On Wed, Nov 19, 2025 at 08:29:22AM -0500, Mimi Zohar wrote:
Hi Coiby,

Hi Mimi,


On Wed, 2025-11-19 at 11:47 +0800, Coiby Xu wrote:
Currently, when in-kernel module decompression (CONFIG_MODULE_DECOMPRESS)
is enabled, IMA has no way to verify the appended module signature as it
can't decompress the module.

Define a new kernel_read_file_id enumerate READING_MODULE_COMPRESSED so
IMA can know only to collect original module data hash on
READING_MODULE_COMPRESSED and defer appraising/measuring it until on
READING_MODULE when the module has been decompressed.

This paragraph is a bit awkward.  Perhaps something like:

-> so IMA can calculate the compressed kernel module data hash and defer
measuring/appraising ...


Before enabling in-kernel module decompression, a kernel module in
initramfs can still be loaded with ima_policy=secure_boot. So adjust the
kernel module rule in secure_boot policy to allow either an IMA
signature OR an appended signature i.e. to use
"appraise func=MODULE_CHECK appraise_type=imasig|modsig".

Reported-by: Karel Srot <[email protected]>
Suggested-by: Mimi Zohar <[email protected]>
Suggested-by: Paul Moore <[email protected]>
Signed-off-by: Coiby Xu <[email protected]>

Thanks, Coiby!

The patch applies cleanly to linus' tree, but needs to be applied to next-
integrity.  Please re-base.

I've sent v4 which has been rebased onto next tree with improved
wording as suggested.


--

thanks,

Mimi


--
Best regards,
Coiby


Reply via email to