From patchwork Fri Nov 12 12:44:09 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Roberto Sassu X-Patchwork-Id: 12616705 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 324A8C433F5 for ; Fri, 12 Nov 2021 12:44:58 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 1F8A061027 for ; Fri, 12 Nov 2021 12:44:58 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235190AbhKLMrr (ORCPT ); Fri, 12 Nov 2021 07:47:47 -0500 Received: from frasgout.his.huawei.com ([185.176.79.56]:4088 "EHLO frasgout.his.huawei.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235087AbhKLMrf (ORCPT ); Fri, 12 Nov 2021 07:47:35 -0500 Received: from fraeml714-chm.china.huawei.com (unknown [172.18.147.200]) by frasgout.his.huawei.com (SkyGuard) with ESMTP id 4HrJ9F4J73z67bVy; Fri, 12 Nov 2021 20:41:05 +0800 (CST) Received: from roberto-ThinkStation-P620.huawei.com (10.204.63.22) by fraeml714-chm.china.huawei.com (10.206.15.33) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.15; Fri, 12 Nov 2021 13:44:42 +0100 From: Roberto Sassu To: , , , , , CC: , , , , , , Roberto Sassu Subject: [RFC][PATCH 3/5] fsverity: Do initialization earlier Date: Fri, 12 Nov 2021 13:44:09 +0100 Message-ID: <20211112124411.1948809-4-roberto.sassu@huawei.com> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20211112124411.1948809-1-roberto.sassu@huawei.com> References: <20211112124411.1948809-1-roberto.sassu@huawei.com> MIME-Version: 1.0 X-Originating-IP: [10.204.63.22] X-ClientProxiedBy: lhreml753-chm.china.huawei.com (10.201.108.203) To fraeml714-chm.china.huawei.com (10.206.15.33) X-CFilter-Loop: Reflected Precedence: bulk List-ID: X-Mailing-List: linux-fscrypt@vger.kernel.org Perform fsverity initialization with core_initcall(), to ensure that fsverity is available also very early during the boot process. More specifically, allow files in the rootfs filesystem (from an initial ram disk) to be protected with fsverity and be checked with LSMs such as IPE. Signed-off-by: Roberto Sassu --- fs/verity/init.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/fs/verity/init.c b/fs/verity/init.c index c98b7016f446..910083919e1d 100644 --- a/fs/verity/init.c +++ b/fs/verity/init.c @@ -58,4 +58,4 @@ static int __init fsverity_init(void) fsverity_exit_info_cache(); return err; } -late_initcall(fsverity_init) +core_initcall(fsverity_init)