mirror of
https://github.com/torvalds/linux.git
synced 2024-12-29 06:12:08 +00:00
d19967764b
Many UEFI Linux distributions boot using shim. The UEFI shim provides what is called Machine Owner Keys (MOK). Shim uses both the UEFI Secure Boot DB and MOK keys to validate the next step in the boot chain. The MOK facility can be used to import user generated keys. These keys can be used to sign an end-users development kernel build. When Linux boots, both UEFI Secure Boot DB and MOK keys get loaded in the Linux .platform keyring. Define a new Linux keyring called machine. This keyring shall contain just MOK keys and not the remaining keys in the platform keyring. This new machine keyring will be used in follow on patches. Unlike keys in the platform keyring, keys contained in the machine keyring will be trusted within the kernel if the end-user has chosen to do so. Signed-off-by: Eric Snowberg <eric.snowberg@oracle.com> Tested-by: Jarkko Sakkinen <jarkko@kernel.org> Tested-by: Mimi Zohar <zohar@linux.ibm.com> Reviewed-by: Jarkko Sakkinen <jarkko@kernel.org> Signed-off-by: Jarkko Sakkinen <jarkko@kernel.org>
23 lines
977 B
Makefile
23 lines
977 B
Makefile
# SPDX-License-Identifier: GPL-2.0
|
|
#
|
|
# Makefile for caching inode integrity data (iint)
|
|
#
|
|
|
|
obj-$(CONFIG_INTEGRITY) += integrity.o
|
|
|
|
integrity-y := iint.o
|
|
integrity-$(CONFIG_INTEGRITY_AUDIT) += integrity_audit.o
|
|
integrity-$(CONFIG_INTEGRITY_SIGNATURE) += digsig.o
|
|
integrity-$(CONFIG_INTEGRITY_ASYMMETRIC_KEYS) += digsig_asymmetric.o
|
|
integrity-$(CONFIG_INTEGRITY_PLATFORM_KEYRING) += platform_certs/platform_keyring.o
|
|
integrity-$(CONFIG_INTEGRITY_MACHINE_KEYRING) += platform_certs/machine_keyring.o
|
|
integrity-$(CONFIG_LOAD_UEFI_KEYS) += platform_certs/efi_parser.o \
|
|
platform_certs/load_uefi.o \
|
|
platform_certs/keyring_handler.o
|
|
integrity-$(CONFIG_LOAD_IPL_KEYS) += platform_certs/load_ipl_s390.o
|
|
integrity-$(CONFIG_LOAD_PPC_KEYS) += platform_certs/efi_parser.o \
|
|
platform_certs/load_powerpc.o \
|
|
platform_certs/keyring_handler.o
|
|
obj-$(CONFIG_IMA) += ima/
|
|
obj-$(CONFIG_EVM) += evm/
|