1*4882a593Smuzhiyun // SPDX-License-Identifier: GPL-2.0
2*4882a593Smuzhiyun
3*4882a593Smuzhiyun #include <linux/kernel.h>
4*4882a593Smuzhiyun #include <linux/sched.h>
5*4882a593Smuzhiyun #include <linux/cred.h>
6*4882a593Smuzhiyun #include <linux/dmi.h>
7*4882a593Smuzhiyun #include <linux/err.h>
8*4882a593Smuzhiyun #include <linux/efi.h>
9*4882a593Smuzhiyun #include <linux/slab.h>
10*4882a593Smuzhiyun #include <keys/asymmetric-type.h>
11*4882a593Smuzhiyun #include <keys/system_keyring.h>
12*4882a593Smuzhiyun #include "../integrity.h"
13*4882a593Smuzhiyun #include "keyring_handler.h"
14*4882a593Smuzhiyun
15*4882a593Smuzhiyun /*
16*4882a593Smuzhiyun * On T2 Macs reading the db and dbx efi variables to load UEFI Secure Boot
17*4882a593Smuzhiyun * certificates causes occurrence of a page fault in Apple's firmware and
18*4882a593Smuzhiyun * a crash disabling EFI runtime services. The following quirk skips reading
19*4882a593Smuzhiyun * these variables.
20*4882a593Smuzhiyun */
21*4882a593Smuzhiyun static const struct dmi_system_id uefi_skip_cert[] = {
22*4882a593Smuzhiyun { UEFI_QUIRK_SKIP_CERT("Apple Inc.", "MacBookPro15,1") },
23*4882a593Smuzhiyun { UEFI_QUIRK_SKIP_CERT("Apple Inc.", "MacBookPro15,2") },
24*4882a593Smuzhiyun { UEFI_QUIRK_SKIP_CERT("Apple Inc.", "MacBookPro15,3") },
25*4882a593Smuzhiyun { UEFI_QUIRK_SKIP_CERT("Apple Inc.", "MacBookPro15,4") },
26*4882a593Smuzhiyun { UEFI_QUIRK_SKIP_CERT("Apple Inc.", "MacBookPro16,1") },
27*4882a593Smuzhiyun { UEFI_QUIRK_SKIP_CERT("Apple Inc.", "MacBookPro16,2") },
28*4882a593Smuzhiyun { UEFI_QUIRK_SKIP_CERT("Apple Inc.", "MacBookPro16,3") },
29*4882a593Smuzhiyun { UEFI_QUIRK_SKIP_CERT("Apple Inc.", "MacBookPro16,4") },
30*4882a593Smuzhiyun { UEFI_QUIRK_SKIP_CERT("Apple Inc.", "MacBookAir8,1") },
31*4882a593Smuzhiyun { UEFI_QUIRK_SKIP_CERT("Apple Inc.", "MacBookAir8,2") },
32*4882a593Smuzhiyun { UEFI_QUIRK_SKIP_CERT("Apple Inc.", "MacBookAir9,1") },
33*4882a593Smuzhiyun { UEFI_QUIRK_SKIP_CERT("Apple Inc.", "Macmini8,1") },
34*4882a593Smuzhiyun { UEFI_QUIRK_SKIP_CERT("Apple Inc.", "MacPro7,1") },
35*4882a593Smuzhiyun { UEFI_QUIRK_SKIP_CERT("Apple Inc.", "iMac20,1") },
36*4882a593Smuzhiyun { UEFI_QUIRK_SKIP_CERT("Apple Inc.", "iMac20,2") },
37*4882a593Smuzhiyun { }
38*4882a593Smuzhiyun };
39*4882a593Smuzhiyun
40*4882a593Smuzhiyun /*
41*4882a593Smuzhiyun * Look to see if a UEFI variable called MokIgnoreDB exists and return true if
42*4882a593Smuzhiyun * it does.
43*4882a593Smuzhiyun *
44*4882a593Smuzhiyun * This UEFI variable is set by the shim if a user tells the shim to not use
45*4882a593Smuzhiyun * the certs/hashes in the UEFI db variable for verification purposes. If it
46*4882a593Smuzhiyun * is set, we should ignore the db variable also and the true return indicates
47*4882a593Smuzhiyun * this.
