aboutsummaryrefslogtreecommitdiffstats
path: root/init
diff options
context:
space:
mode:
authorLinus Torvalds <torvalds@linux-foundation.org>2015-09-08 15:41:25 -0400
committerLinus Torvalds <torvalds@linux-foundation.org>2015-09-08 15:41:25 -0400
commitb793c005ceabf6db0b17494b0ec67ade6796bb34 (patch)
tree080c884f04254403ec9564742f591a9fd9b7e95a /init
parent6f0a2fc1feb19bd142961a39dc118e7e55418b3f (diff)
parent07f081fb5057b2ea98baeca3a47bf0eb33e94aa1 (diff)
Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security
Pull security subsystem updates from James Morris: "Highlights: - PKCS#7 support added to support signed kexec, also utilized for module signing. See comments in 3f1e1bea. ** NOTE: this requires linking against the OpenSSL library, which must be installed, e.g. the openssl-devel on Fedora ** - Smack - add IPv6 host labeling; ignore labels on kernel threads - support smack labeling mounts which use binary mount data - SELinux: - add ioctl whitelisting (see http://kernsec.org/files/lss2015/vanderstoep.pdf) - fix mprotect PROT_EXEC regression caused by mm change - Seccomp: - add ptrace options for suspend/resume" * 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security: (57 commits) PKCS#7: Add OIDs for sha224, sha284 and sha512 hash algos and use them Documentation/Changes: Now need OpenSSL devel packages for module signing scripts: add extract-cert and sign-file to .gitignore modsign: Handle signing key in source tree modsign: Use if_changed rule for extracting cert from module signing key Move certificate handling to its own directory sign-file: Fix warning about BIO_reset() return value PKCS#7: Add MODULE_LICENSE() to test module Smack - Fix build error with bringup unconfigured sign-file: Document dependency on OpenSSL devel libraries PKCS#7: Appropriately restrict authenticated attributes and content type KEYS: Add a name for PKEY_ID_PKCS7 PKCS#7: Improve and export the X.509 ASN.1 time object decoder modsign: Use extract-cert to process CONFIG_SYSTEM_TRUSTED_KEYS extract-cert: Cope with multiple X.509 certificates in a single file sign-file: Generate CMS message as signature instead of PKCS#7 PKCS#7: Support CMS messages also [RFC5652] X.509: Change recorded SKID & AKID to not include Subject or Issuer PKCS#7: Check content type and versions MAINTAINERS: The keyrings mailing list has moved ...
Diffstat (limited to 'init')
-rw-r--r--init/Kconfig40
1 files changed, 21 insertions, 19 deletions
diff --git a/init/Kconfig b/init/Kconfig
index 9cabd866b34b..02da9f1fd9df 100644
--- a/init/Kconfig
+++ b/init/Kconfig
@@ -1765,17 +1765,23 @@ config MMAP_ALLOW_UNINITIALIZED
1765 1765
1766 See Documentation/nommu-mmap.txt for more information. 1766 See Documentation/nommu-mmap.txt for more information.
1767 1767
1768config SYSTEM_TRUSTED_KEYRING 1768config SYSTEM_DATA_VERIFICATION
1769 bool "Provide system-wide ring of trusted keys" 1769 def_bool n
1770 depends on KEYS 1770 select SYSTEM_TRUSTED_KEYRING
1771 select KEYS
1772 select CRYPTO
1773 select ASYMMETRIC_KEY_TYPE
1774 select ASYMMETRIC_PUBLIC_KEY_SUBTYPE
1775 select PUBLIC_KEY_ALGO_RSA
1776 select ASN1
1777 select OID_REGISTRY
1778 select X509_CERTIFICATE_PARSER
1779 select PKCS7_MESSAGE_PARSER
1771 help 1780 help
1772 Provide a system keyring to which trusted keys can be added. Keys in 1781 Provide PKCS#7 message verification using the contents of the system
1773 the keyring are considered to be trusted. Keys may be added at will 1782 trusted keyring to provide public keys. This then can be used for
1774 by the kernel from compiled-in data and from hardware key stores, but 1783 module verification, kexec image verification and firmware blob
1775 userspace may only add extra keys if those keys can be verified by 1784 verification.
1776 keys already in the keyring.
1777
1778 Keys in this keyring are used by module signature checking.
1779 1785
1780config PROFILING 1786config PROFILING
1781 bool "Profiling support" 1787 bool "Profiling support"
@@ -1885,20 +1891,16 @@ config MODULE_SRCVERSION_ALL
1885config MODULE_SIG 1891config MODULE_SIG
1886 bool "Module signature verification" 1892 bool "Module signature verification"
1887 depends on MODULES 1893 depends on MODULES
1888 select SYSTEM_TRUSTED_KEYRING 1894 select SYSTEM_DATA_VERIFICATION
1889 select KEYS
1890 select CRYPTO
1891 select ASYMMETRIC_KEY_TYPE
1892 select ASYMMETRIC_PUBLIC_KEY_SUBTYPE
1893 select PUBLIC_KEY_ALGO_RSA
1894 select ASN1
1895 select OID_REGISTRY
1896 select X509_CERTIFICATE_PARSER
1897 help 1895 help
1898 Check modules for valid signatures upon load: the signature 1896 Check modules for valid signatures upon load: the signature
1899 is simply appended to the module. For more information see 1897 is simply appended to the module. For more information see
1900 Documentation/module-signing.txt. 1898 Documentation/module-signing.txt.
1901 1899
1900 Note that this option adds the OpenSSL development packages as a
1901 kernel build dependency so that the signing tool can use its crypto
1902 library.
1903
1902 !!!WARNING!!! If you enable this option, you MUST make sure that the 1904 !!!WARNING!!! If you enable this option, you MUST make sure that the
1903 module DOES NOT get stripped after being signed. This includes the 1905 module DOES NOT get stripped after being signed. This includes the
1904 debuginfo strip done by some packagers (such as rpmbuild) and 1906 debuginfo strip done by some packagers (such as rpmbuild) and