Skip to content

Commit 1ba5880

Browse files
committed
ima_setup.sh: Fix check of signed policy requirement
Kernel code in arch_get_ima_policy() depends also on CONFIG_IMA_ARCH_POLICY added in v5.0: d958083a8f640 ("x86/ima: define arch_get_ima_policy() for x86") Link: https://lore.kernel.org/ltp/20260121083343.127613-1-pvorel@suse.cz/ Fixes: c38b528 ("ima_{conditionals, policy}: Handle policy required to be signed") Suggested-by: Mimi Zohar <zohar@linux.ibm.com> Signed-off-by: Petr Vorel <pvorel@suse.cz>
1 parent b7cf2c2 commit 1ba5880

1 file changed

Lines changed: 2 additions & 1 deletion

File tree

testcases/kernel/security/integrity/ima/tests/ima_setup.sh

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -466,10 +466,11 @@ require_evmctl()
466466
}
467467

468468
# 56dc986a6b20b ("ima: require signed IMA policy when UEFI secure boot is enabled") # v6.5-rc4
469+
# d958083a8f640 ("x86/ima: define arch_get_ima_policy() for x86") # v5.0
469470
check_need_signed_policy()
470471
{
471472
tst_secureboot_enabled && tst_kvcmp -ge '6.5' && tst_require_kconfigs \
472-
'CONFIG_IMA_KEYRINGS_PERMIT_SIGNED_BY_BUILTIN_OR_SECONDARY'
473+
'CONFIG_IMA_KEYRINGS_PERMIT_SIGNED_BY_BUILTIN_OR_SECONDARY,CONFIG_IMA_ARCH_POLICY'
473474
}
474475

475476
# loop device is needed to use only for tmpfs

0 commit comments

Comments
 (0)