]> git.hungrycats.org Git - linux/commit
module: Invalidate signatures on force-loaded modules
authorBen Hutchings <ben@decadent.org.uk>
Wed, 27 Apr 2016 23:54:01 +0000 (09:24 +0930)
committerJiri Slaby <jslaby@suse.cz>
Fri, 19 Aug 2016 10:02:43 +0000 (12:02 +0200)
commitf1ce8643ee2b36862079e9b0ba21ad69f0bd8fad
treeb9c05a2fba835d881967d446115dca1e26df6d3c
parent8a00d8db7f4c26700996f6d1cdec0a42fab7d5b5
module: Invalidate signatures on force-loaded modules

commit bca014caaa6130e57f69b5bf527967aa8ee70fdd upstream.

Signing a module should only make it trusted by the specific kernel it
was built for, not anything else.  Loading a signed module meant for a
kernel with a different ABI could have interesting effects.
Therefore, treat all signatures as invalid when a module is
force-loaded.

Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
Signed-off-by: Jiri Slaby <jslaby@suse.cz>
kernel/module.c