summaryrefslogtreecommitdiffstats
path: root/kernel/module.c
diff options
context:
space:
mode:
authorJames Morris2019-04-13 00:20:23 +0200
committerJames Morris2019-04-13 00:20:23 +0200
commit2bfebea90dd5e8c57ae1021a5d1bb6c1057eee6d (patch)
treee3abbdd39c488daec66a7c7b6d93e34b51145e54 /kernel/module.c
parentRevert "security: inode: fix a missing check for securityfs_create_file" (diff)
parentdoc/kernel-parameters.txt: Deprecate ima_appraise_tcb (diff)
downloadkernel-qcow2-linux-2bfebea90dd5e8c57ae1021a5d1bb6c1057eee6d.tar.gz
kernel-qcow2-linux-2bfebea90dd5e8c57ae1021a5d1bb6c1057eee6d.tar.xz
kernel-qcow2-linux-2bfebea90dd5e8c57ae1021a5d1bb6c1057eee6d.zip
Merge branch 'next-integrity-for-james' of git://git.kernel.org/pub/scm/linux/kernel/git/zohar/linux-integrity into next-integrity
From Mimi: "This pull request contains just three patches, the remainder are either included in other pull requests (eg. audit, lockdown) or will be upstreamed via other subsystems (eg. kselftests, Power).  Included in this pull request is one bug fix, one documentation update, and extending the x86 IMA arch policy rules to coordinate the different kernel module signature verification methods."
Diffstat (limited to 'kernel/module.c')
-rw-r--r--kernel/module.c5
1 files changed, 5 insertions, 0 deletions
diff --git a/kernel/module.c b/kernel/module.c
index 0b9aa8ab89f0..985caa467aef 100644
--- a/kernel/module.c
+++ b/kernel/module.c
@@ -286,6 +286,11 @@ bool is_module_sig_enforced(void)
}
EXPORT_SYMBOL(is_module_sig_enforced);
+void set_module_sig_enforced(void)
+{
+ sig_enforce = true;
+}
+
/* Block module loading/unloading? */
int modules_disabled = 0;
core_param(nomodule, modules_disabled, bint, 0);