[PATCH v2] ima: force signature verification when CONFIG_KEXEC_SIG is configured
Mimi Zohar
zohar at linux.ibm.com
Wed Jul 13 07:23:35 PDT 2022
On Wed, 2022-07-13 at 15:21 +0800, Coiby Xu wrote:
> Currently, an unsigned kernel could be kexec'ed when IMA arch specific
> policy is configured unless lockdown is enabled. Enforce kernel
> signature verification check in the kexec_file_load syscall when IMA
> arch specific policy is configured.
>
> Fixes: 99d5cadfde2b ("kexec_file: split KEXEC_VERIFY_SIG into KEXEC_SIG and KEXEC_SIG_FORCE")
> Reported-by: Mimi Zohar <zohar at linux.ibm.com>
> Suggested-by: Mimi Zohar <zohar at linux.ibm.com>
> Signed-off-by: Coiby Xu <coxu at redhat.com>
> ---
> v2
> - don't include linux/kexec.h since it's already been included in
> linux/ima.h
> - fix build errors when KEXEC_FILE/KEXEC_CORE is disable as caught by
> kernel test robot <lkp at intel.com>
Thanks, Coiby. This version of the patch is now queued in next-
integrity/next-
integrity-testing.
Mimi
More information about the kexec
mailing list