Skip to content
Snippets Groups Projects
  1. Jan 10, 2016
  2. Jan 03, 2016
  3. Dec 28, 2015
  4. Dec 21, 2015
  5. Dec 17, 2015
  6. Dec 14, 2015
  7. Dec 10, 2015
  8. Dec 06, 2015
  9. Nov 30, 2015
  10. Nov 23, 2015
  11. Nov 16, 2015
  12. Nov 02, 2015
  13. Oct 25, 2015
  14. Oct 18, 2015
  15. Oct 11, 2015
  16. Oct 08, 2015
  17. Oct 04, 2015
  18. Oct 01, 2015
  19. Sep 28, 2015
  20. Sep 27, 2015
  21. Sep 20, 2015
  22. Sep 12, 2015
  23. Sep 04, 2015
  24. Aug 30, 2015
  25. Aug 28, 2015
  26. Aug 24, 2015
  27. Aug 16, 2015
  28. Aug 14, 2015
  29. Aug 09, 2015
  30. Aug 07, 2015
    • David Woodhouse's avatar
      modsign: Use single PEM file for autogenerated key · fb117949
      David Woodhouse authored
      
      The current rule for generating signing_key.priv and signing_key.x509 is
      a classic example of a bad rule which has a tendency to break parallel
      make. When invoked to create *either* target, it generates the other
      target as a side-effect that make didn't predict.
      
      So let's switch to using a single file signing_key.pem which contains
      both key and certificate. That matches what we do in the case of an
      external key specified by CONFIG_MODULE_SIG_KEY anyway, so it's also
      slightly cleaner.
      
      Signed-off-by: default avatarDavid Woodhouse <David.Woodhouse@intel.com>
      Signed-off-by: default avatarDavid Howells <dhowells@redhat.com>
      fb117949
    • David Woodhouse's avatar
    • David Howells's avatar
      MODSIGN: Use PKCS#7 messages as module signatures · 3f1e1bea
      David Howells authored
      
      Move to using PKCS#7 messages as module signatures because:
      
       (1) We have to be able to support the use of X.509 certificates that don't
           have a subjKeyId set.  We're currently relying on this to look up the
           X.509 certificate in the trusted keyring list.
      
       (2) PKCS#7 message signed information blocks have a field that supplies the
           data required to match with the X.509 certificate that signed it.
      
       (3) The PKCS#7 certificate carries fields that specify the digest algorithm
           used to generate the signature in a standardised way and the X.509
           certificates specify the public key algorithm in a standardised way - so
           we don't need our own methods of specifying these.
      
       (4) We now have PKCS#7 message support in the kernel for signed kexec purposes
           and we can make use of this.
      
      To make this work, the old sign-file script has been replaced with a program
      that needs compiling in a previous patch.  The rules to build it are added
      here.
      
      Signed-off-by: default avatarDavid Howells <dhowells@redhat.com>
      Tested-by: default avatarVivek Goyal <vgoyal@redhat.com>
      3f1e1bea
  31. Aug 03, 2015
  32. Jul 26, 2015
  33. Jul 22, 2015
  34. Jul 19, 2015
  35. Jul 12, 2015
  36. Jul 06, 2015
    • Michal Marek's avatar
      kbuild: Allow arch Makefiles to override {cpp,ld,c}flags · 61754c18
      Michal Marek authored
      
      Since commit a1c48bb1 (Makefile: Fix unrecognized cross-compiler command
      line options), the arch Makefile is included earlier by the main
      Makefile, preventing the arc architecture to set its -O3 compiler
      option. Since there might be more use cases for an arch Makefile to
      fine-tune the options, add support for ARCH_CPPFLAGS, ARCH_AFLAGS and
      ARCH_CFLAGS variables that are appended to the respective kbuild
      variables. The user still has the final say via the KCPPFLAGS, KAFLAGS
      and KCFLAGS variables.
      
      Reported-by: default avatarVineet Gupta <Vineet.Gupta1@synopsys.com>
      Cc: stable@vger.kernel.org # 3.16+
      Signed-off-by: default avatarMichal Marek <mmarek@suse.com>
      61754c18
Loading