48*4882a593Smuzhiyun */
uefi_check_ignore_db(void)49*4882a593Smuzhiyun static __init bool uefi_check_ignore_db(void)
50*4882a593Smuzhiyun {
51*4882a593Smuzhiyun efi_status_t status;
52*4882a593Smuzhiyun unsigned int db = 0;
53*4882a593Smuzhiyun unsigned long size = sizeof(db);
54*4882a593Smuzhiyun efi_guid_t guid = EFI_SHIM_LOCK_GUID;
55*4882a593Smuzhiyun
56*4882a593Smuzhiyun status = efi.get_variable(L"MokIgnoreDB", &guid, NULL, &size, &db);
57*4882a593Smuzhiyun return status == EFI_SUCCESS;
58*4882a593Smuzhiyun }
59*4882a593Smuzhiyun
60*4882a593Smuzhiyun /*
61*4882a593Smuzhiyun * Get a certificate list blob from the named EFI variable.
62*4882a593Smuzhiyun */
get_cert_list(efi_char16_t * name,efi_guid_t * guid,unsigned long * size,efi_status_t * status)63*4882a593Smuzhiyun static __init void *get_cert_list(efi_char16_t *name, efi_guid_t *guid,
64*4882a593Smuzhiyun unsigned long *size, efi_status_t *status)
65*4882a593Smuzhiyun {
66*4882a593Smuzhiyun unsigned long lsize = 4;
67*4882a593Smuzhiyun unsigned long tmpdb[4];
68*4882a593Smuzhiyun void *db;
69*4882a593Smuzhiyun
70*4882a593Smuzhiyun *status = efi.get_variable(name, guid, NULL, &lsize, &tmpdb);
71*4882a593Smuzhiyun if (*status == EFI_NOT_FOUND)
72*4882a593Smuzhiyun return NULL;
73*4882a593Smuzhiyun
74*4882a593Smuzhiyun if (*status != EFI_BUFFER_TOO_SMALL) {
75*4882a593Smuzhiyun pr_err("Couldn't get size: 0x%lx\n", *status);
76*4882a593Smuzhiyun return NULL;
77*4882a593Smuzhiyun }
78*4882a593Smuzhiyun
79*4882a593Smuzhiyun db = kmalloc(lsize, GFP_KERNEL);
80*4882a593Smuzhiyun if (!db)
81*4882a593Smuzhiyun return NULL;
82*4882a593Smuzhiyun
83*4882a593Smuzhiyun *status = efi.get_variable(name, guid, NULL, &lsize, db);
84*4882a593Smuzhiyun if (*status != EFI_SUCCESS) {
85*4882a593Smuzhiyun kfree(db);
86*4882a593Smuzhiyun pr_err("Error reading db var: 0x%lx\n", *status);
87*4882a593Smuzhiyun return NULL;
88*4882a593Smuzhiyun }
89*4882a593Smuzhiyun
90*4882a593Smuzhiyun *size = lsize;
91*4882a593Smuzhiyun return db;
92*4882a593Smuzhiyun }
93*4882a593Smuzhiyun
94*4882a593Smuzhiyun /*
95*4882a593Smuzhiyun * load_moklist_certs() - Load MokList certs
96*4882a593Smuzhiyun *
97*4882a593Smuzhiyun * Load the certs contained in the UEFI MokListRT database into the
98*4882a593Smuzhiyun * platform trusted keyring.
99*4882a593Smuzhiyun *
100*4882a593Smuzhiyun * This routine checks the EFI MOK config table first. If and only if
101*4882a593Smuzhiyun * that fails, this routine uses the MokListRT ordinary UEFI variable.
102*4882a593Smuzhiyun *
103*4882a593Smuzhiyun * Return: Status
104*4882a593Smuzhiyun */
load_moklist_certs(void)105*4882a593Smuzhiyun static int __init load_moklist_certs(void)
106*4882a593Smuzhiyun {
107*4882a593Smuzhiyun struct efi_mokvar_table_entry *mokvar_entry;
108*4882a593Smuzhiyun efi_guid_t mok_var = EFI_SHIM_LOCK_GUID;
109*4882a593Smuzhiyun void *mok;
110*4882a593Smuzhiyun unsigned long moksize;
111*4882a593Smuzhiyun efi_status_t status;
112*4882a593Smuzhiyun int rc;
113*4882a593Smuzhiyun
114*4882a593Smuzhiyun /* First try to load certs from the EFI MOKvar config table.
