module: signature checking hook
authorRusty Russell <rusty@rustcorp.com.au>
Wed, 26 Sep 2012 09:09:40 +0000 (10:09 +0100)
committerRusty Russell <rusty@rustcorp.com.au>
Wed, 10 Oct 2012 09:30:55 +0000 (20:00 +1030)
commit106a4ee258d14818467829bf0e12aeae14c16cd7
tree4a5d002eceff4a028ebc8d88223b1ed735bee224
parentc26fd69fa00916a31a47f5f096fd7be924106df8
module: signature checking hook

We do a very simple search for a particular string appended to the module
(which is cache-hot and about to be SHA'd anyway).  There's both a config
option and a boot parameter which control whether we accept or fail with
unsigned modules and modules that are signed with an unknown key.

If module signing is enabled, the kernel will be tainted if a module is
loaded that is unsigned or has a signature for which we don't have the
key.

(Useful feedback and tweaks by David Howells <dhowells@redhat.com>)

Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
Signed-off-by: David Howells <dhowells@redhat.com>
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
Documentation/kernel-parameters.txt
include/linux/module.h
init/Kconfig
kernel/Makefile
kernel/module-internal.h [new file with mode: 0644]
kernel/module.c
kernel/module_signing.c [new file with mode: 0644]