diff options
author | Lakshmi Ramasubramanian <nramas@linux.microsoft.com> | 2020-01-22 17:32:04 -0800 |
---|---|---|
committer | Mimi Zohar <zohar@linux.ibm.com> | 2020-01-23 07:35:11 -0500 |
commit | 9f81a2eda488fef4c4e33a3965ae1759eb7db280 (patch) | |
tree | 822a66bb5abaf5dfcd3e224257ce5a97f3c3e7f1 /security/integrity/ima/Makefile | |
parent | IMA: pre-allocate buffer to hold keyrings string (diff) | |
download | linux-dev-9f81a2eda488fef4c4e33a3965ae1759eb7db280.tar.xz linux-dev-9f81a2eda488fef4c4e33a3965ae1759eb7db280.zip |
IMA: Define workqueue for early boot key measurements
Measuring keys requires a custom IMA policy to be loaded. Keys created
or updated before a custom IMA policy is loaded should be queued and
will be processed after a custom policy is loaded.
This patch defines a workqueue for queuing keys when a custom IMA policy
has not yet been loaded. An intermediate Kconfig boolean option namely
IMA_QUEUE_EARLY_BOOT_KEYS is used to declare the workqueue functions.
A flag namely ima_process_keys is used to check if the key should be
queued or should be processed immediately.
Signed-off-by: Lakshmi Ramasubramanian <nramas@linux.microsoft.com>
Signed-off-by: Mimi Zohar <zohar@linux.ibm.com>
Diffstat (limited to 'security/integrity/ima/Makefile')
-rw-r--r-- | security/integrity/ima/Makefile | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/security/integrity/ima/Makefile b/security/integrity/ima/Makefile index 3e9d0ad68c7b..064a256f8725 100644 --- a/security/integrity/ima/Makefile +++ b/security/integrity/ima/Makefile @@ -13,3 +13,4 @@ ima-$(CONFIG_IMA_APPRAISE_MODSIG) += ima_modsig.o ima-$(CONFIG_HAVE_IMA_KEXEC) += ima_kexec.o obj-$(CONFIG_IMA_BLACKLIST_KEYRING) += ima_mok.o obj-$(CONFIG_IMA_MEASURE_ASYMMETRIC_KEYS) += ima_asymmetric_keys.o +obj-$(CONFIG_IMA_QUEUE_EARLY_BOOT_KEYS) += ima_queue_keys.o |