Split fsverity_init in two phases.
First load the verified keys, and then only lock the keyring after apexd has run. This is in preperation for on-device signing, which will need to add another key to the fs-verity keyring before it's locked. Note that I've moved loading of the verified keys up a bit; fsverity_init used to load keys from Keymaster, but it currently doesn't, so there's no need to wait for it. Bug: 165630556 Test: boot, cat /proc/keys Change-Id: I077673575ae3dafcf3126d8c544fe7f8d34c0225
Loading
Please register or sign in to comment