diff options
author | Lakshmi Ramasubramanian <nramas@linux.microsoft.com> | 2020-01-23 04:32:04 +0300 |
---|---|---|
committer | Mimi Zohar <zohar@linux.ibm.com> | 2020-01-23 15:35:11 +0300 |
commit | 9f81a2eda488fef4c4e33a3965ae1759eb7db280 (patch) | |
tree | 822a66bb5abaf5dfcd3e224257ce5a97f3c3e7f1 /security/integrity/ima/Makefile | |
parent | 5c7bac9fb2c5929a3b8600c45a972aabf9f410b5 (diff) | |
download | linux-9f81a2eda488fef4c4e33a3965ae1759eb7db280.tar.xz |
IMA: Define workqueue for early boot key measurements
Measuring keys requires a custom IMA policy to be loaded. Keys created
or updated before a custom IMA policy is loaded should be queued and
will be processed after a custom policy is loaded.
This patch defines a workqueue for queuing keys when a custom IMA policy
has not yet been loaded. An intermediate Kconfig boolean option namely
IMA_QUEUE_EARLY_BOOT_KEYS is used to declare the workqueue functions.
A flag namely ima_process_keys is used to check if the key should be
queued or should be processed immediately.
Signed-off-by: Lakshmi Ramasubramanian <nramas@linux.microsoft.com>
Signed-off-by: Mimi Zohar <zohar@linux.ibm.com>
Diffstat (limited to 'security/integrity/ima/Makefile')
-rw-r--r-- | security/integrity/ima/Makefile | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/security/integrity/ima/Makefile b/security/integrity/ima/Makefile index 3e9d0ad68c7b..064a256f8725 100644 --- a/security/integrity/ima/Makefile +++ b/security/integrity/ima/Makefile @@ -13,3 +13,4 @@ ima-$(CONFIG_IMA_APPRAISE_MODSIG) += ima_modsig.o ima-$(CONFIG_HAVE_IMA_KEXEC) += ima_kexec.o obj-$(CONFIG_IMA_BLACKLIST_KEYRING) += ima_mok.o obj-$(CONFIG_IMA_MEASURE_ASYMMETRIC_KEYS) += ima_asymmetric_keys.o +obj-$(CONFIG_IMA_QUEUE_EARLY_BOOT_KEYS) += ima_queue_keys.o |