On Tue, 2020-06-23 at 17:26 -0300, Bruno Meneguele wrote:
<snip>

> diff --git a/security/integrity/ima/ima_main.c 
> b/security/integrity/ima/ima_main.c
> index c1583d98c5e5..a760094e8f8d 100644
> --- a/security/integrity/ima/ima_main.c
> +++ b/security/integrity/ima/ima_main.c
> @@ -694,7 +694,7 @@ int ima_load_data(enum kernel_load_data_id id)
>       switch (id) {
>       case LOADING_KEXEC_IMAGE:
>               if (IS_ENABLED(CONFIG_KEXEC_SIG)
> -                 && arch_ima_get_secureboot()) {
> +                 && arch_ima_secure_or_trusted_boot()) {
>                       pr_err("impossible to appraise a kernel image without a 
> file descriptor; try using kexec_file_load syscall.\n");
>                       return -EACCES;
>               }

Only IMA-appraisal enforces file integrity based on policy.

Mimi

Reply via email to