commit 12abbef0096b249fb517902aff4cb227c51e4a21
OBS-URL: https://build.opensuse.org/package/show/Kernel:stable/kernel-source?expand=0&rev=835
This commit is contained in:
parent
006981a7f4
commit
80180ea267
@ -1,3 +1,3 @@
|
|||||||
version https://git-lfs.github.com/spec/v1
|
version https://git-lfs.github.com/spec/v1
|
||||||
oid sha256:ab3833b4b1a53c451fc70b0aaf7bbdda56876635072219d2bb5c669fb10e902e
|
oid sha256:431ff7ca5fcf092c8f40bd7740e2c80b6a29f78aa1b56220c96f825f6d61e8ea
|
||||||
size 177353
|
size 177636
|
||||||
|
@ -970,6 +970,36 @@ Wed Mar 7 16:09:53 CET 2018 - tiwai@suse.de
|
|||||||
MMIO when running nested (bsc#1081431).
|
MMIO when running nested (bsc#1081431).
|
||||||
- commit 4e5b14d
|
- commit 4e5b14d
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue Mar 6 14:08:41 CET 2018 - jslaby@suse.cz
|
||||||
|
|
||||||
|
- Update config files.
|
||||||
|
Enable module signing (bnc#1082905):
|
||||||
|
* CONFIG_MODULE_SIG=y
|
||||||
|
* # CONFIG_MODULE_SIG_FORCE is not set
|
||||||
|
* # CONFIG_MODULE_SIG_ALL is not set
|
||||||
|
* # CONFIG_MODULE_SIG_SHA1 is not set
|
||||||
|
* # CONFIG_MODULE_SIG_SHA224 is not set
|
||||||
|
* CONFIG_MODULE_SIG_SHA256=y
|
||||||
|
* # CONFIG_MODULE_SIG_SHA384 is not set
|
||||||
|
* # CONFIG_MODULE_SIG_SHA512 is not set
|
||||||
|
* CONFIG_MODULE_SIG_HASH="sha256"
|
||||||
|
* CONFIG_MODULE_SIG_KEY="certs/signing_key.pem"
|
||||||
|
* CONFIG_SECONDARY_TRUSTED_KEYRING=y
|
||||||
|
* CONFIG_SYSTEM_BLACKLIST_KEYRING=y
|
||||||
|
* CONFIG_SYSTEM_BLACKLIST_HASH_LIST=""
|
||||||
|
This commit synchronizes these options with SLE15.
|
||||||
|
We do not add patches for loading keys from the shim layer (as in
|
||||||
|
SLE15) for the time being. They were rejected multiple times in
|
||||||
|
upstream and we do not want to forward-port them infinitely. This only
|
||||||
|
means that loading KMPs with none/invalid signatures generates this:
|
||||||
|
<module_name>: loading out-of-tree module taints kernel.
|
||||||
|
<module_name>: module verification failed: signature and/or required key missing - tainting kernel
|
||||||
|
But the modules load fine after that as we have MODULE_SIG_FORCE set
|
||||||
|
to 'n'.
|
||||||
|
Tested in qemu+OVMF and bare metal and everything looks fine.
|
||||||
|
- commit 12abbef
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Fri Mar 2 12:52:26 CET 2018 - tiwai@suse.de
|
Fri Mar 2 12:52:26 CET 2018 - tiwai@suse.de
|
||||||
|
|
||||||
|
@ -31,7 +31,7 @@
|
|||||||
Name: dtb-aarch64
|
Name: dtb-aarch64
|
||||||
Version: 4.15.13
|
Version: 4.15.13
|
||||||
%if 0%{?is_kotd}
|
%if 0%{?is_kotd}
|
||||||
Release: <RELEASE>.g950fc49
|
Release: <RELEASE>.g12abbef
|
||||||
%else
|
%else
|
||||||
Release: 0
|
Release: 0
|
||||||
%endif
|
%endif
|
||||||
|
@ -970,6 +970,36 @@ Wed Mar 7 16:09:53 CET 2018 - tiwai@suse.de
|
|||||||
MMIO when running nested (bsc#1081431).
|
MMIO when running nested (bsc#1081431).
|
||||||
- commit 4e5b14d
|
- commit 4e5b14d
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue Mar 6 14:08:41 CET 2018 - jslaby@suse.cz
|
||||||
|
|
||||||
|
- Update config files.
|
||||||
|
Enable module signing (bnc#1082905):
|
||||||
|
* CONFIG_MODULE_SIG=y
|
||||||
|
* # CONFIG_MODULE_SIG_FORCE is not set
|
||||||
|
* # CONFIG_MODULE_SIG_ALL is not set
|
||||||
|
* # CONFIG_MODULE_SIG_SHA1 is not set
|
||||||
|
* # CONFIG_MODULE_SIG_SHA224 is not set
|
||||||
|
* CONFIG_MODULE_SIG_SHA256=y
|
||||||
|
* # CONFIG_MODULE_SIG_SHA384 is not set
|
||||||
|
* # CONFIG_MODULE_SIG_SHA512 is not set
|
||||||
|
* CONFIG_MODULE_SIG_HASH="sha256"
|
||||||
|
* CONFIG_MODULE_SIG_KEY="certs/signing_key.pem"
|
||||||
|
* CONFIG_SECONDARY_TRUSTED_KEYRING=y
|
||||||
|
* CONFIG_SYSTEM_BLACKLIST_KEYRING=y
|
||||||
|
* CONFIG_SYSTEM_BLACKLIST_HASH_LIST=""
|
||||||
|
This commit synchronizes these options with SLE15.
