @@ void __init setup_arch(char **cmdline_p)
306dfcc
 
306dfcc
 	io_delay_init();
306dfcc
 
306dfcc
+	if (boot_params.secure_boot)
306dfcc
+		secureboot_enable();
306dfcc
+
306dfcc
 	/*
306dfcc
 	 * Parse the ACPI tables for possible boot-time SMP configuration.
306dfcc
 	 */
306dfcc
diff --git a/include/linux/cred.h b/include/linux/cred.h
306dfcc
index ebbed2c..a24faf1 100644
306dfcc
--- a/include/linux/cred.h
306dfcc
+++ b/include/linux/cred.h
306dfcc
@@ -170,6 +170,8 @@ extern int set_security_override_from_ctx(struct cred *, const char *);
306dfcc
 extern int set_create_files_as(struct cred *, struct inode *);
306dfcc
 extern void __init cred_init(void);
306dfcc
 
306dfcc
+extern void secureboot_enable(void);
306dfcc
+
306dfcc
 /*
306dfcc
  * check for validity of credentials
306dfcc
  */
306dfcc
-- 
f0f4ff2
1.7.11.4
306dfcc
306dfcc
f0f4ff2
From 3acf1ceb5f6f3be9103c9da16ddc24afc6d8b02a Mon Sep 17 00:00:00 2001
306dfcc
From: Josh Boyer <jwboyer@redhat.com>
f0f4ff2
Date: Thu, 20 Sep 2012 10:41:04 -0400
f0f4ff2
Subject: [PATCH 09/14] acpi: Ignore acpi_rsdp kernel parameter in a secure
306dfcc
 boot environment
306dfcc
306dfcc
This option allows userspace to pass the RSDP address to the kernel.  This
306dfcc
could potentially be used to circumvent the secure boot trust model.
f0f4ff2
We ignore the setting if we don't have the CAP_COMPROMISE_KERNEL capability.
306dfcc
306dfcc
Signed-off-by: Josh Boyer <jwboyer@redhat.com>
306dfcc
---
306dfcc
 drivers/acpi/osl.c | 2 +-
306dfcc
 1 file changed, 1 insertion(+), 1 deletion(-)
306dfcc
306dfcc
diff --git a/drivers/acpi/osl.c b/drivers/acpi/osl.c
f0f4ff2
index 9eaf708..f94341b 100644
306dfcc
--- a/drivers/acpi/osl.c
306dfcc
+++ b/drivers/acpi/osl.c
306dfcc
@@ -246,7 +246,7 @@ early_param("acpi_rsdp", setup_acpi_rsdp);
306dfcc
 acpi_physical_address __init acpi_os_get_root_pointer(void)
306dfcc
 {
306dfcc
 #ifdef CONFIG_KEXEC
306dfcc
-	if (acpi_rsdp)
f0f4ff2
+	if (acpi_rsdp && capable(CAP_COMPROMISE_KERNEL))
306dfcc
 		return acpi_rsdp;
306dfcc
 #endif
306dfcc
 
