If securelevel has been set to 1 or greater, require that all modules have valid signatures. Signed-off-by: Matthew Garrett <matthew.garrett@xxxxxxxxxx> --- kernel/module.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/kernel/module.c b/kernel/module.c index dc58274..ab126d7 100644 --- a/kernel/module.c +++ b/kernel/module.c @@ -2487,7 +2487,7 @@ static int module_sig_check(struct load_info *info) if (err < 0 && fips_enabled) panic("Module verification failed with error %d in FIPS mode\n", err); - if (err == -ENOKEY && !sig_enforce) + if ((err == -ENOKEY && !sig_enforce) && (get_securelevel() <= 0)) err = 0; return err; -- 1.8.3.1 -- To unsubscribe from this list: send the line "unsubscribe linux-efi" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html