[PATCH v2] ima: force signature verification when CONFIG_KEXEC_SIG is configured

Mimi Zohar zohar at linux.ibm.com
Wed Jul 13 07:23:35 PDT 2022


On Wed, 2022-07-13 at 15:21 +0800, Coiby Xu wrote:
> Currently, an unsigned kernel could be kexec'ed when IMA arch specific
> policy is configured unless lockdown is enabled. Enforce kernel
> signature verification check in the kexec_file_load syscall when IMA
> arch specific policy is configured.
> 
> Fixes: 99d5cadfde2b ("kexec_file: split KEXEC_VERIFY_SIG into KEXEC_SIG and KEXEC_SIG_FORCE")
> Reported-by: Mimi Zohar <zohar at linux.ibm.com>
> Suggested-by: Mimi Zohar <zohar at linux.ibm.com>
> Signed-off-by: Coiby Xu <coxu at redhat.com>
> ---
> v2
>  - don't include linux/kexec.h since it's already been included in
>    linux/ima.h
>  - fix build errors when KEXEC_FILE/KEXEC_CORE is disable as caught by
>    kernel test robot <lkp at intel.com>

Thanks, Coiby.  This version of the patch is now queued in next-
integrity/next-
integrity-testing.

Mimi




More information about the kexec mailing list