306dfcc
-- 
f0f4ff2
1.7.11.4
f0f4ff2
f0f4ff2
f0f4ff2
From 03fb06d272ddc1062e610521c5cfdbe42f251209 Mon Sep 17 00:00:00 2001
f0f4ff2
From: Josh Boyer <jwboyer@redhat.com>
f0f4ff2
Date: Thu, 20 Sep 2012 10:41:05 -0400
f0f4ff2
Subject: [PATCH 10/14] SELinux: define mapping for new Secure Boot capability
f0f4ff2
f0f4ff2
Add the name of the new Secure Boot capability.  This allows SELinux
f0f4ff2
policies to properly map CAP_COMPROMISE_KERNEL to the appropriate
f0f4ff2
capability class.
f0f4ff2
f0f4ff2
Signed-off-by: Josh Boyer <jwboyer@redhat.com>
f0f4ff2
---
f0f4ff2
 security/selinux/include/classmap.h | 4 ++--
f0f4ff2
 1 file changed, 2 insertions(+), 2 deletions(-)
f0f4ff2
f0f4ff2
diff --git a/security/selinux/include/classmap.h b/security/selinux/include/classmap.h
f0f4ff2
index df2de54..70e2834 100644
f0f4ff2
--- a/security/selinux/include/classmap.h
f0f4ff2
+++ b/security/selinux/include/classmap.h
f0f4ff2
@@ -146,8 +146,8 @@ struct security_class_mapping secclass_map[] = {
f0f4ff2
 	{ "memprotect", { "mmap_zero", NULL } },
f0f4ff2
 	{ "peer", { "recv", NULL } },
f0f4ff2
 	{ "capability2",
f0f4ff2
-	  { "mac_override", "mac_admin", "syslog", "wake_alarm", "block_suspend",
f0f4ff2
-	    NULL } },
f0f4ff2
+	  { "mac_override", "mac_admin", "syslog", "wake_alarm",
f0f4ff2
+	    "block_suspend", "compromise_kernel", NULL } },
f0f4ff2
 	{ "kernel_service", { "use_as_override", "create_files_as", NULL } },
f0f4ff2
 	{ "tun_socket",
f0f4ff2
 	  { COMMON_SOCK_PERMS, NULL } },
f0f4ff2
-- 
f0f4ff2
1.7.11.4
f0f4ff2
f0f4ff2
f0f4ff2
From 0cfaa5ecf01f8eaaa2a84d88b7258a94ac9a1bfe Mon Sep 17 00:00:00 2001
f0f4ff2
From: Matthew Garrett <mjg@redhat.com>
f0f4ff2
Date: Tue, 4 Sep 2012 11:55:13 -0400
f0f4ff2
Subject: [PATCH 11/14] kexec: Disable in a secure boot environment
f0f4ff2
f0f4ff2
kexec could be used as a vector for a malicious user to use a signed kernel
f0f4ff2
to circumvent the secure boot trust model. In the long run we'll want to
f0f4ff2
support signed kexec payloads, but for the moment we should just disable
f0f4ff2
loading entirely in that situation.
f0f4ff2
f0f4ff2
Signed-off-by: Matthew Garrett <mjg@redhat.com>
f0f4ff2
---
f0f4ff2
 kernel/kexec.c | 2 +-
f0f4ff2
 1 file changed, 1 insertion(+), 1 deletion(-)
f0f4ff2
f0f4ff2
diff --git a/kernel/kexec.c b/kernel/kexec.c
f0f4ff2
index 0668d58..8b976a5 100644
f0f4ff2
--- a/kernel/kexec.c
f0f4ff2
+++ b/kernel/kexec.c
f0f4ff2
@@ -944,7 +944,7 @@ SYSCALL_DEFINE4(kexec_load, unsigned long, entry, unsigned long, nr_segments,
f0f4ff2
 	int result;
f0f4ff2
 
f0f4ff2
 	/* We only trust the superuser with rebooting the system. */
f0f4ff2
-	if (!capable(CAP_SYS_BOOT))
f0f4ff2
+	if (!capable(CAP_SYS_BOOT) || !capable(CAP_COMPROMISE_KERNEL))
f0f4ff2
 		return -EPERM;
f0f4ff2
 
f0f4ff2
 	/*
f0f4ff2
-- 
f0f4ff2
1.7.11.4
306dfcc
306dfcc
f0f4ff2
From 895c46276788b3711aee05a1a1d685eff69d48b9 Mon Sep 17 00:00:00 2001
306dfcc
From: Josh Boyer <jwboyer@redhat.com>
306dfcc
Date: Mon, 25 Jun 2012 21:29:46 -0400
f0f4ff2
Subject: [PATCH 12/14] Documentation: kernel-parameters.txt remove
306dfcc
 capability.disable
306dfcc
306dfcc
Remove the documentation for capability.disable.  The code supporting this
306dfcc
parameter was removed with:
306dfcc
306dfcc
	commit 5915eb53861c5776cfec33ca4fcc1fd20d66dd27
306dfcc
	Author: Miklos Szeredi <mszeredi@suse.cz>
306dfcc
	Date:   Thu Jul 3 20:56:05 2008 +0200
306dfcc
306dfcc
    	security: remove dummy module
306dfcc
306dfcc
Signed-off-by: Josh Boyer <jwboyer@redhat.com>
306dfcc
---
306dfcc
 Documentation/kernel-parameters.txt | 6 ------
306dfcc
 1 file changed, 6 deletions(-)
306dfcc
306dfcc
diff --git a/Documentation/kernel-parameters.txt b/Documentation/kernel-parameters.txt
f0f4ff2
index 93978d5..e3e5f8c 100644
306dfcc
--- a/Documentation/kernel-parameters.txt
306dfcc
+++ b/Documentation/kernel-parameters.txt
306dfcc
@@ -446,12 +446,6 @@ bytes respectively. Such letter suffixes can also be entirely omitted.
306dfcc
 			possible to determine what the correct size should be.
306dfcc
 			This option provides an override for these situations.
306dfcc
 
