Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp2241506ybi; Mon, 1 Jul 2019 08:35:32 -0700 (PDT) X-Google-Smtp-Source: APXvYqyL5Ud2q1n+OGKD1ydIFO6qqmtOCkCpg7JwhpDtzhe8FSTVvYWxqk14pgasYpqhx4fuErNm X-Received: by 2002:a17:90a:1d8:: with SMTP id 24mr32448856pjd.70.1561995331978; Mon, 01 Jul 2019 08:35:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1561995331; cv=none; d=google.com; s=arc-20160816; b=WMCidrPR3ubSi5lY1oCK2alXsSb3rzF6WnWodd6qU5pjvDfuOpFB+30a9WhpoNaB2h /PNCIret9h/rOS40gNo1Z6O9ZmLw8JQD/HXC+uPryWtX6Uph4GqOVyomErLolVYcS1Zk XH2KG+KL9vzJ6kHIDaX0RP/H4Zkf+Lh9YlXG9TM8nC/WHVLlwaIh5oV/Xj3x7ZIx/k0D Rb/ha1owFNMLDI02FYnMONTiw9e5VgGbn/xZ89haFPMvpQ4knLLsw2af8RiAJjBjg6jH mAz6qNmPcmWdWkedI3Ek1pn23PHxX52VZBCECknSrsU9oM6kkecIEPvjUoZfATxvWC7n oiGw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=zY6yETiY8brXISiDFh7MQKhJJI8LnUcV4M9UwqIV7XE=; b=rPJpeZCh05kwdHVA/kl+27TvGQf2jBmvmXg9VKYR8o42M34OfQUCa7HlATneeoBH8o 7N7uyXdcfCE4Z74MttYZ5wkMi4OZKORZ9IE+JB8G0KldAljTkFVUIM1+WXJJAszzD+MN PgcqO90PHA9TrJsERvYIo3MjWxWPmY7VrQhiqWtuik/lOxjnI0iMapG8CZ3UQ077CIwb wgSxyYEWufC3LIAXUoIAHHdHrzsinvjO39LaVOMxnvTbHRJqDxIr0RQ6a2CdnN2grn0m GQL9IqgZG1tnFSWzzK6172fmgLiXERmIXXq2hcR190d0CqtXtIiPo869alceJeD3EP89 qY4A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=y7bqjm3q; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b9si5861505pls.201.2019.07.01.08.35.18; Mon, 01 Jul 2019 08:35:31 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=y7bqjm3q; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728256AbfGAOsB (ORCPT + 99 others); Mon, 1 Jul 2019 10:48:01 -0400 Received: from mail.kernel.org ([198.145.29.99]:43248 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727714AbfGAOsB (ORCPT ); Mon, 1 Jul 2019 10:48:01 -0400 Received: from linux-8ccs (ip5f5ade8b.dynamic.kabel-deutschland.de [95.90.222.139]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 1C4972064B; Mon, 1 Jul 2019 14:47:55 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1561992479; bh=eWd844sqUf7/Cav62XflkGWhhzfKQ2VHhz2g3WuFpG0=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=y7bqjm3qprKdQmXs4IhW0kdDOeWF8ghzgbcsKAJZajarOxYIoGvSk/+LRG4mijRv5 96JYOnmsV3GRwYcBoZMXxr61qt4fEVB9bdjWSKbHw7SwIZpUckxwCz8DHYDCZAwpPm 7hLeSn5yMazZ5AojiCZre4S2MNhNGOQP1SClJFXQ= Date: Mon, 1 Jul 2019 16:47:53 +0200 From: Jessica Yu To: Thiago Jung Bauermann Cc: linux-integrity@vger.kernel.org, linux-security-module@vger.kernel.org, keyrings@vger.kernel.org, linux-crypto@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, Mimi Zohar , Dmitry Kasatkin , James Morris , "Serge E. Hallyn" , David Howells , David Woodhouse , Herbert Xu , "David S. Miller" , Jonathan Corbet , "AKASHI, Takahiro" Subject: Re: [PATCH v12 01/11] MODSIGN: Export module signature definitions Message-ID: <20190701144752.GC25484@linux-8ccs> References: <20190628021934.4260-1-bauerman@linux.ibm.com> <20190628021934.4260-2-bauerman@linux.