commit | bca014caaa6130e57f69b5bf527967aa8ee70fdd | [log] [tgz] |
---|---|---|
author | Ben Hutchings <ben@decadent.org.uk> | Thu Apr 28 09:24:01 2016 +0930 |
committer | Rusty Russell <rusty@rustcorp.com.au> | Wed Jul 27 12:38:00 2016 +0930 |
tree | a9f4b7fc841def5ac3dd4c872084fa7bef7a38c0 | |
parent | 3205c36cf7d96024626f92d65f560035df1abcb2 [diff] |
module: Invalidate signatures on force-loaded modules Signing a module should only make it trusted by the specific kernel it was built for, not anything else. Loading a signed module meant for a kernel with a different ABI could have interesting effects. Therefore, treat all signatures as invalid when a module is force-loaded. Signed-off-by: Ben Hutchings <ben@decadent.org.uk> Cc: stable@vger.kernel.org Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>