On Wed, 2022-07-13 at 15:21 +0800, Coiby Xu wrote: > Currently, an unsigned kernel could be kexec'ed when IMA arch specific > policy is configured unless lockdown is enabled. Enforce kernel > signature verification check in the kexec_file_load syscall when IMA > arch specific policy is configured. > > Fixes: 99d5cadfde2b ("kexec_file: split KEXEC_VERIFY_SIG into KEXEC_SIG and KEXEC_SIG_FORCE") > Reported-by: Mimi Zohar <zohar@xxxxxxxxxxxxx> > Suggested-by: Mimi Zohar <zohar@xxxxxxxxxxxxx> > Signed-off-by: Coiby Xu <coxu@xxxxxxxxxx> > --- > v2 > - don't include linux/kexec.h since it's already been included in > linux/ima.h > - fix build errors when KEXEC_FILE/KEXEC_CORE is disable as caught by > kernel test robot <lkp@xxxxxxxxx> Thanks, Coiby. This version of the patch is now queued in next- integrity/next- integrity-testing. Mimi