diff options
author | Dmitry Kasatkin <d.kasatkin@samsung.com> | 2014-11-05 17:01:15 +0200 |
---|---|---|
committer | Mimi Zohar <zohar@linux.vnet.ibm.com> | 2014-11-17 23:12:01 -0500 |
commit | c9cd2ce2bc6313aafa33f8e28d29a8690252f219 (patch) | |
tree | 6918661e956daa2bb688ea70103df3cc8859e246 /include/linux/integrity.h | |
parent | fd5f4e9054acbf4f22fac81a358baf3c27aa42ac (diff) | |
download | lwn-c9cd2ce2bc6313aafa33f8e28d29a8690252f219.tar.gz lwn-c9cd2ce2bc6313aafa33f8e28d29a8690252f219.zip |
integrity: provide a hook to load keys when rootfs is ready
Keys can only be loaded once the rootfs is mounted. Initcalls
are not suitable for that. This patch defines a special hook
to load the x509 public keys onto the IMA keyring, before
attempting to access any file. The keys are required for
verifying the file's signature. The hook is called after the
root filesystem is mounted and before the kernel calls 'init'.
Changes in v3:
* added more explanation to the patch description (Mimi)
Changes in v2:
* Hook renamed as 'integrity_load_keys()' to handle both IMA and EVM
keys by integrity subsystem.
* Hook patch moved after defining loading functions
Signed-off-by: Dmitry Kasatkin <d.kasatkin@samsung.com>
Signed-off-by: Mimi Zohar <zohar@linux.vnet.ibm.com>
Diffstat (limited to 'include/linux/integrity.h')
-rw-r--r-- | include/linux/integrity.h | 6 |
1 files changed, 6 insertions, 0 deletions
diff --git a/include/linux/integrity.h b/include/linux/integrity.h index 83222cebd47b..c2d6082a1a4c 100644 --- a/include/linux/integrity.h +++ b/include/linux/integrity.h @@ -24,6 +24,7 @@ enum integrity_status { #ifdef CONFIG_INTEGRITY extern struct integrity_iint_cache *integrity_inode_get(struct inode *inode); extern void integrity_inode_free(struct inode *inode); +extern void __init integrity_load_keys(void); #else static inline struct integrity_iint_cache * @@ -36,5 +37,10 @@ static inline void integrity_inode_free(struct inode *inode) { return; } + +static inline void integrity_load_keys(void) +{ +} #endif /* CONFIG_INTEGRITY */ + #endif /* _LINUX_INTEGRITY_H */ |