Commit 6ac98572 authored by Ben Hutchings's avatar Ben Hutchings Committed by Sasha Levin

module: Invalidate signatures on force-loaded modules

[ Upstream commit bca014ca ]

Signing a module should only make it trusted by the specific kernel it
was built for, not anything else.  Loading a signed module meant for a
kernel with a different ABI could have interesting effects.
Therefore, treat all signatures as invalid when a module is
force-loaded.
Signed-off-by: default avatarBen Hutchings <ben@decadent.org.uk>
Cc: stable@vger.kernel.org
Signed-off-by: default avatarRusty Russell <rusty@rustcorp.com.au>
Signed-off-by: default avatarSasha Levin <alexander.levin@verizon.com>
parent 7e6f0e1e
...@@ -2451,13 +2451,18 @@ static inline void kmemleak_load_module(const struct module *mod, ...@@ -2451,13 +2451,18 @@ static inline void kmemleak_load_module(const struct module *mod,
#endif #endif
#ifdef CONFIG_MODULE_SIG #ifdef CONFIG_MODULE_SIG
static int module_sig_check(struct load_info *info) static int module_sig_check(struct load_info *info, int flags)
{ {
int err = -ENOKEY; int err = -ENOKEY;
const unsigned long markerlen = sizeof(MODULE_SIG_STRING) - 1; const unsigned long markerlen = sizeof(MODULE_SIG_STRING) - 1;
const void *mod = info->hdr; const void *mod = info->hdr;
if (info->len > markerlen && /*
* Require flags == 0, as a module with version information
* removed is no longer the module that was signed
*/
if (flags == 0 &&
info->len > markerlen &&
memcmp(mod + info->len - markerlen, MODULE_SIG_STRING, markerlen) == 0) { memcmp(mod + info->len - markerlen, MODULE_SIG_STRING, markerlen) == 0) {
/* We truncate the module to discard the signature */ /* We truncate the module to discard the signature */
info->len -= markerlen; info->len -= markerlen;
...@@ -2476,7 +2481,7 @@ static int module_sig_check(struct load_info *info) ...@@ -2476,7 +2481,7 @@ static int module_sig_check(struct load_info *info)
return err; return err;
} }
#else /* !CONFIG_MODULE_SIG */ #else /* !CONFIG_MODULE_SIG */
static int module_sig_check(struct load_info *info) static int module_sig_check(struct load_info *info, int flags)
{ {
return 0; return 0;
} }
...@@ -3277,7 +3282,7 @@ static int load_module(struct load_info *info, const char __user *uargs, ...@@ -3277,7 +3282,7 @@ static int load_module(struct load_info *info, const char __user *uargs,
long err; long err;
char *after_dashes; char *after_dashes;
err = module_sig_check(info); err = module_sig_check(info, flags);
if (err) if (err)
goto free_copy; goto free_copy;
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment