]> git.kernelconcepts.de Git - karo-tx-linux.git/commit
module: Invalidate signatures on force-loaded modules
authorBen Hutchings <ben@decadent.org.uk>
Wed, 27 Apr 2016 23:54:01 +0000 (09:24 +0930)
committerRusty Russell <rusty@rustcorp.com.au>
Wed, 27 Jul 2016 03:08:00 +0000 (12:38 +0930)
commitbca014caaa6130e57f69b5bf527967aa8ee70fdd
treea9f4b7fc841def5ac3dd4c872084fa7bef7a38c0
parent3205c36cf7d96024626f92d65f560035df1abcb2
module: Invalidate signatures on force-loaded modules

Signing a module should only make it trusted by the specific kernel it
was built for, not anything else.  Loading a signed module meant for a
kernel with a different ABI could have interesting effects.
Therefore, treat all signatures as invalid when a module is
force-loaded.

Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
Cc: stable@vger.kernel.org
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
kernel/module.c