diff options
author | Ben Hutchings <ben@decadent.org.uk> | 2016-04-27 19:54:01 -0400 |
---|---|---|
committer | Rusty Russell <rusty@rustcorp.com.au> | 2016-07-26 23:08:00 -0400 |
commit | bca014caaa6130e57f69b5bf527967aa8ee70fdd (patch) | |
tree | a9f4b7fc841def5ac3dd4c872084fa7bef7a38c0 /init | |
parent | 3205c36cf7d96024626f92d65f560035df1abcb2 (diff) |
module: Invalidate signatures on force-loaded modules
Signing a module should only make it trusted by the specific kernel it
was built for, not anything else. Loading a signed module meant for a
kernel with a different ABI could have interesting effects.
Therefore, treat all signatures as invalid when a module is
force-loaded.
Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
Cc: stable@vger.kernel.org
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
Diffstat (limited to 'init')
0 files changed, 0 insertions, 0 deletions