|
||||||
|
We do not add patches for loading keys from the shim layer (as in
|
||||||
|
SLE15) for the time being. They were rejected multiple times in
|
||||||
|
upstream and we do not want to forward-port them infinitely. This only
|
||||||
|
means that loading KMPs with none/invalid signatures generates this:
|
||||||
|
<module_name>: loading out-of-tree module taints kernel.
|
||||||
|
<module_name>: module verification failed: signature and/or required key missing - tainting kernel
|
||||||
|
But the modules load fine after that as we have MODULE_SIG_FORCE set
|
||||||
|
to 'n'.
|
||||||
|
Tested in qemu+OVMF and bare metal and everything looks fine.
|
||||||
|
- commit 12abbef
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Fri Mar 2 12:52:26 CET 2018 - tiwai@suse.de
|
Fri Mar 2 12:52:26 CET 2018 - tiwai@suse.de
|
||||||
|
|
||||||
|
@ -31,7 +31,7 @@
|
|||||||
Name: dtb-armv6l
|
Name: dtb-armv6l
|
||||||
Version: 4.15.13
|
Version: 4.15.13
|
||||||
%if 0%{?is_kotd}
|
%if 0%{?is_kotd}
|
||||||
Release: <RELEASE>.g950fc49
|
Release: <RELEASE>.g12abbef
|
||||||
%else
|
%else
|
||||||
Release: 0
|
Release: 0
|
||||||
%endif
|
%endif
|
||||||
|
@ -970,6 +970,36 @@ Wed Mar 7 16:09:53 CET 2018 - tiwai@suse.de
|
|||||||
MMIO when running nested (bsc#1081431).
|
MMIO when running nested (bsc#1081431).
|
||||||
- commit 4e5b14d
|
- commit 4e5b14d
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue Mar 6 14:08:41 CET 2018 - jslaby@suse.cz
|
||||||
|
|
||||||
|
- Update config files.
|
||||||
|
Enable module signing (bnc#1082905):
|
||||||
|
* CONFIG_MODULE_SIG=y
|
||||||
|
* # CONFIG_MODULE_SIG_FORCE is not set
|
||||||
|
* # CONFIG_MODULE_SIG_ALL is not set
|
||||||
|
* # CONFIG_MODULE_SIG_SHA1 is not set
|
||||||
|
* # CONFIG_MODULE_SIG_SHA224 is not set
|
||||||
|
* CONFIG_MODULE_SIG_SHA256=y
|
||||||
|
* # CONFIG_MODULE_SIG_SHA384 is not set
|
||||||
|
* # CONFIG_MODULE_SIG_SHA512 is not set
|
||||||
|
* CONFIG_MODULE_SIG_HASH="sha256"
|
||||||
|
* CONFIG_MODULE_SIG_KEY="certs/signing_key.pem"
|
||||||
|
* CONFIG_SECONDARY_TRUSTED_KEYRING=y
|
||||||
|
* CONFIG_SYSTEM_BLACKLIST_KEYRING=y
|
||||||
|
* CONFIG_SYSTEM_BLACKLIST_HASH_LIST=""
|
||||||
|
This commit synchronizes these options with SLE15.
|
||||||
|
We do not add patches for loading keys from the shim layer (as in
|
||||||
|
SLE15) for the time being. They were rejected multiple times in
|
||||||
|
upstream and we do not want to forward-port them infinitely. This only
|
||||||
|
means that loading KMPs with none/invalid signatures generates this:
|
||||||
|
<module_name>: loading out-of-tree module taints kernel.
|
||||||
|
<module_name>: module verification failed: signature and/or required key missing - tainting kernel
|
||||||
|
But the modules load fine after that as we have MODULE_SIG_FORCE set
|
||||||
|
to 'n'.
|
||||||
|
Tested in qemu+OVMF and bare metal and everything looks fine.
|
||||||
|
- commit 12abbef
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Fri Mar 2 12:52:26 CET 2018 - tiwai@suse.de
|
Fri Mar 2 12:52:26 CET 2018 - tiwai@suse.de
|
||||||
|
|
||||||
|
@ -31,7 +31,7 @@
|
|||||||
Name: dtb-armv7l
|
Name: dtb-armv7l
|
||||||
Version: 4.15.13
|
Version: 4.15.13
|
||||||
%if 0%{?is_kotd}
|
%if 0%{?is_kotd}
|
||||||
Release: <RELEASE>.g950fc49
|
Release: <RELEASE>.g12abbef
|
||||||
%else
|
%else
|
||||||
Release: 0
|
Release: 0
|
||||||
%endif
|
%endif
|
||||||
|
@ -970,6 +970,36 @@ Wed Mar 7 16:09:53 CET 2018 - tiwai@suse.de
|
|||||||
MMIO when running nested (bsc#1081431).
|
MMIO when running nested (bsc#1081431).
|
||||||
- commit 4e5b14d
|
- commit 4e5b14d
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue Mar 6 14:08:41 CET 2018 - jslaby@suse.cz
|
||||||
|
|
||||||
|
- Update config files.
