diff options
author | Ben Hutchings <ben@decadent.org.uk> | 2016-04-28 09:24:01 +0930 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2016-08-20 11:53:23 +0200 |
commit | fc77c4ad276a03ac9217e7db44339003ba1de6bd (patch) | |
tree | 667caf2a47bf15454ed798baa74970c046033193 /Documentation | |
parent | b7aca820d3b93fa028ecb2077b482587a26beeb6 (diff) |
module: Invalidate signatures on force-loaded modules
commit bca014caaa6130e57f69b5bf527967aa8ee70fdd upstream.
Signing a module should only make it trusted by the specific kernel it
was built for, not anything else. Loading a signed module meant for a
kernel with a different ABI could have interesting effects.
Therefore, treat all signatures as invalid when a module is
force-loaded.
Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'Documentation')
0 files changed, 0 insertions, 0 deletions