Message ID | 20130319170747.GA15821@hansolo.jdub.homelinux.org |
---|---|
State | Not Applicable |
Headers | show |
diff --git a/drivers/acpi/osl.c b/drivers/acpi/osl.c index 586e7e9..8950454 100644 --- a/drivers/acpi/osl.c +++ b/drivers/acpi/osl.c @@ -245,7 +245,7 @@ early_param("acpi_rsdp", setup_acpi_rsdp); acpi_physical_address __init acpi_os_get_root_pointer(void) { #ifdef CONFIG_KEXEC - if (acpi_rsdp) + if (acpi_rsdp && !efi_enabled(EFI_SECURE_BOOT)) return acpi_rsdp; #endif
This option allows userspace to pass the RSDP address to the kernel. This could potentially be used to circumvent the secure boot trust model. This is setup through the setup_arch function, which is called before the security_init function sets up the security_ops, so we cannot use a capable call here. We ignore the setting if we are booted in Secure Boot mode. Signed-off-by: Josh Boyer <jwboyer@redhat.com> --- v2: Actually send it to Matthew this time drivers/acpi/osl.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)