diff options
author | Roberto Sassu <roberto.sassu@huawei.com> | 2024-02-15 11:31:13 +0100 |
---|---|---|
committer | Paul Moore <paul@paul-moore.com> | 2024-02-16 05:43:48 +0100 |
commit | b6c0dec9f78bc691166d60347b52b3adf03d5875 (patch) | |
tree | b7bb4d4814312b92770129b2c440146aad4a121e /security/security.c | |
parent | ima: Make it independent from 'integrity' LSM (diff) | |
download | linux-b6c0dec9f78bc691166d60347b52b3adf03d5875.tar.xz linux-b6c0dec9f78bc691166d60347b52b3adf03d5875.zip |
integrity: Remove LSM
Since now IMA and EVM use their own integrity metadata, it is safe to
remove the 'integrity' LSM, with its management of integrity metadata.
Keep the iint.c file only for loading IMA and EVM keys at boot, and for
creating the integrity directory in securityfs (we need to keep it for
retrocompatibility reasons).
Signed-off-by: Roberto Sassu <roberto.sassu@huawei.com>
Reviewed-by: Casey Schaufler <casey@schaufler-ca.com>
Reviewed-by: Stefan Berger <stefanb@linux.ibm.com>
Reviewed-by: Mimi Zohar <zohar@linux.ibm.com>
Acked-by: Mimi Zohar <zohar@linux.ibm.com>
Signed-off-by: Paul Moore <paul@paul-moore.com>
Diffstat (limited to 'security/security.c')
-rw-r--r-- | security/security.c | 2 |
1 files changed, 0 insertions, 2 deletions
diff --git a/security/security.c b/security/security.c index e08c1aa82edf..cbdc9bebe802 100644 --- a/security/security.c +++ b/security/security.c @@ -19,7 +19,6 @@ #include <linux/kernel.h> #include <linux/kernel_read_file.h> #include <linux/lsm_hooks.h> -#include <linux/integrity.h> #include <linux/fsnotify.h> #include <linux/mman.h> #include <linux/mount.h> @@ -1597,7 +1596,6 @@ static void inode_free_by_rcu(struct rcu_head *head) */ void security_inode_free(struct inode *inode) { - integrity_inode_free(inode); call_void_hook(inode_free_security, inode); /* * The inode may still be referenced in a path walk and |