Nayna Jain fa4f3f56cc powerpc/ima: Fix secure boot rules in ima arch policy
To prevent verifying the kernel module appended signature
twice (finit_module), once by the module_sig_check() and again by IMA,
powerpc secure boot rules define an IMA architecture specific policy
rule only if CONFIG_MODULE_SIG_FORCE is not enabled. This,
unfortunately, does not take into account the ability of enabling
"sig_enforce" on the boot command line (module.sig_enforce=1).

Including the IMA module appraise rule results in failing the
finit_module syscall, unless the module signing public key is loaded
onto the IMA keyring.

This patch fixes secure boot policy rules to be based on
CONFIG_MODULE_SIG instead.

Fixes: 4238fad366a6 ("powerpc/ima: Add support to initialize ima policy rules")
Signed-off-by: Nayna Jain <nayna@linux.ibm.com>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
Signed-off-by: Mimi Zohar <zohar@linux.ibm.com>
Link: https://lore.kernel.org/r/1588342612-14532-1-git-send-email-nayna@linux.ibm.com
2020-05-07 17:25:54 +10:00
..
2019-07-13 16:08:36 -07:00
2019-09-20 11:48:06 -07:00
2020-03-25 12:09:39 +11:00
2020-01-27 22:37:24 +11:00
2020-03-10 15:16:42 +11:00
2019-08-30 09:52:57 +10:00
2019-07-13 16:08:36 -07:00
2019-07-13 16:08:36 -07:00
2020-04-05 11:12:59 -07:00
2019-11-30 14:35:43 -08:00
2018-05-25 12:04:46 +10:00
2020-04-05 11:12:59 -07:00