aboutsummaryrefslogtreecommitdiffstats
path: root/security/integrity/ima/Makefile
diff options
context:
space:
mode:
authorLakshmi Ramasubramanian <nramas@linux.microsoft.com>2020-01-22 17:32:04 -0800
committerMimi Zohar <zohar@linux.ibm.com>2020-01-23 07:35:11 -0500
commit9f81a2eda488fef4c4e33a3965ae1759eb7db280 (patch)
tree822a66bb5abaf5dfcd3e224257ce5a97f3c3e7f1 /security/integrity/ima/Makefile
parentIMA: pre-allocate buffer to hold keyrings string (diff)
downloadlinux-dev-9f81a2eda488fef4c4e33a3965ae1759eb7db280.tar.xz
linux-dev-9f81a2eda488fef4c4e33a3965ae1759eb7db280.zip
IMA: Define workqueue for early boot key measurements
Measuring keys requires a custom IMA policy to be loaded. Keys created or updated before a custom IMA policy is loaded should be queued and will be processed after a custom policy is loaded. This patch defines a workqueue for queuing keys when a custom IMA policy has not yet been loaded. An intermediate Kconfig boolean option namely IMA_QUEUE_EARLY_BOOT_KEYS is used to declare the workqueue functions. A flag namely ima_process_keys is used to check if the key should be queued or should be processed immediately. Signed-off-by: Lakshmi Ramasubramanian <nramas@linux.microsoft.com> Signed-off-by: Mimi Zohar <zohar@linux.ibm.com>
Diffstat (limited to 'security/integrity/ima/Makefile')
-rw-r--r--security/integrity/ima/Makefile1
1 files changed, 1 insertions, 0 deletions
diff --git a/security/integrity/ima/Makefile b/security/integrity/ima/Makefile
index 3e9d0ad68c7b..064a256f8725 100644
--- a/security/integrity/ima/Makefile
+++ b/security/integrity/ima/Makefile
@@ -13,3 +13,4 @@ ima-$(CONFIG_IMA_APPRAISE_MODSIG) += ima_modsig.o
ima-$(CONFIG_HAVE_IMA_KEXEC) += ima_kexec.o
obj-$(CONFIG_IMA_BLACKLIST_KEYRING) += ima_mok.o
obj-$(CONFIG_IMA_MEASURE_ASYMMETRIC_KEYS) += ima_asymmetric_keys.o
+obj-$(CONFIG_IMA_QUEUE_EARLY_BOOT_KEYS) += ima_queue_keys.o