On Fri, 1 May 2020 10:16:52 -0400, Nayna Jain wrote: > To prevent verifying the kernel module appended signature twice > (finit_module), once by the module_sig_check() and again by IMA, powerpc > secure boot rules define an IMA architecture specific policy rule > only if CONFIG_MODULE_SIG_FORCE is not enabled. This, unfortunately, does > not take into account the ability of enabling "sig_enforce" on the boot > command line (module.sig_enforce=1). > > [...] Applied to powerpc/fixes. [1/1] powerpc/ima: Fix secure boot rules in ima arch policy https://git.kernel.org/powerpc/c/fa4f3f56ccd28ac031ab275e673ed4098855fed4 cheers