X-Git-Url: https://asedeno.scripts.mit.edu/gitweb/?a=blobdiff_plain;f=init%2FKconfig;h=b4daad2bac233cfc32744bfb7b78a6d0ab466744;hb=b4b61b224d12ef12ff21cc598acce0ee818903ab;hp=57123594a7ca3a80ed23b8862f5c0f3f961b05df;hpb=e37e3bc7e265d05d00f14079767537699cf6bd46;p=linux.git diff --git a/init/Kconfig b/init/Kconfig index 57123594a7ca..b4daad2bac23 100644 --- a/init/Kconfig +++ b/init/Kconfig @@ -1963,6 +1963,10 @@ config BASE_SMALL default 0 if BASE_FULL default 1 if !BASE_FULL +config MODULE_SIG_FORMAT + def_bool n + select SYSTEM_DATA_VERIFICATION + menuconfig MODULES bool "Enable loadable module support" option modules @@ -2047,7 +2051,7 @@ config MODULE_SRCVERSION_ALL config MODULE_SIG bool "Module signature verification" - select SYSTEM_DATA_VERIFICATION + select MODULE_SIG_FORMAT help Check modules for valid signatures upon load: the signature is simply appended to the module. For more information see @@ -2057,6 +2061,11 @@ config MODULE_SIG kernel build dependency so that the signing tool can use its crypto library. + You should enable this option if you wish to use either + CONFIG_SECURITY_LOCKDOWN_LSM or lockdown functionality imposed via + another LSM - otherwise unsigned modules will be loadable regardless + of the lockdown policy. + !!!WARNING!!! If you enable this option, you MUST make sure that the module DOES NOT get stripped after being signed. This includes the debuginfo strip done by some packagers (such as rpmbuild) and