On Thu, 2019-05-16 at 01:29 -0400, Arvind Sankar wrote: > I think that's a separate issue. If you want to allow people to be able > to put files onto the system that will be IMA verified, they need to > have some way to locally sign them whether it's inside an initramfs or > on a real root filesystem. Anyone building their own kernel can build their own key into the kernel image. Another option is to build the kernel with CONFIG_SYSTEM_EXTRA_CERTIFICATE enabled, allowing an additional certificate to be inserted into the kernel image post build. The additional certificate will be loaded onto the builtin kernel keyring. Certificates signed with the private key can then be added to the IMA keyring. By modifying the kernel image, the kernel image obviously needs to be resigned. Additional patches "Certificate insertion support for x86 bzImages" were posted, but have not been upstreamed. This patch set adds the security xattrs needed by IMA. Mimi