Files
linux/kernel
Ben Hutchings fc77c4ad27 module: Invalidate signatures on force-loaded modules
commit bca014caaa upstream.

Signing a module should only make it trusted by the specific kernel it
was built for, not anything else.  Loading a signed module meant for a
kernel with a different ABI could have interesting effects.
Therefore, treat all signatures as invalid when a module is
force-loaded.

Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2016-08-20 11:53:23 +02:00
..
2013-11-13 12:09:34 +09:00
2016-03-03 15:06:47 -08:00
2014-06-30 20:11:58 -07:00
2014-11-21 09:23:01 -08:00
2012-05-31 17:49:27 -07:00
2013-12-04 14:09:46 +10:30
2013-12-18 19:04:50 -08:00
2013-09-11 15:58:27 -07:00
2014-06-07 10:28:09 -07:00