|
||||||
|
Enable module signing (bnc#1082905):
|
||||||
|
* CONFIG_MODULE_SIG=y
|
||||||
|
* # CONFIG_MODULE_SIG_FORCE is not set
|
||||||
|
* # CONFIG_MODULE_SIG_ALL is not set
|
||||||
|
* # CONFIG_MODULE_SIG_SHA1 is not set
|
||||||
|
* # CONFIG_MODULE_SIG_SHA224 is not set
|
||||||
|
* CONFIG_MODULE_SIG_SHA256=y
|
||||||
|
* # CONFIG_MODULE_SIG_SHA384 is not set
|
||||||
|
* # CONFIG_MODULE_SIG_SHA512 is not set
|
||||||
|
* CONFIG_MODULE_SIG_HASH="sha256"
|
||||||
|
* CONFIG_MODULE_SIG_KEY="certs/signing_key.pem"
|
||||||
|
* CONFIG_SECONDARY_TRUSTED_KEYRING=y
|
||||||
|
* CONFIG_SYSTEM_BLACKLIST_KEYRING=y
|
||||||
|
* CONFIG_SYSTEM_BLACKLIST_HASH_LIST=""
|
||||||
|
This commit synchronizes these options with SLE15.
|
||||||
|
We do not add patches for loading keys from the shim layer (as in
|
||||||
|
SLE15) for the time being. They were rejected multiple times in
|
||||||
|
upstream and we do not want to forward-port them infinitely. This only
|
||||||
|
means that loading KMPs with none/invalid signatures generates this:
|
||||||
|
<module_name>: loading out-of-tree module taints kernel.
|
||||||
|
<module_name>: module verification failed: signature and/or required key missing - tainting kernel
|
||||||
|
But the modules load fine after that as we have MODULE_SIG_FORCE set
|
||||||
|
to 'n'.
|
||||||
|
Tested in qemu+OVMF and bare metal and everything looks fine.
|
||||||
|
- commit 12abbef
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Fri Mar 2 12:52:26 CET 2018 - tiwai@suse.de
|
Fri Mar 2 12:52:26 CET 2018 - tiwai@suse.de
|
||||||
|
|
||||||
|
@ -60,7 +60,7 @@ License: GPL-2.0
|
|||||||
Group: System/Kernel
|
Group: System/Kernel
|
||||||
Version: 4.15.13
|
Version: 4.15.13
|
||||||
%if 0%{?is_kotd}
|
%if 0%{?is_kotd}
|
||||||
Release: <RELEASE>.g950fc49
|
Release: <RELEASE>.g12abbef
|
||||||
%else
|
%else
|
||||||
Release: 0
|
Release: 0
|
||||||
%endif
|
%endif
|
||||||
|
@ -970,6 +970,36 @@ Wed Mar 7 16:09:53 CET 2018 - tiwai@suse.de
|
|||||||
MMIO when running nested (bsc#1081431).
|
MMIO when running nested (bsc#1081431).
|
||||||
- commit 4e5b14d
|
- commit 4e5b14d
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue Mar 6 14:08:41 CET 2018 - jslaby@suse.cz
|
||||||
|
|
||||||
|
- Update config files.
|
||||||
|
Enable module signing (bnc#1082905):
|
||||||
|
* CONFIG_MODULE_SIG=y
|
||||||
|
* # CONFIG_MODULE_SIG_FORCE is not set
|
||||||
|
* # CONFIG_MODULE_SIG_ALL is not set
|
||||||
|
* # CONFIG_MODULE_SIG_SHA1 is not set
|
||||||
|
* # CONFIG_MODULE_SIG_SHA224 is not set
|
||||||
|
* CONFIG_MODULE_SIG_SHA256=y
|
||||||
|
* # CONFIG_MODULE_SIG_SHA384 is not set
|
||||||
|
* # CONFIG_MODULE_SIG_SHA512 is not set
|
||||||
|
* CONFIG_MODULE_SIG_HASH="sha256"
|
||||||
|
* CONFIG_MODULE_SIG_KEY="certs/signing_key.pem"
|
||||||
|
* CONFIG_SECONDARY_TRUSTED_KEYRING=y
|
||||||
|
* CONFIG_SYSTEM_BLACKLIST_KEYRING=y
|
||||||
|
* CONFIG_SYSTEM_BLACKLIST_HASH_LIST=""
|
||||||
|
This commit synchronizes these options with SLE15.
|
||||||
|
We do not add patches for loading keys from the shim layer (as in
|
||||||
|
SLE15) for the time being. They were rejected multiple times in
|
||||||
|
upstream and we do not want to forward-port them infinitely. This only
|
||||||
|
means that loading KMPs with none/invalid signatures generates this:
|
||||||
|
<module_name>: loading out-of-tree module taints kernel.
|
||||||
|
<module_name>: module verification failed: signature and/or required key missing - tainting kernel
|
||||||
|
But the modules load fine after that as we have MODULE_SIG_FORCE set
|
||||||
|
to 'n'.
|
||||||
|
Tested in qemu+OVMF and bare metal and everything looks fine.
|
||||||
|
- commit 12abbef
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Fri Mar 2 12:52:26 CET 2018 - tiwai@suse.de
|
Fri Mar 2 12:52:26 CET 2018 - tiwai@suse.de
|
||||||
|
|
||||||
|
@ -60,7 +60,7 @@ License: GPL-2.0
|
|||||||
Group: System/Kernel
|
Group: System/Kernel
|
||||||
Version: 4.15.13
|
Version: 4.15.13
|
||||||
%if 0%{?is_kotd}
|
%if 0%{?is_kotd}
|
||||||
Release: <RELEASE>.g950fc49
|
Release: <RELEASE>.g12abbef
|
||||||
%else
|
%else
|
||||||
Release: 0
|
Release: 0
|
||||||
%endif
|
%endif
|
||||||
|
@ -970,6 +970,36 @@ Wed Mar 7 16:09:53 CET 2018 - tiwai@suse.de
|
|||||||
MMIO when running nested (bsc#1081431).
