[PATCH] lockdown: s390: kexec_file: don't skip signature verification when not secure IPLed
Coiby Xu
coxu at redhat.com
Sun Nov 20 23:27:15 PST 2022
Currently for s390, lockdown doesn't prevent unsigned kernel image from
being kexec'ed when secure IPL is disabled. Fix it by always verifying
the signature regardless secure IPL is enabled or not.
Fixes: 155bdd30af17 ("kexec_file: Restrict at runtime if the kernel is locked down")
Cc: Matthew Garrett <mjg59 at srcf.ucam.org>
Cc: Jiri Bohac <jbohac at suse.cz>
Cc: David Howells <dhowells at redhat.com>
Cc: Philipp Rudo <prudo at redhat.com>
Cc: kexec at lists.infradead.org
Cc: linux-s390 at vger.kernel.org
Signed-off-by: Coiby Xu <coxu at redhat.com>
---
arch/s390/kernel/machine_kexec_file.c | 4 ----
1 file changed, 4 deletions(-)
diff --git a/arch/s390/kernel/machine_kexec_file.c b/arch/s390/kernel/machine_kexec_file.c
index fc6d5f58debe..627685426ac2 100644
--- a/arch/s390/kernel/machine_kexec_file.c
+++ b/arch/s390/kernel/machine_kexec_file.c
@@ -33,10 +33,6 @@ int s390_verify_sig(const char *kernel, unsigned long kernel_len)
unsigned long sig_len;
int ret;
- /* Skip signature verification when not secure IPLed. */
- if (!ipl_secure_flag)
- return 0;
-
if (marker_len > kernel_len)
return -EKEYREJECTED;
--
2.38.1
More information about the kexec
mailing list