[PATCH v4 13/17] module: Report signature type to users
Thomas Weißschuh
linux at weissschuh.net
Tue Feb 3 23:44:05 AEDT 2026
On 2026-01-29 15:44:31+0100, Petr Pavlu wrote:
> On 1/13/26 1:28 PM, Thomas Weißschuh wrote:
> > The upcoming CONFIG_MODULE_HASHES will introduce a signature type.
> > This needs to be handled by callers differently than PKCS7 signatures.
> >
> > Report the signature type to the caller and let them verify it.
> >
> > Signed-off-by: Thomas Weißschuh <linux at weissschuh.net>
> > ---
> > [...]
> > diff --git a/kernel/module/main.c b/kernel/module/main.c
> > index d65bc300a78c..2a28a0ece809 100644
> > --- a/kernel/module/main.c
> > +++ b/kernel/module/main.c
> > @@ -3348,19 +3348,24 @@ static int module_integrity_check(struct load_info *info, int flags)
> > {
> > bool mangled_module = flags & (MODULE_INIT_IGNORE_MODVERSIONS |
> > MODULE_INIT_IGNORE_VERMAGIC);
> > + enum pkey_id_type sig_type;
> > size_t sig_len;
> > const u8 *sig;
> > int err = 0;
> >
> > if (IS_ENABLED(CONFIG_MODULE_SIG_POLICY)) {
> > err = mod_split_sig(info->hdr, &info->len, mangled_module,
> > - &sig_len, &sig, "module");
> > + &sig_type, &sig_len, &sig, "module");
> > if (err)
> > return err;
> > }
> >
> > - if (IS_ENABLED(CONFIG_MODULE_SIG))
> > + if (IS_ENABLED(CONFIG_MODULE_SIG) && sig_type == PKEY_ID_PKCS7) {
> > err = module_sig_check(info, sig, sig_len);
> > + } else {
> > + pr_err("module: not signed with expected PKCS#7 message\n");
> > + err = -ENOPKG;
> > + }
>
> The new else branch means that if the user chooses not to configure any
> module integrity policy, they will no longer be able to load any
> modules. I think this entire if-else part should be moved under the
> IS_ENABLED(CONFIG_MODULE_SIG_POLICY) block above, as I'm mentioning on
> patch #12.
Ack.
More information about the Linuxppc-dev
mailing list