diff options
author | Mimi Zohar <zohar@linux.ibm.com> | 2019-01-24 18:22:06 -0500 |
---|---|---|
committer | Shuah Khan <skhan@linuxfoundation.org> | 2019-04-17 15:32:24 -0600 |
commit | 973b71c60f160f58e624795ac5d4b08c881b8d75 (patch) | |
tree | 61d18584eb9b6a8a4d5653313bee947613ed31dd /tools/testing/selftests/kexec/test_kexec_load.sh | |
parent | selftests/kexec: define "require_root_privileges" (diff) | |
download | wireguard-linux-973b71c60f160f58e624795ac5d4b08c881b8d75.tar.xz wireguard-linux-973b71c60f160f58e624795ac5d4b08c881b8d75.zip |
selftests/kexec: kexec_file_load syscall test
The kernel can be configured to verify PE signed kernel images, IMA
kernel image signatures, both types of signatures, or none. This test
verifies only properly signed kernel images are loaded into memory,
based on the kernel configuration and runtime policies.
Signed-off-by: Mimi Zohar <zohar@linux.ibm.com>
Reviewed-by: Petr Vorel <pvorel@suse.cz>
Signed-off-by: Shuah Khan <skhan@linuxfoundation.org>
Diffstat (limited to '')
-rwxr-xr-x | tools/testing/selftests/kexec/test_kexec_load.sh | 1 |
1 files changed, 0 insertions, 1 deletions
diff --git a/tools/testing/selftests/kexec/test_kexec_load.sh b/tools/testing/selftests/kexec/test_kexec_load.sh index 49545fcdc646..afd440ee23cb 100755 --- a/tools/testing/selftests/kexec/test_kexec_load.sh +++ b/tools/testing/selftests/kexec/test_kexec_load.sh @@ -14,7 +14,6 @@ get_secureboot_mode secureboot=$? # kexec_load should fail in secure boot mode -KERNEL_IMAGE="/boot/vmlinuz-`uname -r`" kexec --load $KERNEL_IMAGE > /dev/null 2>&1 if [ $? -eq 0 ]; then kexec --unload |