[PATCH v3] x86/ima: require signed kernel modules

Luis Chamberlain mcgrof at kernel.org
Fri Feb 15 17:01:44 UTC 2019

On Fri, Feb 15, 2019 at 11:50:18AM -0500, Mimi Zohar wrote:
> Have the IMA architecture specific policy require signed kernel modules
> on systems with secure boot mode enabled; and coordinate the different
> signature verification methods, so only one signature is required.
> Requiring appended kernel module signatures may be configured, enabled
> on the boot command line, or with this patch enabled in secure boot
> mode.  This patch defines set_module_sig_enforced().
> To coordinate between appended kernel module signatures and IMA
> signatures, only define an IMA MODULE_CHECK policy rule if
> CONFIG_MODULE_SIG is not enabled.  A custom IMA policy may still define
> and require an IMA signature.
> Signed-off-by: Mimi Zohar <zohar at linux.ibm.com>

Reviewed-by: Luis Chamberlain <mcgrof at kernel.org>


More information about the Linux-security-module-archive mailing list