module: Invalidate signatures on force-loaded modules
authorBen Hutchings <ben@decadent.org.uk>
Wed, 27 Apr 2016 23:54:01 +0000 (09:24 +0930)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Sat, 20 Aug 2016 16:09:27 +0000 (18:09 +0200)
commitbc2318cc76df4fb80c3b5b9ec0e1633627dabb54
treecc7fc4b76857308b7f31ff142387d5d69dd4b7e1
parentc6ec712c44c9f12cded15bff56ab045e844d503b
module: Invalidate signatures on force-loaded modules

commit bca014caaa6130e57f69b5bf527967aa8ee70fdd upstream.

Signing a module should only make it trusted by the specific kernel it
was built for, not anything else.  Loading a signed module meant for a
kernel with a different ABI could have interesting effects.
Therefore, treat all signatures as invalid when a module is
force-loaded.

Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
kernel/module.c