306dfcc
-	capability.disable=
306dfcc
-			[SECURITY] Disable capabilities.  This would normally
306dfcc
-			be used only if an alternative security model is to be
306dfcc
-			configured.  Potentially dangerous and should only be
306dfcc
-			used if you are entirely sure of the consequences.
306dfcc
-
306dfcc
 	ccw_timeout_log [S390]
306dfcc
 			See Documentation/s390/CommonIO for details.
306dfcc
 
306dfcc
-- 
f0f4ff2
1.7.11.4
306dfcc
306dfcc
1b028bf
From 1cc529e97756554953187fe48b9b8cf0e24b9bc7 Mon Sep 17 00:00:00 2001
f0f4ff2
From: Josh Boyer <jwboyer@redhat.com>
1b028bf
Date: Fri, 5 Oct 2012 10:12:48 -0400
1b028bf
Subject: [PATCH] modsign: Always enforce module signing in a Secure Boot
f0f4ff2
 environment
f0f4ff2
f0f4ff2
If a machine is booted into a Secure Boot environment, we need to
f0f4ff2
protect the trust model.  This requires that all modules be signed
1b028bf
with a key that is in the kernel's _modsign keyring.  The checks for
1b028bf
this are already done via the 'sig_enforce' module parameter.  Make
1b028bf
this visible within the kernel and force it to be true.
f0f4ff2
f0f4ff2
Signed-off-by: Josh Boyer <jwboyer@redhat.com>
f0f4ff2
---
1b028bf
 kernel/cred.c   | 8 ++++++++
f0f4ff2
 kernel/module.c | 4 ++--
1b028bf
 2 files changed, 10 insertions(+), 2 deletions(-)
f0f4ff2
1b028bf
diff --git a/kernel/cred.c b/kernel/cred.c
1b028bf
index 7e6e83f..2b0b980 100644
1b028bf
--- a/kernel/cred.c
1b028bf
+++ b/kernel/cred.c
1b028bf
@@ -623,11 +623,19 @@ void __init cred_init(void)
1b028bf
 				     0, SLAB_HWCACHE_ALIGN|SLAB_PANIC, NULL);
1b028bf
 }
1b028bf
 
393a84a
+#ifdef CONFIG_MODULE_SIG
1b028bf
+extern bool sig_enforce;
1b028bf
+#endif
1b028bf
+
1b028bf
 void __init secureboot_enable()
1b028bf
 {
1b028bf
 	pr_info("Secure boot enabled\n");
1b028bf
 	cap_lower((&init_cred)->cap_bset, CAP_COMPROMISE_KERNEL);
1b028bf
 	cap_lower((&init_cred)->cap_permitted, CAP_COMPROMISE_KERNEL);
393a84a
+#ifdef CONFIG_MODULE_SIG
1b028bf
+	/* Enable module signature enforcing */
1b028bf
+	sig_enforce = true;
1b028bf
+#endif
1b028bf
 }
1b028bf
 
1b028bf
 /* Dummy Secure Boot enable option to fake out UEFI SB=1 */
f0f4ff2
diff --git a/kernel/module.c b/kernel/module.c
1b028bf
index de16959..7d4c50a 100644
f0f4ff2
--- a/kernel/module.c
f0f4ff2
+++ b/kernel/module.c
1b028bf
@@ -106,9 +106,9 @@ struct list_head *kdb_modules = &modules; /* kdb needs the list of modules */
1b028bf
 
1b028bf
 #ifdef CONFIG_MODULE_SIG
1b028bf
 #ifdef CONFIG_MODULE_SIG_FORCE
1b028bf
-static bool sig_enforce = true;
1b028bf
+bool sig_enforce = true;
1b028bf
 #else
1b028bf
-static bool sig_enforce = false;
1b028bf
+bool sig_enforce = false;
1b028bf
 
1b028bf
 static int param_set_bool_enable_only(const char *val,
1b028bf
 				      const struct kernel_param *kp)
f0f4ff2
-- 
f0f4ff2
1.7.11.4
1932bb1