Received: by 10.192.165.156 with SMTP id m28csp250259imm; Tue, 10 Apr 2018 20:59:58 -0700 (PDT) X-Google-Smtp-Source: AIpwx4+dcZ5PUotZj5+JtHNT2grK+L6lPq+BP8eYnP0p8TWnnQ/S6ICU7HK0TIKBn0/pruF2AIQ8 X-Received: by 2002:a17:902:36a:: with SMTP id 97-v6mr3246174pld.186.1523419198476; Tue, 10 Apr 2018 20:59:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523419198; cv=none; d=google.com; s=arc-20160816; b=HmSIRqgZu2v3LSVqxp+6J4ia252EPUa7i0ZIb+2hoFuhOF4gTKBQzOIM3hVjfRv8yy 7PKKQ6wQgxGhIDCFtpEqU1G+zyf8w1ddX3Z+INo+60uV5yQKtTuXqhpW4ebfLvLkM9Pz vVgFUjhsBLjhPalba6eHdbYdxyDV6QvBf8EyopcN1Gtjab7pGvKVfqYM+XHmvevg2zEW 30s5mj6QVWIGfwmc5ftV9S1mTf2g1QR1y3wsMon9XB7OPpVtwCMwhU2kuCAUKtBop4pQ 6E5Op73XfLn0O2ku/piVjmqPG0RQWkDf2U8b7aveqJndNCmBTmgaoFqXpV8gN3VEvKb/ PdgQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=VKMyPJg09ryEhOFbIN+go7XgkLNKJt5ZAtIrKNdzjYI=; b=oqOi7gJrunaUq9UllfAcCC28y9ZIkIUu2CQA/8u/cD3RCrv4ktjI0XFqQeHvAjJCXC tOU0WoTiX/IvFA1kdRttMCUeA4dODe2pbQ0DRVPuTgkAu3pkWFwy4z6B6i/lC6QIJEyC 5LTLOEg9lQ653wET2gyN1XLloEuV9xfhuGawlWHFlh15khD34rDwce3IN11BbGzLzyiL JxKTZeC2EEuCu1q83F4OS9aHnzQbKbd2ZigY5sod81PcEnDK6gV/x2UhNvrEfjz0DBLj ZmSjXrohmBInVa6Ron12wNOjhNHTR6XgaU69bBTwnsSL+nTTRlA+ATC6ULaKpu2gg7rD YXJA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z62si137064pfb.305.2018.04.10.20.59.21; Tue, 10 Apr 2018 20:59:58 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752286AbeDKDxh (ORCPT + 99 others); Tue, 10 Apr 2018 23:53:37 -0400 Received: from out30-133.freemail.mail.aliyun.com ([115.124.30.133]:58692 "EHLO out30-133.freemail.mail.aliyun.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751876AbeDKDxg (ORCPT ); Tue, 10 Apr 2018 23:53:36 -0400 X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R111e4;CH=green;FP=0|-1|-1|-1|0|-1|-1|-1;HT=e01f04446;MF=zhang.jia@linux.alibaba.com;NM=1;PH=DS;RN=3;SR=0;TI=SMTPD_---0T.-L1UH_1523418813; Received: from localhost(mailfrom:zhang.jia@linux.alibaba.com fp:SMTPD_---0T.-L1UH_1523418813) by smtp.aliyun-inc.com(127.0.0.1); Wed, 11 Apr 2018 11:53:33 +0800 From: Jia Zhang To: jeyu@kernel.org Cc: linux-kernel@vger.kernel.org, zhang.jia@linux.alibaba.com Subject: [PATCH 2/2] module: Allow to always show the status of modsign Date: Wed, 11 Apr 2018 11:53:34 +0800 Message-Id: <1523418814-6857-2-git-send-email-zhang.jia@linux.alibaba.com> X-Mailer: git-send-email 1.8.3.1 In-Reply-To: <1523418814-6857-1-git-send-email-zhang.jia@linux.alibaba.com> References: <1523418814-6857-1-git-send-email-zhang.jia@linux.alibaba.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The sig_enforce parameter could be always shown to reflect the current status of modsign. For the case of CONFIG_MODULE_SIG_FORCE=y, this modification does nothing harmless. Signed-off-by: Jia Zhang --- kernel/module.c | 2 -- 1 file changed, 2 deletions(-) diff --git a/kernel/module.c b/kernel/module.c index f695474..1e3337b 100644 --- a/kernel/module.c +++ b/kernel/module.c @@ -274,9 +274,7 @@ static void module_assert_mutex_or_preempt(void) } static bool sig_enforce = IS_ENABLED(CONFIG_MODULE_SIG_FORCE); -#ifndef CONFIG_MODULE_SIG_FORCE module_param(sig_enforce, bool_enable_only, 0644); -#endif /* !CONFIG_MODULE_SIG_FORCE */ /* * Export sig_enforce kernel cmdline parameter to allow other subsystems rely -- 1.8.3.1