[PATCH v3] x86/ima: require signed kernel modules
Luis Chamberlain
mcgrof at kernel.org
Fri Feb 15 17:01:44 UTC 2019
On Fri, Feb 15, 2019 at 11:50:18AM -0500, Mimi Zohar wrote:
> Have the IMA architecture specific policy require signed kernel modules
> on systems with secure boot mode enabled; and coordinate the different
> signature verification methods, so only one signature is required.
>
> Requiring appended kernel module signatures may be configured, enabled
> on the boot command line, or with this patch enabled in secure boot
> mode. This patch defines set_module_sig_enforced().
>
> To coordinate between appended kernel module signatures and IMA
> signatures, only define an IMA MODULE_CHECK policy rule if
> CONFIG_MODULE_SIG is not enabled. A custom IMA policy may still define
> and require an IMA signature.
>
> Signed-off-by: Mimi Zohar <zohar at linux.ibm.com>
Reviewed-by: Luis Chamberlain <mcgrof at kernel.org>
Luis
More information about the Linux-security-module-archive
mailing list