This patch updates the arch-specific policies for PowerNV system to make
sure that the binary hash is not blacklisted.

Signed-off-by: Nayna Jain <na...@linux.ibm.com>
Reviewed-by: Mimi Zohar <zo...@linux.ibm.com>
---
 arch/powerpc/kernel/ima_arch.c | 8 ++++----
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/arch/powerpc/kernel/ima_arch.c b/arch/powerpc/kernel/ima_arch.c
index 710872ea8f35..98f3f8d9f9e4 100644
--- a/arch/powerpc/kernel/ima_arch.c
+++ b/arch/powerpc/kernel/ima_arch.c
@@ -19,9 +19,9 @@ bool arch_ima_get_secureboot(void)
  * to be stored as an xattr or as an appended signature.
  */
 static const char *const secure_rules[] = {
-       "appraise func=KEXEC_KERNEL_CHECK appraise_type=imasig|modsig",
+       "appraise func=KEXEC_KERNEL_CHECK appraise_flag=check_blacklist 
appraise_type=imasig|modsig",
 #ifndef CONFIG_MODULE_SIG_FORCE
-       "appraise func=MODULE_CHECK appraise_type=imasig|modsig",
+       "appraise func=MODULE_CHECK appraise_flag=check_blacklist 
appraise_type=imasig|modsig",
 #endif
        NULL
 };
@@ -45,9 +45,9 @@ static const char *const trusted_rules[] = {
 static const char *const secure_and_trusted_rules[] = {
        "measure func=KEXEC_KERNEL_CHECK template=ima-modsig",
        "measure func=MODULE_CHECK template=ima-modsig",
-       "appraise func=KEXEC_KERNEL_CHECK appraise_type=imasig|modsig",
+       "appraise func=KEXEC_KERNEL_CHECK appraise_flag=check_blacklist 
appraise_type=imasig|modsig",
 #ifndef CONFIG_MODULE_SIG_FORCE
-       "appraise func=MODULE_CHECK appraise_type=imasig|modsig",
+       "appraise func=MODULE_CHECK appraise_flag=check_blacklist 
appraise_type=imasig|modsig",
 #endif
        NULL
 };
-- 
2.20.1

Reply via email to