|
MMIO when running nested (bsc#1081431).
|
||||||
- commit 4e5b14d
|
- commit 4e5b14d
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue Mar 6 14:08:41 CET 2018 - jslaby@suse.cz
|
||||||
|
|
||||||
|
- Update config files.
|
||||||
|
Enable module signing (bnc#1082905):
|
||||||
|
* CONFIG_MODULE_SIG=y
|
||||||
|
* # CONFIG_MODULE_SIG_FORCE is not set
|
||||||
|
* # CONFIG_MODULE_SIG_ALL is not set
|
||||||
|
* # CONFIG_MODULE_SIG_SHA1 is not set
|
||||||
|
* # CONFIG_MODULE_SIG_SHA224 is not set
|
||||||
|
* CONFIG_MODULE_SIG_SHA256=y
|
||||||
|
* # CONFIG_MODULE_SIG_SHA384 is not set
|
||||||
|
* # CONFIG_MODULE_SIG_SHA512 is not set
|
||||||
|
* CONFIG_MODULE_SIG_HASH="sha256"
|
||||||
|
* CONFIG_MODULE_SIG_KEY="certs/signing_key.pem"
|
||||||
|
* CONFIG_SECONDARY_TRUSTED_KEYRING=y
|
||||||
|
* CONFIG_SYSTEM_BLACKLIST_KEYRING=y
|
||||||
|
* CONFIG_SYSTEM_BLACKLIST_HASH_LIST=""
|
||||||
|
This commit synchronizes these options with SLE15.
|
||||||
|
We do not add patches for loading keys from the shim layer (as in
|
||||||
|
SLE15) for the time being. They were rejected multiple times in
|
||||||
|
upstream and we do not want to forward-port them infinitely. This only
|
||||||
|
means that loading KMPs with none/invalid signatures generates this:
|
||||||
|
<module_name>: loading out-of-tree module taints kernel.
|
||||||
|
<module_name>: module verification failed: signature and/or required key missing - tainting kernel
|
||||||
|
But the modules load fine after that as we have MODULE_SIG_FORCE set
|
||||||
|
to 'n'.
|
||||||
|
Tested in qemu+OVMF and bare metal and everything looks fine.
|
||||||
|
- commit 12abbef
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Fri Mar 2 12:52:26 CET 2018 - tiwai@suse.de
|
Fri Mar 2 12:52:26 CET 2018 - tiwai@suse.de
|
||||||
|
|
||||||
|
@ -60,7 +60,7 @@ License: GPL-2.0
|
|||||||
Group: System/Kernel
|
Group: System/Kernel
|
||||||
Version: 4.15.13
|
Version: 4.15.13
|
||||||
%if 0%{?is_kotd}
|
%if 0%{?is_kotd}
|
||||||
Release: <RELEASE>.g950fc49
|
Release: <RELEASE>.g12abbef
|
||||||
%else
|
%else
|
||||||
Release: 0
|
Release: 0
|
||||||
%endif
|
%endif
|
||||||
|
@ -970,6 +970,36 @@ Wed Mar 7 16:09:53 CET 2018 - tiwai@suse.de
|
|||||||
MMIO when running nested (bsc#1081431).
|
MMIO when running nested (bsc#1081431).
|
||||||
- commit 4e5b14d
|
- commit 4e5b14d
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue Mar 6 14:08:41 CET 2018 - jslaby@suse.cz
|
||||||
|
|
||||||
|
- Update config files.
|
||||||
|
Enable module signing (bnc#1082905):
|
||||||
|
* CONFIG_MODULE_SIG=y
|
||||||
|
* # CONFIG_MODULE_SIG_FORCE is not set
|
||||||
|
* # CONFIG_MODULE_SIG_ALL is not set
|
||||||
|
* # CONFIG_MODULE_SIG_SHA1 is not set
|
||||||
|
* # CONFIG_MODULE_SIG_SHA224 is not set
|
||||||
|
* CONFIG_MODULE_SIG_SHA256=y
|
||||||
|
* # CONFIG_MODULE_SIG_SHA384 is not set
|
||||||
|
* # CONFIG_MODULE_SIG_SHA512 is not set
|
||||||
|
* CONFIG_MODULE_SIG_HASH="sha256"
|
||||||
|
* CONFIG_MODULE_SIG_KEY="certs/signing_key.pem"
|
||||||
|
* CONFIG_SECONDARY_TRUSTED_KEYRING=y
|
||||||
|
* CONFIG_SYSTEM_BLACKLIST_KEYRING=y
|
||||||
|
* CONFIG_SYSTEM_BLACKLIST_HASH_LIST=""
|
||||||
|
This commit synchronizes these options with SLE15.
|
||||||
|
We do not add patches for loading keys from the shim layer (as in
|
||||||
|
SLE15) for the time being. They were rejected multiple times in
|
||||||
|
upstream and we do not want to forward-port them infinitely. This only
|
||||||
|
means that loading KMPs with none/invalid signatures generates this:
|
||||||
|
<module_name>: loading out-of-tree module taints kernel.
|
||||||
|
<module_name>: module verification failed: signature and/or required key missing - tainting kernel
|
||||||
|
But the modules load fine after that as we have MODULE_SIG_FORCE set
|
||||||
|
to 'n'.
|
||||||
|
Tested in qemu+OVMF and bare metal and everything looks fine.
|
||||||
|
- commit 12abbef
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Fri Mar 2 12:52:26 CET 2018 - tiwai@suse.de
|
Fri Mar 2 12:52:26 CET 2018 - tiwai@suse.de
|
||||||
|
|
||||||
|
@ -33,7 +33,7 @@ License: GPL-2.0
|
|||||||
Group: Documentation/Man
|
Group: Documentation/Man
|
||||||
Version: 4.15.13
|
Version: 4.15.13
|
||||||
%if 0%{?is_kotd}
|
%if 0%{?is_kotd}
|
||||||
Release: <RELEASE>.g950fc49
|
Release: <RELEASE>.g12abbef
|
||||||
%else
|
%else
|
||||||
Release: 0
|
Release: 0
|
||||||
%endif
|
%endif
|
||||||
|
@ -970,6 +970,36 @@ Wed Mar 7 16:09:53 CET 2018 - tiwai@suse.de
|
|||||||
MMIO when running nested (bsc#1081431).
|
MMIO when running nested (bsc#1081431).
|
||||||
- commit 4e5b14d
|
- commit 4e5b14d
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue Mar 6 14:08:41 CET 2018 - jslaby@suse.cz
|
||||||
|
|
||||||
|
- Update config files.
|
||||||
|
Enable module signing (bnc#1082905):
|
||||||
|
* CONFIG_MODULE_SIG=y
|
||||||
|
* # CONFIG_MODULE_SIG_FORCE is not set
|
||||||
|
* # CONFIG_MODULE_SIG_ALL is not set
|
||||||
|
* # CONFIG_MODULE_SIG_SHA1 is not set
|
||||||
|
* # CONFIG_MODULE_SIG_SHA224 is not set
|
||||||
|
* CONFIG_MODULE_SIG_SHA256=y
|
||||||
|
* # CONFIG_MODULE_SIG_SHA384 is not set
|
||||||
|
* # CONFIG_MODULE_SIG_SHA512 is not set
|
||||||
|
* CONFIG_MODULE_SIG_HASH="sha256"
|
||||||
|
* CONFIG_MODULE_SIG_KEY="certs/signing_key.pem"
|
||||||
|
* CONFIG_SECONDARY_TRUSTED_KEYRING=y
|
||||||
|
* CONFIG_SYSTEM_BLACKLIST_KEYRING=y
|
||||||
|
* CONFIG_SYSTEM_BLACKLIST_HASH_LIST=""
|
||||||
|
This commit synchronizes these options with SLE15.
|
||||||
|
We do not add patches for loading keys from the shim layer (as in
|
||||||
|
SLE15) for the time being. They were rejected multiple times in
|
||||||
|
upstream and we do not want to forward-port them infinitely. This only
|
||||||
|
means that loading KMPs with none/invalid signatures generates this:
|
||||||
|
<module_name>: loading out-of-tree module taints kernel.
|
||||||
|
<module_name>: module verification failed: signature and/or required key missing - tainting kernel
|
||||||
|
But the modules load fine after that as we have MODULE_SIG_FORCE set
|
||||||
|
to 'n'.
|
||||||
|
Tested in qemu+OVMF and bare metal and everything looks fine.
|
||||||
|
- commit 12abbef
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Fri Mar 2 12:52:26 CET 2018 - tiwai@suse.de
|
Fri Mar 2 12:52:26 CET 2018 - tiwai@suse.de
|
||||||
|
|
||||||
|
@ -60,7 +60,7 @@ License: GPL-2.0
|
|||||||
Group: System/Kernel
|
Group: System/Kernel
|
||||||
Version: 4.15.13
|
Version: 4.15.13
|
||||||
%if 0%{?is_kotd}
|
%if 0%{?is_kotd}
|
||||||
Release: <RELEASE>.g950fc49
|
Release: <RELEASE>.g12abbef
|
||||||
%else
|
%else
|
||||||
Release: 0
|
Release: 0
|
||||||
%endif
|
%endif
|
||||||
|
@ -970,6 +970,36 @@ Wed Mar 7 16:09:53 CET 2018 - tiwai@suse.de
|
|||||||
MMIO when running nested (bsc#1081431).
|
MMIO when running nested (bsc#1081431).
|
||||||
- commit 4e5b14d
|
- commit 4e5b14d
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue Mar 6 14:08:41 CET 2018 - jslaby@suse.cz
|
||||||
|
|
||||||
|
- Update config files.
|
||||||
|
Enable module signing (bnc#1082905):
|
||||||
|
* CONFIG_MODULE_SIG=y
|
||||||
|
* # CONFIG_MODULE_SIG_FORCE is not set
|
||||||
|
* # CONFIG_MODULE_SIG_ALL is not set
|
||||||
|
* # CONFIG_MODULE_SIG_SHA1 is not set
|
||||||
|
* # CONFIG_MODULE_SIG_SHA224 is not set
|
||||||
|
* CONFIG_MODULE_SIG_SHA256=y
|
||||||
|
* # CONFIG_MODULE_SIG_SHA384 is not set
|
||||||
|
* # CONFIG_MODULE_SIG_SHA512 is not set
|
||||||
|
* CONFIG_MODULE_SIG_HASH="sha256"
|
||||||
|
* CONFIG_MODULE_SIG_KEY="certs/signing_key.pem"
|
||||||
|
* CONFIG_SECONDARY_TRUSTED_KEYRING=y
|
||||||
|
* CONFIG_SYSTEM_BLACKLIST_KEYRING=y
|
||||||
|
* CONFIG_SYSTEM_BLACKLIST_HASH_LIST=""
|
||||||
|
This commit synchronizes these options with SLE15.
