Files
linux/kernel
Ben Hutchings bc2318cc76 module: Invalidate signatures on force-loaded modules
commit bca014caaa upstream.

Signing a module should only make it trusted by the specific kernel it
was built for, not anything else.  Loading a signed module meant for a
kernel with a different ABI could have interesting effects.
Therefore, treat all signatures as invalid when a module is
force-loaded.

Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2016-08-20 18:09:27 +02:00
..
2016-06-24 10:18:17 -07:00
2015-06-30 19:44:57 -07:00
2015-04-11 22:27:55 -04:00
2015-11-04 08:23:51 -05:00
2016-08-10 11:49:27 +02:00
2015-04-12 21:03:31 +02:00
2015-11-23 09:44:58 +01:00
2015-11-05 19:34:48 -08:00