115*4882a593Smuzhiyun * It's not an error if the MOKvar config table doesn't exist
116*4882a593Smuzhiyun * or the MokListRT entry is not found in it.
117*4882a593Smuzhiyun */
118*4882a593Smuzhiyun mokvar_entry = efi_mokvar_entry_find("MokListRT");
119*4882a593Smuzhiyun if (mokvar_entry) {
120*4882a593Smuzhiyun rc = parse_efi_signature_list("UEFI:MokListRT (MOKvar table)",
121*4882a593Smuzhiyun mokvar_entry->data,
122*4882a593Smuzhiyun mokvar_entry->data_size,
123*4882a593Smuzhiyun get_handler_for_db);
124*4882a593Smuzhiyun /* All done if that worked. */
125*4882a593Smuzhiyun if (!rc)
126*4882a593Smuzhiyun return rc;
127*4882a593Smuzhiyun
128*4882a593Smuzhiyun pr_err("Couldn't parse MokListRT signatures from EFI MOKvar config table: %d\n",
129*4882a593Smuzhiyun rc);
130*4882a593Smuzhiyun }
131*4882a593Smuzhiyun
132*4882a593Smuzhiyun /* Get MokListRT. It might not exist, so it isn't an error
133*4882a593Smuzhiyun * if we can't get it.
134*4882a593Smuzhiyun */
135*4882a593Smuzhiyun mok = get_cert_list(L"MokListRT", &mok_var, &moksize, &status);
136*4882a593Smuzhiyun if (mok) {
137*4882a593Smuzhiyun rc = parse_efi_signature_list("UEFI:MokListRT",
138*4882a593Smuzhiyun mok, moksize, get_handler_for_db);
139*4882a593Smuzhiyun kfree(mok);
140*4882a593Smuzhiyun if (rc)
141*4882a593Smuzhiyun pr_err("Couldn't parse MokListRT signatures: %d\n", rc);
142*4882a593Smuzhiyun return rc;
143*4882a593Smuzhiyun }
144*4882a593Smuzhiyun if (status == EFI_NOT_FOUND)
145*4882a593Smuzhiyun pr_debug("MokListRT variable wasn't found\n");
146*4882a593Smuzhiyun else
147*4882a593Smuzhiyun pr_info("Couldn't get UEFI MokListRT\n");
148*4882a593Smuzhiyun return 0;
149*4882a593Smuzhiyun }
150*4882a593Smuzhiyun
151*4882a593Smuzhiyun /*
152*4882a593Smuzhiyun * load_uefi_certs() - Load certs from UEFI sources
153*4882a593Smuzhiyun *
154*4882a593Smuzhiyun * Load the certs contained in the UEFI databases into the platform trusted
155*4882a593Smuzhiyun * keyring and the UEFI blacklisted X.509 cert SHA256 hashes into the blacklist
156*4882a593Smuzhiyun * keyring.
157*4882a593Smuzhiyun */
load_uefi_certs(void)158*4882a593Smuzhiyun static int __init load_uefi_certs(void)
159*4882a593Smuzhiyun {
160*4882a593Smuzhiyun efi_guid_t secure_var = EFI_IMAGE_SECURITY_DATABASE_GUID;
161*4882a593Smuzhiyun efi_guid_t mok_var = EFI_SHIM_LOCK_GUID;
162*4882a593Smuzhiyun void *db = NULL, *dbx = NULL, *mokx = NULL;
163*4882a593Smuzhiyun unsigned long dbsize = 0, dbxsize = 0, mokxsize = 0;
164*4882a593Smuzhiyun efi_status_t status;
165*4882a593Smuzhiyun int rc = 0;
166*4882a593Smuzhiyun const struct dmi_system_id *dmi_id;
167*4882a593Smuzhiyun
168*4882a593Smuzhiyun dmi_id = dmi_first_match(uefi_skip_cert);
169*4882a593Smuzhiyun if (dmi_id) {
170*4882a593Smuzhiyun pr_err("Reading UEFI Secure Boot Certs is not supported on T2 Macs.\n");
171*4882a593Smuzhiyun return false;
172*4882a593Smuzhiyun }
173*4882a593Smuzhiyun
174*4882a593Smuzhiyun if (!efi_rt_services_supported(EFI_RT_SUPPORTED_GET_VARIABLE))
175*4882a593Smuzhiyun return false;
176*4882a593Smuzhiyun
177*4882a593Smuzhiyun /* Get db and dbx. They might not exist, so it isn't an error
178*4882a593Smuzhiyun * if we can't get them.
