]> git.ipfire.org Git - people/arne_f/kernel.git/commit
module: Invalidate signatures on force-loaded modules
authorBen Hutchings <ben@decadent.org.uk>
Wed, 27 Apr 2016 23:54:01 +0000 (09:24 +0930)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Sat, 20 Aug 2016 09:53:23 +0000 (11:53 +0200)
commitfc77c4ad276a03ac9217e7db44339003ba1de6bd
tree667caf2a47bf15454ed798baa74970c046033193
parentb7aca820d3b93fa028ecb2077b482587a26beeb6
module: Invalidate signatures on force-loaded modules

commit bca014caaa6130e57f69b5bf527967aa8ee70fdd upstream.

Signing a module should only make it trusted by the specific kernel it
was built for, not anything else.  Loading a signed module meant for a
kernel with a different ABI could have interesting effects.
Therefore, treat all signatures as invalid when a module is
force-loaded.

Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
kernel/module.c