diff options
| author | Linus Torvalds <[email protected]> | 2019-03-10 17:32:04 -0700 | 
|---|---|---|
| committer | Linus Torvalds <[email protected]> | 2019-03-10 17:32:04 -0700 | 
| commit | c3665a6be5de16cf6670a00003642114c44d8a70 (patch) | |
| tree | 118ea5fd3cca09eeac0d7dc550915d0e338e4dfe /include/linux/verification.h | |
| parent | 12ad143e1b803e541e48b8ba40f550250259ecdd (diff) | |
| parent | 2e884fc9759d8816630d3c30694721a39b7396e0 (diff) | |
Merge branch 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security
Pull integrity updates from James Morris:
 "Mimi Zohar says:
   'Linux 5.0 introduced the platform keyring to allow verifying the IMA
    kexec kernel image signature using the pre-boot keys. This pull
    request similarly makes keys on the platform keyring accessible for
    verifying the PE kernel image signature.
    Also included in this pull request is a new IMA hook that tags tmp
    files, in policy, indicating the file hash needs to be calculated.
    The remaining patches are cleanup'"
* 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security:
  evm: Use defined constant for UUID representation
  ima: define ima_post_create_tmpfile() hook and add missing call
  evm: remove set but not used variable 'xattr'
  encrypted-keys: fix Opt_err/Opt_error = -1
  kexec, KEYS: Make use of platform keyring for signature verify
  integrity, KEYS: add a reference to platform keyring
Diffstat (limited to 'include/linux/verification.h')
| -rw-r--r-- | include/linux/verification.h | 1 | 
1 files changed, 1 insertions, 0 deletions
| diff --git a/include/linux/verification.h b/include/linux/verification.h index cfa4730d607a..018fb5f13d44 100644 --- a/include/linux/verification.h +++ b/include/linux/verification.h @@ -17,6 +17,7 @@   * should be used.   */  #define VERIFY_USE_SECONDARY_KEYRING ((struct key *)1UL) +#define VERIFY_USE_PLATFORM_KEYRING  ((struct key *)2UL)  /*   * The use to which an asymmetric key is being put. |