aboutsummaryrefslogtreecommitdiffstats
path: root/tools/testing/selftests/ima/Makefile
diff options
context:
space:
mode:
authorMimi Zohar <zohar@linux.ibm.com>2018-11-14 12:30:19 -0500
committerMimi Zohar <zohar@linux.ibm.com>2018-12-11 07:19:47 -0500
commita802ed0dd9c2607cc219574e881062d43ea3b7e0 (patch)
treebae0e40409b10571fb51eeb623799db68de0b419 /tools/testing/selftests/ima/Makefile
parentima: don't measure/appraise files on efivarfs (diff)
downloadlinux-dev-a802ed0dd9c2607cc219574e881062d43ea3b7e0.tar.xz
linux-dev-a802ed0dd9c2607cc219574e881062d43ea3b7e0.zip
selftests/ima: kexec_load syscall test
The kernel CONFIG_KEXEC_VERIFY_SIG option is limited to verifying a kernel image's signature, when loaded via the kexec_file_load syscall. There is no method for verifying a kernel image's signature loaded via the kexec_load syscall. This test verifies loading the kernel image via the kexec_load syscall fails when the kernel CONFIG_KEXEC_VERIFY_SIG option is enabled on systems with secureboot enabled[1]. [1] Detecting secureboot enabled is architecture specific. Signed-off-by: Mimi Zohar <zohar@linux.ibm.com>
Diffstat (limited to 'tools/testing/selftests/ima/Makefile')
-rw-r--r--tools/testing/selftests/ima/Makefile11
1 files changed, 11 insertions, 0 deletions
diff --git a/tools/testing/selftests/ima/Makefile b/tools/testing/selftests/ima/Makefile
new file mode 100644
index 000000000000..0b3adf5444b6
--- /dev/null
+++ b/tools/testing/selftests/ima/Makefile
@@ -0,0 +1,11 @@
+# Makefile for kexec_load
+
+uname_M := $(shell uname -m 2>/dev/null || echo not)
+ARCH ?= $(shell echo $(uname_M) | sed -e s/i.86/x86/ -e s/x86_64/x86/)
+
+ifeq ($(ARCH),x86)
+TEST_PROGS := test_kexec_load.sh
+
+include ../lib.mk
+
+endif