|
||||||
|
We do not add patches for loading keys from the shim layer (as in
|
||||||
|
SLE15) for the time being. They were rejected multiple times in
|
||||||
|
upstream and we do not want to forward-port them infinitely. This only
|
||||||
|
means that loading KMPs with none/invalid signatures generates this:
|
||||||
|
<module_name>: loading out-of-tree module taints kernel.
|
||||||
|
<module_name>: module verification failed: signature and/or required key missing - tainting kernel
|
||||||
|
But the modules load fine after that as we have MODULE_SIG_FORCE set
|
||||||
|
to 'n'.
|
||||||
|
Tested in qemu+OVMF and bare metal and everything looks fine.
|
||||||
|
- commit 12abbef
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Fri Mar 2 12:52:26 CET 2018 - tiwai@suse.de
|
Fri Mar 2 12:52:26 CET 2018 - tiwai@suse.de
|
||||||
|
|
||||||
|
@ -66,7 +66,7 @@ License: GPL-2.0
|
|||||||
Group: SLES
|
Group: SLES
|
||||||
Version: 4.15.13
|
Version: 4.15.13
|
||||||
%if 0%{?is_kotd}
|
%if 0%{?is_kotd}
|
||||||
Release: <RELEASE>.g950fc49
|
Release: <RELEASE>.g12abbef
|
||||||
%else
|
%else
|
||||||
Release: 0
|
Release: 0
|
||||||
%endif
|
%endif
|
||||||
|
@ -970,6 +970,36 @@ Wed Mar 7 16:09:53 CET 2018 - tiwai@suse.de
|
|||||||
MMIO when running nested (bsc#1081431).
|
MMIO when running nested (bsc#1081431).
|
||||||
- commit 4e5b14d
|
- commit 4e5b14d
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue Mar 6 14:08:41 CET 2018 - jslaby@suse.cz
|
||||||
|
|
||||||
|
- Update config files.
|
||||||
|
Enable module signing (bnc#1082905):
|
||||||
|
* CONFIG_MODULE_SIG=y
|
||||||
|
* # CONFIG_MODULE_SIG_FORCE is not set
|
||||||
|
* # CONFIG_MODULE_SIG_ALL is not set
|
||||||
|
* # CONFIG_MODULE_SIG_SHA1 is not set
|
||||||
|
* # CONFIG_MODULE_SIG_SHA224 is not set
|
||||||
|
* CONFIG_MODULE_SIG_SHA256=y
|
||||||
|
* # CONFIG_MODULE_SIG_SHA384 is not set
|
||||||
|
* # CONFIG_MODULE_SIG_SHA512 is not set
|
||||||
|
* CONFIG_MODULE_SIG_HASH="sha256"
|
||||||
|
* CONFIG_MODULE_SIG_KEY="certs/signing_key.pem"
|
||||||
|
* CONFIG_SECONDARY_TRUSTED_KEYRING=y
|
||||||
|
* CONFIG_SYSTEM_BLACKLIST_KEYRING=y
|
||||||
|
* CONFIG_SYSTEM_BLACKLIST_HASH_LIST=""
|
||||||
|
This commit synchronizes these options with SLE15.
|
||||||
|
We do not add patches for loading keys from the shim layer (as in
|
||||||
|
SLE15) for the time being. They were rejected multiple times in
|
||||||
|
upstream and we do not want to forward-port them infinitely. This only
|
||||||
|
means that loading KMPs with none/invalid signatures generates this:
|
||||||
|
<module_name>: loading out-of-tree module taints kernel.
|
||||||
|
<module_name>: module verification failed: signature and/or required key missing - tainting kernel
|
||||||
|
But the modules load fine after that as we have MODULE_SIG_FORCE set
|
||||||
|
to 'n'.
|
||||||
|
Tested in qemu+OVMF and bare metal and everything looks fine.
|
||||||
|
- commit 12abbef
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Fri Mar 2 12:52:26 CET 2018 - tiwai@suse.de
|
Fri Mar 2 12:52:26 CET 2018 - tiwai@suse.de
|
||||||
|
|
||||||
|
@ -38,7 +38,7 @@ License: GPL-2.0
|
|||||||
Group: SLES
|
Group: SLES
|
||||||
Version: 4.15.13
|
Version: 4.15.13
|
||||||
%if 0%{?is_kotd}
|
%if 0%{?is_kotd}
|
||||||
Release: <RELEASE>.g950fc49
|
Release: <RELEASE>.g12abbef
|
||||||
%else
|
%else
|
||||||
Release: 0
|
Release: 0
|
||||||
%endif
|
%endif
|
||||||
|
@ -970,6 +970,36 @@ Wed Mar 7 16:09:53 CET 2018 - tiwai@suse.de
|
|||||||
MMIO when running nested (bsc#1081431).
|
MMIO when running nested (bsc#1081431).
|
||||||
- commit 4e5b14d
|
- commit 4e5b14d
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue Mar 6 14:08:41 CET 2018 - jslaby@suse.cz
|
||||||
|
|
||||||
|
- Update config files.
