summaryrefslogtreecommitdiff
path: root/kernel/kexec_file.c
diff options
context:
space:
mode:
authorCoiby Xu <coxu@redhat.com>2023-07-26 10:08:05 +0800
committerMimi Zohar <zohar@linux.ibm.com>2023-08-01 08:18:11 -0400
commit56dc986a6b20b20aab1b76e0d8bff79954a00333 (patch)
tree8dac3db48e573eea858c51945f8282e3c90d020e /kernel/kexec_file.c
parentf20765fdfdc2c8f47b41cb08489fdad3194a8465 (diff)
ima: require signed IMA policy when UEFI secure boot is enabled
With commit 099f26f22f58 ("integrity: machine keyring CA configuration"), users are able to add custom IMA CA keys via MOK. This allows users to sign their own IMA polices without recompiling the kernel. For the sake of security, mandate signed IMA policy when UEFI secure boot is enabled. Note this change may affect existing users/tests i.e users won't be able to load an unsigned IMA policy when the IMA architecture specific policy is configured and UEFI secure boot is enabled. Suggested-by: Mimi Zohar <zohar@linux.ibm.com> Signed-off-by: Coiby Xu <coxu@redhat.com> Signed-off-by: Mimi Zohar <zohar@linux.ibm.com>
Diffstat (limited to 'kernel/kexec_file.c')
0 files changed, 0 insertions, 0 deletions