]> git.karo-electronics.de Git - karo-tx-linux.git/commit
module: signature checking hook
authorRusty Russell <rusty@rustcorp.com.au>
Wed, 26 Sep 2012 09:09:40 +0000 (10:09 +0100)
committerRusty Russell <rusty@rustcorp.com.au>
Fri, 28 Sep 2012 05:14:57 +0000 (14:44 +0930)
commite4f46e94bd71c5db2c24ea89b42355c7ab0e0e01
treeb022497a2ffe39f8a3f55e31db247da2ea63497b
parent9735775aa906fd052b8291cc67ef857b1e0829ea
module: signature checking hook

We do a very simple search for a particular string appended to the module
(which is cache-hot and about to be SHA'd anyway).  There's both a config
option and a boot parameter which control whether we accept or fail with
unsigned modules and modules that are signed with an unknown key.

If module signing is enabled, the kernel will be tainted if a module is
loaded that is unsigned or has a signature for which we don't have the
key.

(Useful feedback and tweaks by David Howells <dhowells@redhat.com>)

Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
Signed-off-by: David Howells <dhowells@redhat.com>
Documentation/kernel-parameters.txt
include/linux/module.h
init/Kconfig
kernel/Makefile
kernel/module-internal.h [new file with mode: 0644]
kernel/module.c
kernel/module_signing.c [new file with mode: 0644]