ima: force signature verification when CONFIG_KEXEC_SIG is configured
authorCoiby Xu <coxu@redhat.com>
Wed, 13 Jul 2022 07:21:11 +0000 (15:21 +0800)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Thu, 21 Jul 2022 19:24:29 +0000 (21:24 +0200)
commit2340428c90d43472f317125a69dace12e80927b6
tree281e9dda1894a252498c58f7249633d14604a8fe
parentf4bd3202a2b4194ab6c0ce61628095d54f994db4
ima: force signature verification when CONFIG_KEXEC_SIG is configured

[ Upstream commit af16df54b89dee72df253abc5e7b5e8a6d16c11c ]

Currently, an unsigned kernel could be kexec'ed when IMA arch specific
policy is configured unless lockdown is enabled. Enforce kernel
signature verification check in the kexec_file_load syscall when IMA
arch specific policy is configured.

Fixes: 99d5cadfde2b ("kexec_file: split KEXEC_VERIFY_SIG into KEXEC_SIG and KEXEC_SIG_FORCE")
Reported-and-suggested-by: Mimi Zohar <zohar@linux.ibm.com>
Signed-off-by: Coiby Xu <coxu@redhat.com>
Signed-off-by: Mimi Zohar <zohar@linux.ibm.com>
Signed-off-by: Sasha Levin <sashal@kernel.org>
include/linux/kexec.h
kernel/kexec_file.c
security/integrity/ima/ima_efi.c