Skip to content

Commit

Permalink
kexec: do not verify the signature without the lockdown or mandatory …
Browse files Browse the repository at this point in the history
…signature

Signature verification is an important security feature, to protect
system from being attacked with a kernel of unknown origin.  Kexec
rebooting is a way to replace the running kernel, hence need be secured
carefully.

In the current code of handling signature verification of kexec kernel,
the logic is very twisted.  It mixes signature verification, IMA
signature appraising and kexec lockdown.

If there is no KEXEC_SIG_FORCE, kexec kernel image doesn't have one of
signature, the supported crypto, and key, we don't think this is wrong,
Unless kexec lockdown is executed.  IMA is considered as another kind of
signature appraising method.

If kexec kernel image has signature/crypto/key, it has to go through the
signature verification and pass.  Otherwise it's seen as verification
failure, and won't be loaded.

Seems kexec kernel image with an unqualified signature is even worse
than those w/o signature at all, this sounds very unreasonable.  E.g.
If people get a unsigned kernel to load, or a kernel signed with expired
key, which one is more dangerous?

So, here, let's simplify the logic to improve code readability.  If the
KEXEC_SIG_FORCE enabled or kexec lockdown enabled, signature
verification is mandated.  Otherwise, we lift the bar for any kernel
image.

Link: http://lkml.kernel.org/r/[email protected]
Signed-off-by: Lianbo Jiang <[email protected]>
Reviewed-by: Jiri Bohac <[email protected]>
Acked-by: Dave Young <[email protected]>
Acked-by: Baoquan He <[email protected]>
Cc: James Morris <[email protected]>
Cc: Matthew Garrett <[email protected]>
Cc: "Eric W. Biederman" <[email protected]>
Signed-off-by: Andrew Morton <[email protected]>
Signed-off-by: Linus Torvalds <[email protected]>
  • Loading branch information
lian-bo authored and torvalds committed Jun 26, 2020
1 parent b9e20f0 commit fd7af71
Showing 1 changed file with 6 additions and 28 deletions.
34 changes: 6 additions & 28 deletions kernel/kexec_file.c
Original file line number Diff line number Diff line change
Expand Up @@ -181,52 +181,30 @@ void kimage_file_post_load_cleanup(struct kimage *image)
static int
kimage_validate_signature(struct kimage *image)
{
const char *reason;
int ret;

ret = arch_kexec_kernel_verify_sig(image, image->kernel_buf,
image->kernel_buf_len);
switch (ret) {
case 0:
break;
if (ret) {

/* Certain verification errors are non-fatal if we're not
* checking errors, provided we aren't mandating that there
* must be a valid signature.
*/
case -ENODATA:
reason = "kexec of unsigned image";
goto decide;
case -ENOPKG:
reason = "kexec of image with unsupported crypto";
goto decide;
case -ENOKEY:
reason = "kexec of image with unavailable key";
decide:
if (IS_ENABLED(CONFIG_KEXEC_SIG_FORCE)) {
pr_notice("%s rejected\n", reason);
pr_notice("Enforced kernel signature verification failed (%d).\n", ret);
return ret;
}

/* If IMA is guaranteed to appraise a signature on the kexec
/*
* If IMA is guaranteed to appraise a signature on the kexec
* image, permit it even if the kernel is otherwise locked
* down.
*/
if (!ima_appraise_signature(READING_KEXEC_IMAGE) &&
security_locked_down(LOCKDOWN_KEXEC))
return -EPERM;

return 0;

/* All other errors are fatal, including nomem, unparseable
* signatures and signature check failures - even if signatures
* aren't required.
*/
default:
pr_notice("kernel signature verification failed (%d).\n", ret);
pr_debug("kernel signature verification failed (%d).\n", ret);
}

return ret;
return 0;
}
#endif

Expand Down

0 comments on commit fd7af71

Please sign in to comment.