Files
linux/Documentation
Mimi Zohar 503ceaef8e ima: define a set of appraisal rules requiring file signatures
The builtin "ima_appraise_tcb" policy should require file signatures for
at least a few of the hooks (eg. kernel modules, firmware, and the kexec
kernel image), but changing it would break the existing userspace/kernel
ABI.

This patch defines a new builtin policy named "secure_boot", which
can be specified on the "ima_policy=" boot command line, independently
or in conjunction with the "ima_appraise_tcb" policy, by specifing
ima_policy="appraise_tcb | secure_boot".  The new appraisal rules
requiring file signatures will be added prior to the "ima_appraise_tcb"
rules.

Signed-off-by: Mimi Zohar <zohar@linux.vnet.ibm.com>

Changelog:
- Reference secure boot in the new builtin policy name. (Thiago Bauermann)
2017-06-21 14:37:12 -04:00
..
2017-04-14 14:00:49 -06:00
2017-05-12 15:57:15 -07:00
2017-05-05 11:48:17 +10:00
2017-04-03 18:53:50 +01:00
2017-03-31 12:55:11 +02:00
2017-04-11 14:35:15 -06:00
2017-04-27 15:54:39 -06:00
2017-04-27 15:54:39 -06:00
2017-04-27 15:54:39 -06:00