module: Invalidate signatures on force-loaded modules
authorBen Hutchings <ben@decadent.org.uk>
Wed, 27 Apr 2016 23:54:01 +0000 (09:24 +0930)
committerWilly Tarreau <w@1wt.eu>
Sat, 27 Aug 2016 09:40:39 +0000 (11:40 +0200)
commitfa20cb40aa25df36c25f2b8b77c199d720b4a85d
tree2b052c4577b01cf9e06c3663b18deedd91bd72b0
parent8de0e6a7186bb35a757db8936200715b6b98372e
module: Invalidate signatures on force-loaded modules

commit bca014caaa6130e57f69b5bf527967aa8ee70fdd upstream.

Signing a module should only make it trusted by the specific kernel it
was built for, not anything else.  Loading a signed module meant for a
kernel with a different ABI could have interesting effects.
Therefore, treat all signatures as invalid when a module is
force-loaded.

Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Signed-off-by: Willy Tarreau <w@1wt.eu>
kernel/module.c