<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/kernel/modsign_pubkey.c, branch v3.12-rc2</title>
<subtitle>Linux kernel source tree</subtitle>
<id>https://git.amat.us/linux/atom/kernel/modsign_pubkey.c?h=v3.12-rc2</id>
<link rel='self' href='https://git.amat.us/linux/atom/kernel/modsign_pubkey.c?h=v3.12-rc2'/>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/'/>
<updated>2013-09-11T22:58:21Z</updated>
<entry>
<title>kernel/modsign_pubkey.c: fix init const for module signing code</title>
<updated>2013-09-11T22:58:21Z</updated>
<author>
<name>Andi Kleen</name>
<email>ak@linux.intel.com</email>
</author>
<published>2013-09-11T21:23:19Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=54a33b1b1470ada14fa2998e8b48ad4a0ef6a916'/>
<id>urn:sha1:54a33b1b1470ada14fa2998e8b48ad4a0ef6a916</id>
<content type='text'>
const has to use __initconst, not __initdata

Signed-off-by: Andi Kleen &lt;ak@linux.intel.com&gt;
Acked-by: David Howells &lt;dhowells@redhat.com&gt;
Cc: Rusty Russell &lt;rusty@rustcorp.com.au&gt;
Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;
</content>
</entry>
<entry>
<title>keys: use keyring_alloc() to create module signing keyring</title>
<updated>2012-12-21T01:40:21Z</updated>
<author>
<name>David Howells</name>
<email>dhowells@redhat.com</email>
</author>
<published>2012-12-20T23:05:56Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=cfde819088422503b5c69e03ab7bb90f87121d4d'/>
<id>urn:sha1:cfde819088422503b5c69e03ab7bb90f87121d4d</id>
<content type='text'>
Use keyring_alloc() to create special keyrings now that it has
a permissions parameter rather than using key_alloc() +
key_instantiate_and_link().

Signed-off-by: David Howells &lt;dhowells@redhat.com&gt;
Cc: Rusty Russell &lt;rusty@rustcorp.com.au&gt;
Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;
</content>
</entry>
<entry>
<title>MODSIGN: Avoid using .incbin in C source</title>
<updated>2012-12-14T02:36:44Z</updated>
<author>
<name>Takashi Iwai</name>
<email>tiwai@suse.de</email>
</author>
<published>2012-12-11T01:07:13Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=919aa45e43a84d40c27c83f6117cfa6542cee14e'/>
<id>urn:sha1:919aa45e43a84d40c27c83f6117cfa6542cee14e</id>
<content type='text'>
Using the asm .incbin statement in C sources breaks any gcc wrapper which
assumes that preprocessed C source is self-contained. Use a separate .S
file to include the siging key and certificate.

[ This means we no longer need SYMBOL_PREFIX which is defined in kernel.h
  from cbdbf2abb7844548a7d7a6a2ae7af6b6fbcea401, so I removed it -- RR ]

Tested-by: Michal Marek &lt;mmarek@suse.cz&gt;
Signed-off-by: Takashi Iwai &lt;tiwai@suse.de&gt;
Signed-off-by: Rusty Russell &lt;rusty@rustcorp.com.au&gt;
Acked-by: James Hogan &lt;james.hogan@imgtec.com&gt;
</content>
</entry>
<entry>
<title>modsign: add symbol prefix to certificate list</title>
<updated>2012-12-03T02:36:25Z</updated>
<author>
<name>James Hogan</name>
<email>james.hogan@imgtec.com</email>
</author>
<published>2012-11-23T12:08:16Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=84ecfd15f5547c992c901df6ec14b4d507eb2c6e'/>
<id>urn:sha1:84ecfd15f5547c992c901df6ec14b4d507eb2c6e</id>
<content type='text'>
Add the arch symbol prefix (if applicable) to the asm definition of
modsign_certificate_list and modsign_certificate_list_end. This uses the
recently defined SYMBOL_PREFIX which is derived from
CONFIG_SYMBOL_PREFIX.

This fixes the build of module signing on the blackfin and metag
architectures.

Signed-off-by: James Hogan &lt;james.hogan@imgtec.com&gt;
Cc: Rusty Russell &lt;rusty@rustcorp.com.au&gt;
Cc: David Howells &lt;dhowells@redhat.com&gt;
Cc: Mike Frysinger &lt;vapier@gentoo.org&gt;
Signed-off-by: Rusty Russell &lt;rusty@rustcorp.com.au&gt;
</content>
</entry>
<entry>
<title>MODSIGN: Provide module signing public keys to the kernel</title>
<updated>2012-10-10T09:31:22Z</updated>
<author>
<name>David Howells</name>
<email>dhowells@redhat.com</email>
</author>
<published>2012-09-26T09:09:51Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=631cc66eb9eaa7296e303197ff1eb0f55e32b61d'/>
<id>urn:sha1:631cc66eb9eaa7296e303197ff1eb0f55e32b61d</id>
<content type='text'>
Include a PGP keyring containing the public keys required to perform module
verification in the kernel image during build and create a special keyring
during boot which is then populated with keys of crypto type holding the public
keys found in the PGP keyring.

These can be seen by root:

[root@andromeda ~]# cat /proc/keys
07ad4ee0 I-----     1 perm 3f010000     0     0 crypto    modsign.0: RSA 87b9b3bd []
15c7f8c3 I-----     1 perm 1f030000     0     0 keyring   .module_sign: 1/4
...

It is probably worth permitting root to invalidate these keys, resulting in
their removal and preventing further modules from being loaded with that key.

Signed-off-by: David Howells &lt;dhowells@redhat.com&gt;
Signed-off-by: Rusty Russell &lt;rusty@rustcorp.com.au&gt;
</content>
</entry>
</feed>
