diff options
author | Ben Hutchings <ben@decadent.org.uk> | 2016-04-28 09:24:01 +0930 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2016-08-20 18:09:27 +0200 |
commit | bc2318cc76df4fb80c3b5b9ec0e1633627dabb54 (patch) | |
tree | cc7fc4b76857308b7f31ff142387d5d69dd4b7e1 /Documentation/module-signing.txt | |
parent | c6ec712c44c9f12cded15bff56ab045e844d503b (diff) |
module: Invalidate signatures on force-loaded modules
commit bca014caaa6130e57f69b5bf527967aa8ee70fdd upstream.
Signing a module should only make it trusted by the specific kernel it
was built for, not anything else. Loading a signed module meant for a
kernel with a different ABI could have interesting effects.
Therefore, treat all signatures as invalid when a module is
force-loaded.
Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'Documentation/module-signing.txt')
0 files changed, 0 insertions, 0 deletions