summaryrefslogtreecommitdiff
path: root/Documentation/module-signing.txt
diff options
context:
space:
mode:
authorBen Hutchings <ben@decadent.org.uk>2016-04-28 02:54:01 +0300
committerRusty Russell <rusty@rustcorp.com.au>2016-07-27 06:08:00 +0300
commitbca014caaa6130e57f69b5bf527967aa8ee70fdd (patch)
treea9f4b7fc841def5ac3dd4c872084fa7bef7a38c0 /Documentation/module-signing.txt
parent3205c36cf7d96024626f92d65f560035df1abcb2 (diff)
downloadlinux-bca014caaa6130e57f69b5bf527967aa8ee70fdd.tar.xz
module: Invalidate signatures on force-loaded modules
Signing a module should only make it trusted by the specific kernel it was built for, not anything else. Loading a signed module meant for a kernel with a different ABI could have interesting effects. Therefore, treat all signatures as invalid when a module is force-loaded. Signed-off-by: Ben Hutchings <ben@decadent.org.uk> Cc: stable@vger.kernel.org Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
Diffstat (limited to 'Documentation/module-signing.txt')
0 files changed, 0 insertions, 0 deletions