179*4882a593Smuzhiyun */
180*4882a593Smuzhiyun if (!uefi_check_ignore_db()) {
181*4882a593Smuzhiyun db = get_cert_list(L"db", &secure_var, &dbsize, &status);
182*4882a593Smuzhiyun if (!db) {
183*4882a593Smuzhiyun if (status == EFI_NOT_FOUND)
184*4882a593Smuzhiyun pr_debug("MODSIGN: db variable wasn't found\n");
185*4882a593Smuzhiyun else
186*4882a593Smuzhiyun pr_err("MODSIGN: Couldn't get UEFI db list\n");
187*4882a593Smuzhiyun } else {
188*4882a593Smuzhiyun rc = parse_efi_signature_list("UEFI:db",
189*4882a593Smuzhiyun db, dbsize, get_handler_for_db);
190*4882a593Smuzhiyun if (rc)
191*4882a593Smuzhiyun pr_err("Couldn't parse db signatures: %d\n",
192*4882a593Smuzhiyun rc);
193*4882a593Smuzhiyun kfree(db);
194*4882a593Smuzhiyun }
195*4882a593Smuzhiyun }
196*4882a593Smuzhiyun
197*4882a593Smuzhiyun dbx = get_cert_list(L"dbx", &secure_var, &dbxsize, &status);
198*4882a593Smuzhiyun if (!dbx) {
199*4882a593Smuzhiyun if (status == EFI_NOT_FOUND)
200*4882a593Smuzhiyun pr_debug("dbx variable wasn't found\n");
201*4882a593Smuzhiyun else
202*4882a593Smuzhiyun pr_info("Couldn't get UEFI dbx list\n");
203*4882a593Smuzhiyun } else {
204*4882a593Smuzhiyun rc = parse_efi_signature_list("UEFI:dbx",
205*4882a593Smuzhiyun dbx, dbxsize,
206*4882a593Smuzhiyun get_handler_for_dbx);
207*4882a593Smuzhiyun if (rc)
208*4882a593Smuzhiyun pr_err("Couldn't parse dbx signatures: %d\n", rc);
209*4882a593Smuzhiyun kfree(dbx);
210*4882a593Smuzhiyun }
211*4882a593Smuzhiyun
212*4882a593Smuzhiyun mokx = get_cert_list(L"MokListXRT", &mok_var, &mokxsize, &status);
213*4882a593Smuzhiyun if (!mokx) {
214*4882a593Smuzhiyun if (status == EFI_NOT_FOUND)
215*4882a593Smuzhiyun pr_debug("mokx variable wasn't found\n");
216*4882a593Smuzhiyun else
217*4882a593Smuzhiyun pr_info("Couldn't get mokx list\n");
218*4882a593Smuzhiyun } else {
219*4882a593Smuzhiyun rc = parse_efi_signature_list("UEFI:MokListXRT",
220*4882a593Smuzhiyun mokx, mokxsize,
221*4882a593Smuzhiyun get_handler_for_dbx);
222*4882a593Smuzhiyun if (rc)
223*4882a593Smuzhiyun pr_err("Couldn't parse mokx signatures %d\n", rc);
224*4882a593Smuzhiyun kfree(mokx);
225*4882a593Smuzhiyun }
226*4882a593Smuzhiyun
227*4882a593Smuzhiyun /* Load the MokListRT certs */
228*4882a593Smuzhiyun rc = load_moklist_certs();
229*4882a593Smuzhiyun
230*4882a593Smuzhiyun return rc;
231*4882a593Smuzhiyun }
232*4882a593Smuzhiyun late_initcall(load_uefi_certs);
233