|
||||||
|
Enable module signing (bnc#1082905):
|
||||||
|
* CONFIG_MODULE_SIG=y
|
||||||
|
* # CONFIG_MODULE_SIG_FORCE is not set
|
||||||
|
* # CONFIG_MODULE_SIG_ALL is not set
|
||||||
|
* # CONFIG_MODULE_SIG_SHA1 is not set
|
||||||
|
* # CONFIG_MODULE_SIG_SHA224 is not set
|
||||||
|
* CONFIG_MODULE_SIG_SHA256=y
|
||||||
|
* # CONFIG_MODULE_SIG_SHA384 is not set
|
||||||
|
* # CONFIG_MODULE_SIG_SHA512 is not set
|
||||||
|
* CONFIG_MODULE_SIG_HASH="sha256"
|
||||||
|
* CONFIG_MODULE_SIG_KEY="certs/signing_key.pem"
|
||||||
|
* CONFIG_SECONDARY_TRUSTED_KEYRING=y
|
||||||
|
* CONFIG_SYSTEM_BLACKLIST_KEYRING=y
|
||||||
|
* CONFIG_SYSTEM_BLACKLIST_HASH_LIST=""
|
||||||
|
This commit synchronizes these options with SLE15.
|
||||||
|
We do not add patches for loading keys from the shim layer (as in
|
||||||
|
SLE15) for the time being. They were rejected multiple times in
|
||||||
|
upstream and we do not want to forward-port them infinitely. This only
|
||||||
|
means that loading KMPs with none/invalid signatures generates this:
|
||||||
|
<module_name>: loading out-of-tree module taints kernel.
|
||||||
|
<module_name>: module verification failed: signature and/or required key missing - tainting kernel
|
||||||
|
But the modules load fine after that as we have MODULE_SIG_FORCE set
|
||||||
|
to 'n'.
|
||||||
|
Tested in qemu+OVMF and bare metal and everything looks fine.
|
||||||
|
- commit 12abbef
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Fri Mar 2 12:52:26 CET 2018 - tiwai@suse.de
|
Fri Mar 2 12:52:26 CET 2018 - tiwai@suse.de
|
||||||
|
|
||||||
|
@ -60,7 +60,7 @@ License: GPL-2.0
|
|||||||
Group: System/Kernel
|
Group: System/Kernel
|
||||||
Version: 4.15.13
|
Version: 4.15.13
|
||||||
%if 0%{?is_kotd}
|
%if 0%{?is_kotd}
|
||||||
Release: <RELEASE>.g950fc49
|
Release: <RELEASE>.g12abbef
|
||||||
%else
|
%else
|
||||||
Release: 0
|
Release: 0
|
||||||
%endif
|
%endif
|
||||||
|
@ -970,6 +970,36 @@ Wed Mar 7 16:09:53 CET 2018 - tiwai@suse.de
|
|||||||
MMIO when running nested (bsc#1081431).
|
MMIO when running nested (bsc#1081431).
|
||||||
- commit 4e5b14d
|
- commit 4e5b14d
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue Mar 6 14:08:41 CET 2018 - jslaby@suse.cz
|
||||||
|
|
||||||
|
- Update config files.
|
||||||
|
Enable module signing (bnc#1082905):
|
||||||
|
* CONFIG_MODULE_SIG=y
|
||||||
|
* # CONFIG_MODULE_SIG_FORCE is not set
|
||||||
|
* # CONFIG_MODULE_SIG_ALL is not set
|
||||||
|
* # CONFIG_MODULE_SIG_SHA1 is not set
|
||||||
|
* # CONFIG_MODULE_SIG_SHA224 is not set
|
||||||
|
* CONFIG_MODULE_SIG_SHA256=y
|
||||||
|
* # CONFIG_MODULE_SIG_SHA384 is not set
|
||||||
|
* # CONFIG_MODULE_SIG_SHA512 is not set
|
||||||
|
* CONFIG_MODULE_SIG_HASH="sha256"
|
||||||
|
* CONFIG_MODULE_SIG_KEY="certs/signing_key.pem"
|
||||||
|
* CONFIG_SECONDARY_TRUSTED_KEYRING=y
|
||||||
|
* CONFIG_SYSTEM_BLACKLIST_KEYRING=y
|
||||||
|
* CONFIG_SYSTEM_BLACKLIST_HASH_LIST=""
|
||||||
|
This commit synchronizes these options with SLE15.
|
||||||
|
We do not add patches for loading keys from the shim layer (as in
|
||||||
|
SLE15) for the time being. They were rejected multiple times in
|
||||||
|
upstream and we do not want to forward-port them infinitely. This only
|
||||||
|
means that loading KMPs with none/invalid signatures generates this:
|
||||||
|
<module_name>: loading out-of-tree module taints kernel.
|
||||||
|
<module_name>: module verification failed: signature and/or required key missing - tainting kernel
|
||||||
|
But the modules load fine after that as we have MODULE_SIG_FORCE set
|
||||||
|
to 'n'.
|
||||||
|
Tested in qemu+OVMF and bare metal and everything looks fine.
|
||||||
|
- commit 12abbef
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Fri Mar 2 12:52:26 CET 2018 - tiwai@suse.de
|
Fri Mar 2 12:52:26 CET 2018 - tiwai@suse.de
|
||||||
|
|
||||||
|
@ -32,7 +32,7 @@ License: GPL-2.0
|
|||||||
Group: Development/Sources
|
Group: Development/Sources
|
||||||
Version: 4.15.13
|
Version: 4.15.13
|
||||||
%if 0%{?is_kotd}
|
%if 0%{?is_kotd}
|
||||||
Release: <RELEASE>.g950fc49
|
Release: <RELEASE>.g12abbef
|
||||||
%else
|
%else
|
||||||
Release: 0
|
Release: 0
|
||||||
%endif
|
%endif
|
||||||
|
@ -970,6 +970,36 @@ Wed Mar 7 16:09:53 CET 2018 - tiwai@suse.de
|
|||||||
MMIO when running nested (bsc#1081431).
