mirror of
https://github.com/torvalds/linux.git
synced 2026-04-18 14:53:58 -04:00
ima: force signature verification when CONFIG_KEXEC_SIG is configured
Currently, an unsigned kernel could be kexec'ed when IMA arch specific
policy is configured unless lockdown is enabled. Enforce kernel
signature verification check in the kexec_file_load syscall when IMA
arch specific policy is configured.
Fixes: 99d5cadfde ("kexec_file: split KEXEC_VERIFY_SIG into KEXEC_SIG and KEXEC_SIG_FORCE")
Reported-and-suggested-by: Mimi Zohar <zohar@linux.ibm.com>
Signed-off-by: Coiby Xu <coxu@redhat.com>
Signed-off-by: Mimi Zohar <zohar@linux.ibm.com>
This commit is contained in:
@@ -67,6 +67,8 @@ const char * const *arch_get_ima_policy(void)
|
||||
if (IS_ENABLED(CONFIG_IMA_ARCH_POLICY) && arch_ima_get_secureboot()) {
|
||||
if (IS_ENABLED(CONFIG_MODULE_SIG))
|
||||
set_module_sig_enforced();
|
||||
if (IS_ENABLED(CONFIG_KEXEC_SIG))
|
||||
set_kexec_sig_enforced();
|
||||
return sb_arch_rules;
|
||||
}
|
||||
return NULL;
|
||||
|
||||
Reference in New Issue
Block a user