Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp2655742pxj; Mon, 14 Jun 2021 04:10:28 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzzaNCptzaXt6Lz/lxP8mxdf9/kkaMjKDz8wwHRTTVa/vQDmz7YBZsqdIeqOtcb91uxkDB+ X-Received: by 2002:a05:6402:128d:: with SMTP id w13mr16545316edv.38.1623669028373; Mon, 14 Jun 2021 04:10:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623669028; cv=none; d=google.com; s=arc-20160816; b=KkNZrsQpwMYe1Cpaqp/gPj1vrbDIBrcZ5niCdOEvCPpLXqH4dI1qOAOyiigAGzv0Z2 rn/fooFNhbs5d8Mw6+gy2FBNOlbpcCUjNfVvGDdmivbMzJ+275S/Qr8UrNvG9FFGpiMi k1WcIhXVM9HA+gpK2CxHtrUc1jCnAZgccJ00URBy02ymVT/9QVzQqDUFkgjZD8Sf0tR4 +J3iLDuuhS2ifL73nfecKcv3ejvPEQnfZIqIzX8F6hARNIbgApYaYF40v3n3/bxsuXig tSm3cA1LLv9HNZ76hWHTNLBQvSgWGsYQjuUs6uKET7u44LJ680EfGOMJDZHfnEUuDjWH th4Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=YJJPSxQPnqPf1Nnh6Y5R7u7LRuShD4N9WkohQBmvWKc=; b=zapm6IkIOygaqKCAR0ybm82XkRCUPmyMm3GYboo2btqIrOoFjxvupjeKabfM8O773E lUaiIRmaQxhqc6WU3YdIocydXm6AYfIBis5+b3zpP+KMOPvT1QeuhQraKSQ4UWgLhU1K k4gyzUqrdZ54iiQc4fv1wuxFwmj6eyiqHVkluoOioszGzrkrFiodKnHHbsnXEgDmKQ2S 77rq9N7PUhnWPr6m1T3gUQMGK6dca/B+SGqQyZFghOtZvY/6lMTFnK3hqpjwwS++Bho4 Zl6XES0OebTYvYjKPVV94rHzRxHJlaEkjOV2xslVlUV/UHxCRg3umdguTMaIpRzh+Orz O6oQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=SAScReXI; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n8si7937838edx.93.2021.06.14.04.10.05; Mon, 14 Jun 2021 04:10:28 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=SAScReXI; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235442AbhFNLKT (ORCPT + 99 others); Mon, 14 Jun 2021 07:10:19 -0400 Received: from mail.kernel.org ([198.145.29.99]:35836 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234901AbhFNK73 (ORCPT ); Mon, 14 Jun 2021 06:59:29 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id D6ADC6161F; Mon, 14 Jun 2021 10:42:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1623667350; bh=VHAXdjdcllNCvOk3Jm+KgEHu0Sx0iGudak86gchl8V8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=SAScReXIgh2j9R+lu0Ok3ZH/M9glNf9GP2vYZVqf4YFn1EL2Ihh0hBbzZ0+AQd0AM Mnbib1i4iqA6HA3YOoilceqz4QF7bovvMnzYab8rH43CvAF3VFSoAAsnfuc3V/vY4g cbmmttEm8dySFV8+Uku9xM6aPbITUWxM7KiVzVRk= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, John Keeping , Mike Snitzer , Sasha Levin Subject: [PATCH 5.10 035/131] dm verity: fix require_signatures module_param permissions Date: Mon, 14 Jun 2021 12:26:36 +0200 Message-Id: <20210614102654.198616176@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210614102652.964395392@linuxfoundation.org> References: <20210614102652.964395392@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: John Keeping [ Upstream commit 0c1f3193b1cdd21e7182f97dc9bca7d284d18a15 ] The third parameter of module_param() is permissions for the sysfs node but it looks like it is being used as the initial value of the parameter here. In fact, false here equates to omitting the file from sysfs and does not affect the value of require_signatures. Making the parameter writable is not simple because going from false->true is fine but it should not be possible to remove the requirement to verify a signature. But it can be useful to inspect the value of this parameter from userspace, so change the permissions to make a read-only file in sysfs. Signed-off-by: John Keeping Signed-off-by: Mike Snitzer Signed-off-by: Sasha Levin --- drivers/md/dm-verity-verify-sig.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/md/dm-verity-verify-sig.c b/drivers/md/dm-verity-verify-sig.c index 614e43db93aa..919154ae4cae 100644 --- a/drivers/md/dm-verity-verify-sig.c +++ b/drivers/md/dm-verity-verify-sig.c @@ -15,7 +15,7 @@ #define DM_VERITY_VERIFY_ERR(s) DM_VERITY_ROOT_HASH_VERIFICATION " " s static bool require_signatures; -module_param(require_signatures, bool, false); +module_param(require_signatures, bool, 0444); MODULE_PARM_DESC(require_signatures, "Verify the roothash of dm-verity hash tree"); -- 2.30.2