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Disposition: inline In-Reply-To: <20190628021934.4260-2-bauerman@linux.ibm.com> X-OS: Linux linux-8ccs 5.1.0-rc1-lp150.12.28-default+ x86_64 User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org +++ Thiago Jung Bauermann [27/06/19 23:19 -0300]: >IMA will use the module_signature format for append signatures, so export >the relevant definitions and factor out the code which verifies that the >appended signature trailer is valid. > >Also, create a CONFIG_MODULE_SIG_FORMAT option so that IMA can select it >and be able to use mod_check_sig() without having to depend on either >CONFIG_MODULE_SIG or CONFIG_MODULES. > >Signed-off-by: Thiago Jung Bauermann >Reviewed-by: Mimi Zohar >Cc: Jessica Yu >--- > include/linux/module.h | 3 -- > include/linux/module_signature.h | 44 +++++++++++++++++++++++++ > init/Kconfig | 6 +++- > kernel/Makefile | 1 + > kernel/module.c | 1 + > kernel/module_signature.c | 46 ++++++++++++++++++++++++++ > kernel/module_signing.c | 56 +++++--------------------------- > scripts/Makefile | 2 +- > 8 files changed, 106 insertions(+), 53 deletions(-) > >diff --git a/include/linux/module.h b/include/linux/module.h >index 188998d3dca9..aa56f531cf1e 100644 >--- a/include/linux/module.h >+++ b/include/linux/module.h >@@ -25,9 +25,6 @@ > #include > #include > >-/* In stripped ARM and x86-64 modules, ~ is surprisingly rare. */ >-#define MODULE_SIG_STRING "~Module signature appended~\n" >- Hi Thiago, apologies for the delay. It looks like arch/s390/kernel/machine_kexec_file.c also relies on MODULE_SIG_STRING being defined, so module_signature.h will need to be included there too, otherwise we'll run into a compilation error. Other than that, the module-related changes look good to me: Acked-by: Jessica Yu Thanks! Jessica > /* Not Yet Implemented */ > #define MODULE_SUPPORTED_DEVICE(name) > >diff --git a/include/linux/module_signature.h b/include/linux/module_signature.h >new file mode 100644 >index 000000000000..523617fc5b6a >--- /dev/null >+++ b/include/linux/module_signature.h >@@ -0,0 +1,44 @@ >+/* SPDX-License-Identifier: GPL-2.0+ */ >+/* >+ * Module signature handling. >+ * >+ * Copyright (C) 2012 Red Hat, Inc. All Rights Reserved. >+ * Written by David Howells (dhowells@redhat.com) >+ */ >+ >+#ifndef _LINUX_MODULE_SIGNATURE_H >+#define _LINUX_MODULE_SIGNATURE_H >+ >+/* In stripped ARM and x86-64 modules, ~ is surprisingly rare. */ >+#define MODULE_SIG_STRING "~Module signature appended~\n" >+ >+enum pkey_id_type { >+ PKEY_ID_PGP, /* OpenPGP generated key ID */ >+ PKEY_ID_X509, /* X.509 arbitrary subjectKeyIdentifier */ >+ PKEY_ID_PKCS7, /* Signature in PKCS#7 message */ >+}; >+ >+/* >+ * Module signature information block. >+ * >+ * The constituents of the signature section are, in order: >+ * >+ * - Signer's name >+ * - Key identifier >+ * - Signature data >+ * - Information block >+ */ >+struct module_signature { >+ u8 algo; /* Public-key crypto algorithm [0] */ >+ u8 hash; /* Digest algorithm [0] */ >+ u8 id_type; /* Key identifier type [PKEY_ID_PKCS7] */ >+ u8 signer_len; /* Length of signer's name [0] */ >+ u8 key_id_len; /* Length of key identifier [0] */ >+ u8 __pad[3]; >+ __be32 sig_len; /* Length of signature data */ >+}; >+ >+int mod_check_sig(const struct module_signature *ms, size_t file_len, >+ const char *name); >+ >+#endif /* _LINUX_MODULE_SIGNATURE_H */ >diff --git a/init/Kconfig b/init/Kconfig >index 8b9ffe236e4f..c2286a3c74c5 100644 >--- a/init/Kconfig >+++ b/init/Kconfig >@@ -1852,6 +1852,10 @@ config BASE_SMALL > default 0 if BASE_FULL > default 1 if !BASE_FULL > >+config MODULE_SIG_FORMAT >+ def_bool n >+ select SYSTEM_DATA_VERIFICATION >+ > menuconfig MODULES > bool "Enable loadable module support" > option modules >@@ -1929,7 +1933,7 @@ config MODULE_SRCVERSION_ALL > config MODULE_SIG > bool "Module signature verification" > depends on MODULES >- select SYSTEM_DATA_VERIFICATION >+ select MODULE_SIG_FORMAT > help > Check modules for valid signatures upon load: the signature > is simply appended to the module. For more information see >diff --git a/kernel/Makefile b/kernel/Makefile >index 33824f0385b3..f29ae2997a43 100644 >--- a/kernel/Makefile >+++ b/kernel/Makefile >@@ -58,6 +58,7 @@ endif > obj-$(CONFIG_UID16) += uid16.o > obj-$(CONFIG_MODULES) += module.o > obj-$(CONFIG_MODULE_SIG) += module_signing.o >+obj-$(CONFIG_MODULE_SIG_FORMAT) += module_signature.o > obj-$(CONFIG_KALLSYMS) += kallsyms.o > obj-$(CONFIG_BSD_PROCESS_ACCT) += acct.o > obj-$(CONFIG_CRASH_CORE) += crash_core.o >diff --git a/kernel/module.c b/kernel/module.c >index 6e6712b3aaf5..2712f4d217f5 100644 >--- a/kernel/module.c >+++ b/kernel/module.c >@@ -19,6 +19,7 @@ > #include > #include > #include >+#include > #include > #include > #include >diff --git a/kernel/module_signature.c b/kernel/module_signature.c >new file mode 100644 >index 000000000000..4224a1086b7d >--- /dev/null >+++ b/kernel/module_signature.c >@@ -0,0 +1,46 @@ >+// SPDX-License-Identifier: GPL-2.0+ >+/* >+ * Module signature checker >+ * >+ * Copyright (C) 2012 Red Hat, Inc. All Rights Reserved. >+ * Written by David Howells (dhowells@redhat.com) >+ */ >+ >+#include >+#include >+#include >+#include >+ >+/** >+ * mod_check_sig - check that the given signature is sane >+ * >+ * @ms: Signature to check. >+ * @file_len: Size of the file to which @ms is appended. >+ * @name: What is being checked. Used for error messages. >+ */ >+int mod_check_sig(const struct module_signature *ms, size_t file_len, >+ const char *name) >+{ >+ if (be32_to_cpu(ms->sig_len) >= file_len - sizeof(*ms)) >+ return -EBADMSG; >+ >+ if (ms->id_type != PKEY_ID_PKCS7) { >+ pr_err("%s: Module is not signed with expected PKCS#7 message\n", >+ name); >+ return -ENOPKG; >+ } >+ >+ if (ms->algo != 0 || >+ ms->hash != 0 || >+ ms->signer_len != 0 || >+ ms->key_id_len != 0 || >+ ms->__pad[0] != 0 || >+ ms->__pad[1] != 0 || >+ ms->__pad[2] != 0) { >+ pr_err("%s: PKCS#7 signature info has unexpected