]> git.ipfire.org Git - thirdparty/kernel/stable.git/commit
module: Invalidate signatures on force-loaded modules
authorBen Hutchings <ben@decadent.org.uk>
Wed, 27 Apr 2016 23:54:01 +0000 (09:24 +0930)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Sat, 20 Aug 2016 16:11:04 +0000 (18:11 +0200)
commitc528032b3adf734fba3247517641ee173b26d950
tree65672c1b15487bb3719c1b5d70e145b3eb419e51
parentdbf8fc37852729c8e1022548e2a98944aec4214f
module: Invalidate signatures on force-loaded modules

commit bca014caaa6130e57f69b5bf527967aa8ee70fdd upstream.

Signing a module should only make it trusted by the specific kernel it
was built for, not anything else.  Loading a signed module meant for a
kernel with a different ABI could have interesting effects.
Therefore, treat all signatures as invalid when a module is
force-loaded.

Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
kernel/module.c