[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <6426.1337945879@redhat.com>
Date: Fri, 25 May 2012 12:37:59 +0100
From: David Howells <dhowells@...hat.com>
To: "Kasatkin, Dmitry" <dmitry.kasatkin@...el.com>
Cc: dhowells@...hat.com, Rusty Russell <rusty@...tcorp.com.au>,
kyle@...artin.ca, linux-kernel@...r.kernel.org,
linux-security-module@...r.kernel.org, keyrings@...ux-nfs.org
Subject: Re: [PATCH 00/23] Crypto keys and module signing
Kasatkin, Dmitry <dmitry.kasatkin@...el.com> wrote:
> > In some ways that is cleaner, but it's also nice to avoid adding another
> > syscall.
>
> There is no additional syscall.
> signature is passed is 'ima=' parameter to init_module()
> like
Exactly what I was thinking of, though I wouldn't call it "ima=" as that
doesn't seem specific enough.
You could also append it to the binary image and have the kernel extract it
from there as if the module file had had the signature attached during the
build.
I don't particularly favour holding the signature in an xattr, though, as that
assumes that underlying fs has the capability to hold it and means that the
package installation mechanism must know how to fill in xattrs.
David
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists