Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
module: Invalidate signatures on force-loaded modules
Signing a module should only make it trusted by the specific kernel it was built for, not anything else. Loading a signed module meant for a kernel with a different ABI could have interesting effects. Therefore, treat all signatures as invalid when a module is force-loaded. Signed-off-by: Ben Hutchings <[email protected]> Cc: [email protected] Signed-off-by: Rusty Russell <[email protected]>
- Loading branch information