-
Eric Snowberg authored
When the machine keyring is enabled, it may be used as a trust source for the .ima keyring. Add a reference to this in IMA_KEYRINGS_PERMIT_SIGNED_BY_BUILTIN_OR_SECONDARY. Signed-off-by:
Eric Snowberg <eric.snowberg@oracle.com> Signed-off-by:
Mimi Zohar <zohar@linux.ibm.com>
bdf1abd1