diff options
author | David Howells <dhowells@redhat.com> | 2012-09-26 10:09:50 +0100 |
---|---|---|
committer | Rusty Russell <rusty@rustcorp.com.au> | 2012-10-10 20:01:19 +1030 |
commit | 1d0059f3a468825b5fc5405c636a2f6e02707ffa (patch) | |
tree | 0eef1243a093410f39564051d8904c8041e1e717 | |
parent | 106a4ee258d14818467829bf0e12aeae14c16cd7 (diff) | |
download | linux-1d0059f3a468825b5fc5405c636a2f6e02707ffa.tar.gz linux-1d0059f3a468825b5fc5405c636a2f6e02707ffa.tar.bz2 linux-1d0059f3a468825b5fc5405c636a2f6e02707ffa.zip |
MODSIGN: Add FIPS policy
If we're in FIPS mode, we should panic if we fail to verify the signature on a
module or we're asked to load an unsigned module in signature enforcing mode.
Possibly FIPS mode should automatically enable enforcing mode.
Signed-off-by: David Howells <dhowells@redhat.com>
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
-rw-r--r-- | kernel/module.c | 4 |
1 files changed, 4 insertions, 0 deletions
diff --git a/kernel/module.c b/kernel/module.c index 68c564edb2c1..0e2da8695f8e 100644 --- a/kernel/module.c +++ b/kernel/module.c @@ -58,6 +58,7 @@ #include <linux/jump_label.h> #include <linux/pfn.h> #include <linux/bsearch.h> +#include <linux/fips.h> #include "module-internal.h" #define CREATE_TRACE_POINTS @@ -2447,6 +2448,9 @@ static int module_sig_check(struct load_info *info, } /* Not having a signature is only an error if we're strict. */ + if (err < 0 && fips_enabled) + panic("Module verification failed with error %d in FIPS mode\n", + err); if (err == -ENOKEY && !sig_enforce) err = 0; |