Currently, fsverity verifies the signature, if supplied, regardless of whether signature verification is requested or not. Completely disable signature verification, if not requested, so that other users of fsverity can do their own verification without relying on the fsverity-specific verification to work. Signed-off-by: Roberto Sassu <roberto.sassu@xxxxxxxxxx> --- fs/verity/signature.c | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/fs/verity/signature.c b/fs/verity/signature.c index 143a530a8008..b45a2cea6c59 100644 --- a/fs/verity/signature.c +++ b/fs/verity/signature.c @@ -45,13 +45,13 @@ int fsverity_verify_signature(const struct fsverity_info *vi, struct fsverity_formatted_digest *d; int err; - if (sig_size == 0) { - if (fsverity_require_signatures) { - fsverity_err(inode, - "require_signatures=1, rejecting unsigned file!"); - return -EPERM; - } + if (!fsverity_require_signatures) return 0; + + if (sig_size == 0) { + fsverity_err(inode, + "require_signatures=1, rejecting unsigned file!"); + return -EPERM; } d = kzalloc(sizeof(*d) + hash_alg->digest_size, GFP_KERNEL); -- 2.32.0