Project Description

Currently kernel module signature be attached in the end of kernel module (ko file). Scott Bahling has raised that there have some benefits that kernel allows to load module with a separate signature file.

Current module signature is PKCS#7 format, I thought that it's not hard to do that. But we will need a new system call for this.

Goal for this Hackweek

Implement a proof of concept in hackweek 20.


Base on the latest kernel mainline.

Looking for hackers with the skills:


This project is part of:

Hack Week 20


  • over 3 years ago: pperego liked this project.
  • over 3 years ago: mkubecek liked this project.
  • over 3 years ago: fanyadan liked this project.
  • over 3 years ago: joeyli added keyword "kernel" to this project.
  • over 3 years ago: joeyli originated this project.

  • Comments

    • joeyli
      over 3 years ago by joeyli | Reply

      Result: HEAD:users/jlee/stable/modsign-separate on

      TODO: - Support multi .ko.p7s file. - Search fingerprint in trusted keyring, platform keyring - Modify sign-file ? - Combine with current modverifysig() - coexist with embedded signature

    Similar Projects

    early stage kdump support by mbrugger

    [comment]: # (Please use the project descriptio...

    Model checking the BPF verifier by shunghsiyu

    Project Description

    BPF verifier plays a ...

    Authenticated hashes for BTRFS by dsterba

    Project Description

    Implement a checksum ...