non-zero params\n", >+ name); >+ return -EBADMSG; >+ } >+ >+ return 0; >+} >diff --git a/kernel/module_signing.c b/kernel/module_signing.c >index 6b9a926fd86b..cdd04a6b8074 100644 >--- a/kernel/module_signing.c >+++ b/kernel/module_signing.c >@@ -11,37 +11,13 @@ > > #include > #include >+#include >+#include > #include > #include > #include > #include "module-internal.h" > >-enum pkey_id_type { >- PKEY_ID_PGP, /* OpenPGP generated key ID */ >- PKEY_ID_X509, /* X.509 arbitrary subjectKeyIdentifier */ >- PKEY_ID_PKCS7, /* Signature in PKCS#7 message */ >-}; >- >-/* >- * Module signature information block. >- * >- * The constituents of the signature section are, in order: >- * >- * - Signer's name >- * - Key identifier >- * - Signature data >- * - Information block >- */ >-struct module_signature { >- u8 algo; /* Public-key crypto algorithm [0] */ >- u8 hash; /* Digest algorithm [0] */ >- u8 id_type; /* Key identifier type [PKEY_ID_PKCS7] */ >- u8 signer_len; /* Length of signer's name [0] */ >- u8 key_id_len; /* Length of key identifier [0] */ >- u8 __pad[3]; >- __be32 sig_len; /* Length of signature data */ >-}; >- > /* > * Verify the signature on a module. > */ >@@ -49,6 +25,7 @@ int mod_verify_sig(const void *mod, struct load_info *info) > { > struct module_signature ms; > size_t sig_len, modlen = info->len; >+ int ret; > > pr_devel("==>%s(,%zu)\n", __func__, modlen); > >@@ -56,32 +33,15 @@ int mod_verify_sig(const void *mod, struct load_info *info) > return -EBADMSG; > > memcpy(&ms, mod + (modlen - sizeof(ms)), sizeof(ms)); >- modlen -= sizeof(ms); >+ >+ ret = mod_check_sig(&ms, modlen, info->name); >+ if (ret) >+ return ret; > > sig_len = be32_to_cpu(ms.sig_len); >- if (sig_len >= modlen) >- return -EBADMSG; >- modlen -= sig_len; >+ modlen -= sig_len + sizeof(ms); > info->len = modlen; > >- if (ms.id_type != PKEY_ID_PKCS7) { >- pr_err("%s: Module is not signed with expected PKCS#7 message\n", >- info->name); >- return -ENOPKG; >- } >- >- if (ms.algo != 0 || >- ms.hash != 0 || >- ms.signer_len != 0 || >- ms.key_id_len != 0 || >- ms.__pad[0] != 0 || >- ms.__pad[1] != 0 || >- ms.__pad[2] != 0) { >- pr_err("%s: PKCS#7 signature info has unexpected non-zero params\n", >- info->name); >- return -EBADMSG; >- } >- > return verify_pkcs7_signature(mod, modlen, mod + modlen, sig_len, > VERIFY_USE_SECONDARY_KEYRING, > VERIFYING_MODULE_SIGNATURE, >diff --git a/scripts/Makefile b/scripts/Makefile >index 9d442ee050bd..52098b080ab7 100644 >--- a/scripts/Makefile >+++ b/scripts/Makefile >@@ -17,7 +17,7 @@ hostprogs-$(CONFIG_VT) += conmakehash > hostprogs-$(BUILD_C_RECORDMCOUNT) += recordmcount > hostprogs-$(CONFIG_BUILDTIME_EXTABLE_SORT) += sortextable > hostprogs-$(CONFIG_ASN1) += asn1_compiler >-hostprogs-$(CONFIG_MODULE_SIG) += sign-file >+hostprogs-$(CONFIG_MODULE_SIG_FORMAT) += sign-file > hostprogs-$(CONFIG_SYSTEM_TRUSTED_KEYRING) += extract-cert > hostprogs-$(CONFIG_SYSTEM_EXTRA_CERTIFICATE) += insert-sys-cert >