android_kernel_xiaomi_sm8350/security
Arnd Bergmann e2614ab16a ima: rework CONFIG_IMA dependency block
commit 91e326563ee34509c35267808a4b1b3ea3db62a8 upstream.

Changing the direct dependencies of IMA_BLACKLIST_KEYRING and
IMA_LOAD_X509 caused them to no longer depend on IMA, but a
a configuration without IMA results in link failures:

arm-linux-gnueabi-ld: security/integrity/iint.o: in function `integrity_load_keys':
iint.c:(.init.text+0xd8): undefined reference to `ima_load_x509'

aarch64-linux-ld: security/integrity/digsig_asymmetric.o: in function `asymmetric_verify':
digsig_asymmetric.c:(.text+0x104): undefined reference to `ima_blacklist_keyring'

Adding explicit dependencies on IMA would fix this, but a more reliable
way to do this is to enclose the entire Kconfig file in an 'if IMA' block.
This also allows removing the existing direct dependencies.

Fixes: be210c6d3597f ("ima: Finish deprecation of IMA_TRUSTED_KEYRING Kconfig")
Signed-off-by: Arnd Bergmann <arnd@arndb.de>
Signed-off-by: Mimi Zohar <zohar@linux.ibm.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2023-10-10 21:46:46 +02:00
..
apparmor
integrity ima: rework CONFIG_IMA dependency block 2023-10-10 21:46:46 +02:00
keys security: keys: perform capable check only on privileged operations 2023-09-23 10:59:39 +02:00
loadpin
lockdown
safesetid
selinux selinux: don't use make's grouped targets feature yet 2023-06-09 10:29:02 +02:00
smack Smack:- Use overlay inode label in smack_inode_copy_up() 2023-10-10 21:46:41 +02:00
tomoyo tomoyo: fix broken dependency on *.conf.default 2023-02-06 07:52:35 +01:00
yama
commoncap.c
device_cgroup.c device_cgroup: Roll back to original exceptions after copy failure 2023-01-18 11:41:50 +01:00
inode.c
Kconfig
Kconfig.hardening
lsm_audit.c
Makefile
min_addr.c
security.c ima: Align ima_file_mmap() parameters with mmap_file LSM hook 2023-03-11 16:44:02 +01:00