[PATCH] lockdown: kexec_file: prevent unsigned kernel image when KEXEC_SIG not enabled
Mimi Zohar
zohar at linux.ibm.com
Mon Nov 28 09:16:08 PST 2022
On Tue, 2022-11-22 at 10:36 +0800, Coiby Xu wrote:
> Hi Mimi,
>
> On Mon, Nov 21, 2022 at 01:23:57PM -0500, Mimi Zohar wrote:
> >Hi Coiby,
> >
> >On Mon, 2022-11-21 at 15:29 +0800, Coiby Xu wrote:
> >> A kernel builder may not enable KEXEC_SIG and some architectures like
> >> ppc64 simply don't have KEXEC_SIG. In these cases, unless both
> >> IMA_ARCH_POLICY and secure boot also enabled, lockdown doesn't prevent
> >> unsigned kernel image from being kexec'ed via the kexec_file_load
> >> syscall whereas it could prevent one via the kexec_load syscall. Mandate
> >> signature verification for those cases.
> >>
> >> Fixes: 155bdd30af17 ("kexec_file: Restrict at runtime if the kernel is locked down")
> >> Cc: Matthew Garrett <mjg59 at srcf.ucam.org>
> >> Cc: Jiri Bohac <jbohac at suse.cz>
> >> Cc: David Howells <dhowells at redhat.com>
> >> Cc: kexec at lists.infradead.org
> >> Cc: linux-integrity at vger.kernel.org
> >> Signed-off-by: Coiby Xu <coxu at redhat.com>
> >
> >Other than correcting the function name to mandate_signature_verificati
> >on(),
>
> Applied to v2, thanks for correcting me! Btw, I realize I overwrote the
> return code of kexec_image_verify_sig with
> mandate_signature_verification's. v2 has fixed this issue as well.
>
> >
> >Reviewed-by: Mimi Zohar <zohar at linux.ibm.com>
>
> And thanks for the review!
You're welcome.
Without either IMA_ARCH or KEXEC_SIG enabled, the kexec selftest
test_kexec_file_load.sh properly failed with "kexec_file_load failed
[PASS]", but from the informational messages output, it isn't clear why
it failed. This should be corrected.
--
thanks,
Mimi
More information about the kexec
mailing list