linux/include
Rusty Russell 106a4ee258 module: signature checking hook
We do a very simple search for a particular string appended to the module
(which is cache-hot and about to be SHA'd anyway).  There's both a config
option and a boot parameter which control whether we accept or fail with
unsigned modules and modules that are signed with an unknown key.

If module signing is enabled, the kernel will be tainted if a module is
loaded that is unsigned or has a signature for which we don't have the
key.

(Useful feedback and tweaks by David Howells <dhowells@redhat.com>)

Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
Signed-off-by: David Howells <dhowells@redhat.com>
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2012-10-10 20:00:55 +10:30
..
acpi
asm-generic MPILIB: Provide count_leading/trailing_zeros() based on arch functions 2012-10-08 13:50:11 +10:30
crypto KEYS: Provide signature verification with an asymmetric key 2012-10-08 13:50:15 +10:30
drm
keys KEYS: Asymmetric key pluggable data parsers 2012-10-08 13:50:13 +10:30
linux module: signature checking hook 2012-10-10 20:00:55 +10:30
math-emu
media
memory
misc
mtd
net include/net/sock.h: squelch compiler warning in sk_rmem_schedule() 2012-09-17 15:00:38 -07:00
pcmcia
ras
rdma
rxrpc
scsi
sound
target
trace
video
xen
Kbuild