diff options
| author | Ben Hutchings <[email protected]> | 2016-04-28 09:24:01 +0930 |
|---|---|---|
| committer | Rusty Russell <[email protected]> | 2016-07-27 12:38:00 +0930 |
| commit | bca014caaa6130e57f69b5bf527967aa8ee70fdd (patch) | |
| tree | a9f4b7fc841def5ac3dd4c872084fa7bef7a38c0 /tools/perf/scripts | |
| parent | 3205c36cf7d96024626f92d65f560035df1abcb2 (diff) | |
module: Invalidate signatures on force-loaded modules
Signing a module should only make it trusted by the specific kernel it
was built for, not anything else. Loading a signed module meant for a
kernel with a different ABI could have interesting effects.
Therefore, treat all signatures as invalid when a module is
force-loaded.
Signed-off-by: Ben Hutchings <[email protected]>
Cc: [email protected]
Signed-off-by: Rusty Russell <[email protected]>
Diffstat (limited to 'tools/perf/scripts')
0 files changed, 0 insertions, 0 deletions