summaryrefslogtreecommitdiffstats
path: root/arch/x86/kernel/ima_arch.c
diff options
context:
space:
mode:
authorNayna Jain <nayna@linux.ibm.com>2018-10-09 19:30:33 +0200
committerMimi Zohar <zohar@linux.ibm.com>2018-11-13 13:38:45 +0100
commit0914ade209c452cff6a29b1c0ae6fff3167fa1d0 (patch)
tree6fa55dce007fc83f4bb59ed5f4e2b33c4394997a /arch/x86/kernel/ima_arch.c
parentintegrity: support new struct public_key_signature encoding field (diff)
downloadlinux-0914ade209c452cff6a29b1c0ae6fff3167fa1d0.tar.xz
linux-0914ade209c452cff6a29b1c0ae6fff3167fa1d0.zip
x86/ima: define arch_ima_get_secureboot
Distros are concerned about totally disabling the kexec_load syscall. As a compromise, the kexec_load syscall will only be disabled when CONFIG_KEXEC_VERIFY_SIG is configured and the system is booted with secureboot enabled. This patch defines the new arch specific function called arch_ima_get_secureboot() to retrieve the secureboot state of the system. Signed-off-by: Nayna Jain <nayna@linux.ibm.com> Suggested-by: Seth Forshee <seth.forshee@canonical.com> Cc: David Howells <dhowells@redhat.com> Cc: Eric Biederman <ebiederm@xmission.com> Cc: Peter Jones <pjones@redhat.com> Cc: Vivek Goyal <vgoyal@redhat.com> Cc: Dave Young <dyoung@redhat.com> Signed-off-by: Mimi Zohar <zohar@linux.ibm.com>
Diffstat (limited to 'arch/x86/kernel/ima_arch.c')
-rw-r--r--arch/x86/kernel/ima_arch.c17
1 files changed, 17 insertions, 0 deletions
diff --git a/arch/x86/kernel/ima_arch.c b/arch/x86/kernel/ima_arch.c
new file mode 100644
index 000000000000..bb5a88d2b271
--- /dev/null
+++ b/arch/x86/kernel/ima_arch.c
@@ -0,0 +1,17 @@
+/* SPDX-License-Identifier: GPL-2.0+ */
+/*
+ * Copyright (C) 2018 IBM Corporation
+ */
+#include <linux/efi.h>
+#include <linux/ima.h>
+
+extern struct boot_params boot_params;
+
+bool arch_ima_get_secureboot(void)
+{
+ if (efi_enabled(EFI_BOOT) &&
+ (boot_params.secure_boot == efi_secureboot_mode_enabled))
+ return true;
+ else
+ return false;
+}