summaryrefslogtreecommitdiff
path: root/security/integrity/ima/ima_policy.c
diff options
context:
space:
mode:
authorNayna Jain <nayna@linux.ibm.com>2018-10-09 20:30:34 +0300
committerMimi Zohar <zohar@linux.ibm.com>2018-12-11 15:10:33 +0300
commitb5ca117365d960fe5e4fe272bcc8142c28769383 (patch)
tree6e306a5c52ad13271a2d947c9a41922f1ddf709d /security/integrity/ima/ima_policy.c
parent0914ade209c452cff6a29b1c0ae6fff3167fa1d0 (diff)
downloadlinux-b5ca117365d960fe5e4fe272bcc8142c28769383.tar.xz
ima: prevent kexec_load syscall based on runtime secureboot flag
When CONFIG_KEXEC_VERIFY_SIG is enabled, the kexec_file_load syscall requires the kexec'd kernel image to be signed. Distros are concerned about totally disabling the kexec_load syscall. As a compromise, the kexec_load syscall will only be disabled when CONFIG_KEXEC_VERIFY_SIG is configured and the system is booted with secureboot enabled. This patch disables the kexec_load syscall only for systems booted with secureboot enabled. [zohar@linux.ibm.com: add missing mesage on kexec_load failure] Signed-off-by: Nayna Jain <nayna@linux.ibm.com> Cc: David Howells <dhowells@redhat.com> Cc: Eric Biederman <ebiederm@xmission.com> Cc: Peter Jones <pjones@redhat.com> Cc: Vivek Goyal <vgoyal@redhat.com> Cc: Dave Young <dyoung@redhat.com> Signed-off-by: Mimi Zohar <zohar@linux.ibm.com>
Diffstat (limited to 'security/integrity/ima/ima_policy.c')
0 files changed, 0 insertions, 0 deletions