[PATCH v2] x86/ima: require signed kernel modules
Mimi Zohar
zohar at linux.ibm.com
Thu Mar 7 22:41:38 UTC 2019
On Thu, 2019-03-07 at 14:36 -0800, Matthew Garrett wrote:
> On Thu, Mar 7, 2019 at 2:34 PM Mimi Zohar <zohar at linux.ibm.com> wrote:
> >
> > On Thu, 2019-03-07 at 14:27 -0800, Matthew Garrett wrote:
> > > On Wed, Feb 13, 2019 at 4:18 AM Mimi Zohar <zohar at linux.ibm.com> wrote:
> > > > - if (IS_ENABLED(CONFIG_IMA_ARCH_POLICY) && arch_ima_get_secureboot())
> > > > + if (IS_ENABLED(CONFIG_IMA_ARCH_POLICY) && arch_ima_get_secureboot()) {
> > > > + if (IS_ENABLED(CONFIG_MODULE_SIG))
> > > > + set_module_sig_enforced();
> > > > return sb_arch_rules;
> > >
> > > Linus previously pushed back on having the lockdown features
> > > automatically enabled on secure boot systems. Why are we doing the
> > > same in IMA?
> >
> > IMA-appraisal is extending the "secure boot" concept to the running
> > system.
>
> Right, but how is this different to what Linus was objecting to?
Both Andy Lutomirski and Linus objected to limiting the "lockdown"
patch set to secure boot enabled systems.
Mimi
More information about the Linux-security-module-archive
mailing list