diff options
author | Nayna Jain <nayna@linux.ibm.com> | 2018-10-09 19:30:33 +0200 |
---|---|---|
committer | Mimi Zohar <zohar@linux.ibm.com> | 2018-11-13 13:38:45 +0100 |
commit | 0914ade209c452cff6a29b1c0ae6fff3167fa1d0 (patch) | |
tree | 6fa55dce007fc83f4bb59ed5f4e2b33c4394997a /arch/x86/kernel/ima_arch.c | |
parent | integrity: support new struct public_key_signature encoding field (diff) | |
download | linux-0914ade209c452cff6a29b1c0ae6fff3167fa1d0.tar.xz linux-0914ade209c452cff6a29b1c0ae6fff3167fa1d0.zip |
x86/ima: define arch_ima_get_secureboot
Distros are concerned about totally disabling the kexec_load syscall.
As a compromise, the kexec_load syscall will only be disabled when
CONFIG_KEXEC_VERIFY_SIG is configured and the system is booted with
secureboot enabled.
This patch defines the new arch specific function called
arch_ima_get_secureboot() to retrieve the secureboot state of the system.
Signed-off-by: Nayna Jain <nayna@linux.ibm.com>
Suggested-by: Seth Forshee <seth.forshee@canonical.com>
Cc: David Howells <dhowells@redhat.com>
Cc: Eric Biederman <ebiederm@xmission.com>
Cc: Peter Jones <pjones@redhat.com>
Cc: Vivek Goyal <vgoyal@redhat.com>
Cc: Dave Young <dyoung@redhat.com>
Signed-off-by: Mimi Zohar <zohar@linux.ibm.com>
Diffstat (limited to 'arch/x86/kernel/ima_arch.c')
-rw-r--r-- | arch/x86/kernel/ima_arch.c | 17 |
1 files changed, 17 insertions, 0 deletions
diff --git a/arch/x86/kernel/ima_arch.c b/arch/x86/kernel/ima_arch.c new file mode 100644 index 000000000000..bb5a88d2b271 --- /dev/null +++ b/arch/x86/kernel/ima_arch.c @@ -0,0 +1,17 @@ +/* SPDX-License-Identifier: GPL-2.0+ */ +/* + * Copyright (C) 2018 IBM Corporation + */ +#include <linux/efi.h> +#include <linux/ima.h> + +extern struct boot_params boot_params; + +bool arch_ima_get_secureboot(void) +{ + if (efi_enabled(EFI_BOOT) && + (boot_params.secure_boot == efi_secureboot_mode_enabled)) + return true; + else + return false; +} |