aboutsummaryrefslogtreecommitdiffstats
path: root/kernel
diff options
context:
space:
mode:
authorDavid Howells <dhowells@redhat.com>2013-08-30 11:07:37 -0400
committerDavid Howells <dhowells@redhat.com>2013-09-25 12:17:01 -0400
commit008643b86c5f33c115c84ccdda1725cac3ad50ad (patch)
tree951ea0d3d7b84ce3570da17f03f45a53f3e4b35d /kernel
parentb56e5a17b6b9acd16997960504b9940d0d7984e7 (diff)
KEYS: Add a 'trusted' flag and a 'trusted only' flag
Add KEY_FLAG_TRUSTED to indicate that a key either comes from a trusted source or had a cryptographic signature chain that led back to a trusted key the kernel already possessed. Add KEY_FLAGS_TRUSTED_ONLY to indicate that a keyring will only accept links to keys marked with KEY_FLAGS_TRUSTED. Signed-off-by: David Howells <dhowells@redhat.com> Reviewed-by: Kees Cook <keescook@chromium.org>
Diffstat (limited to 'kernel')
-rw-r--r--kernel/system_keyring.c4
1 files changed, 3 insertions, 1 deletions
diff --git a/kernel/system_keyring.c b/kernel/system_keyring.c
index 51c35141a13a..5296721eca5b 100644
--- a/kernel/system_keyring.c
+++ b/kernel/system_keyring.c
@@ -40,6 +40,7 @@ static __init int system_trusted_keyring_init(void)
40 if (IS_ERR(system_trusted_keyring)) 40 if (IS_ERR(system_trusted_keyring))
41 panic("Can't allocate system trusted keyring\n"); 41 panic("Can't allocate system trusted keyring\n");
42 42
43 set_bit(KEY_FLAG_TRUSTED_ONLY, &system_trusted_keyring->flags);
43 return 0; 44 return 0;
44} 45}
45 46
@@ -82,7 +83,8 @@ static __init int load_system_certificate_list(void)
82 plen, 83 plen,
83 (KEY_POS_ALL & ~KEY_POS_SETATTR) | 84 (KEY_POS_ALL & ~KEY_POS_SETATTR) |
84 KEY_USR_VIEW, 85 KEY_USR_VIEW,
85 KEY_ALLOC_NOT_IN_QUOTA); 86 KEY_ALLOC_NOT_IN_QUOTA |
87 KEY_ALLOC_TRUSTED);
86 if (IS_ERR(key)) { 88 if (IS_ERR(key)) {
87 pr_err("Problem loading in-kernel X.509 certificate (%ld)\n", 89 pr_err("Problem loading in-kernel X.509 certificate (%ld)\n",
88 PTR_ERR(key)); 90 PTR_ERR(key));