|
MMIO when running nested (bsc#1081431).
|
||||||
- commit 4e5b14d
|
- commit 4e5b14d
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue Mar 6 14:08:41 CET 2018 - jslaby@suse.cz
|
||||||
|
|
||||||
|
- Update config files.
|
||||||
|
Enable module signing (bnc#1082905):
|
||||||
|
* CONFIG_MODULE_SIG=y
|
||||||
|
* # CONFIG_MODULE_SIG_FORCE is not set
|
||||||
|
* # CONFIG_MODULE_SIG_ALL is not set
|
||||||
|
* # CONFIG_MODULE_SIG_SHA1 is not set
|
||||||
|
* # CONFIG_MODULE_SIG_SHA224 is not set
|
||||||
|
* CONFIG_MODULE_SIG_SHA256=y
|
||||||
|
* # CONFIG_MODULE_SIG_SHA384 is not set
|
||||||
|
* # CONFIG_MODULE_SIG_SHA512 is not set
|
||||||
|
* CONFIG_MODULE_SIG_HASH="sha256"
|
||||||
|
* CONFIG_MODULE_SIG_KEY="certs/signing_key.pem"
|
||||||
|
* CONFIG_SECONDARY_TRUSTED_KEYRING=y
|
||||||
|
* CONFIG_SYSTEM_BLACKLIST_KEYRING=y
|
||||||
|
* CONFIG_SYSTEM_BLACKLIST_HASH_LIST=""
|
||||||
|
This commit synchronizes these options with SLE15.
|
||||||
|
We do not add patches for loading keys from the shim layer (as in
|
||||||
|
SLE15) for the time being. They were rejected multiple times in
|
||||||
|
upstream and we do not want to forward-port them infinitely. This only
|
||||||
|
means that loading KMPs with none/invalid signatures generates this:
|
||||||
|
<module_name>: loading out-of-tree module taints kernel.
|
||||||
|
<module_name>: module verification failed: signature and/or required key missing - tainting kernel
|
||||||
|
But the modules load fine after that as we have MODULE_SIG_FORCE set
|
||||||
|
to 'n'.
|
||||||
|
Tested in qemu+OVMF and bare metal and everything looks fine.
|
||||||
|
- commit 12abbef
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Fri Mar 2 12:52:26 CET 2018 - tiwai@suse.de
|
Fri Mar 2 12:52:26 CET 2018 - tiwai@suse.de
|
||||||
|
|
||||||
|
@ -27,7 +27,7 @@ Group: Development/Sources
|
|||||||
Version: 4.15.13
|
Version: 4.15.13
|
||||||
%if %using_buildservice
|
%if %using_buildservice
|
||||||
%if 0%{?is_kotd}
|
%if 0%{?is_kotd}
|
||||||
Release: <RELEASE>.g950fc49
|
Release: <RELEASE>.g12abbef
|
||||||
%else
|
%else
|
||||||
Release: 0
|
Release: 0
|
||||||
%endif
|
%endif
|
||||||
|
@ -970,6 +970,36 @@ Wed Mar 7 16:09:53 CET 2018 - tiwai@suse.de
|
|||||||
MMIO when running nested (bsc#1081431).
|
MMIO when running nested (bsc#1081431).
|
||||||
- commit 4e5b14d
|
- commit 4e5b14d
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue Mar 6 14:08:41 CET 2018 - jslaby@suse.cz
|
||||||
|
|
||||||
|
- Update config files.
|
||||||
|
Enable module signing (bnc#1082905):
|
||||||
|
* CONFIG_MODULE_SIG=y
|
||||||
|
* # CONFIG_MODULE_SIG_FORCE is not set
|
||||||
|
* # CONFIG_MODULE_SIG_ALL is not set
|
||||||
|
* # CONFIG_MODULE_SIG_SHA1 is not set
|
||||||
|
* # CONFIG_MODULE_SIG_SHA224 is not set
|
||||||
|
* CONFIG_MODULE_SIG_SHA256=y
|
||||||
|
* # CONFIG_MODULE_SIG_SHA384 is not set
|
||||||
|
* # CONFIG_MODULE_SIG_SHA512 is not set
|
||||||
|
* CONFIG_MODULE_SIG_HASH="sha256"
|
||||||
|
* CONFIG_MODULE_SIG_KEY="certs/signing_key.pem"
|
||||||
|
* CONFIG_SECONDARY_TRUSTED_KEYRING=y
|
||||||
|
* CONFIG_SYSTEM_BLACKLIST_KEYRING=y
|
||||||
|
* CONFIG_SYSTEM_BLACKLIST_HASH_LIST=""
|
||||||
|
This commit synchronizes these options with SLE15.
|
||||||
|
We do not add patches for loading keys from the shim layer (as in
|
||||||
|
SLE15) for the time being. They were rejected multiple times in
|
||||||
|
upstream and we do not want to forward-port them infinitely. This only
|
||||||
|
means that loading KMPs with none/invalid signatures generates this:
|
||||||
|
<module_name>: loading out-of-tree module taints kernel.
|
||||||
|
<module_name>: module verification failed: signature and/or required key missing - tainting kernel
|
||||||
|
But the modules load fine after that as we have MODULE_SIG_FORCE set
|
||||||
|
to 'n'.
|
||||||
|
Tested in qemu+OVMF and bare metal and everything looks fine.
|
||||||
|
- commit 12abbef
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Fri Mar 2 12:52:26 CET 2018 - tiwai@suse.de
|
Fri Mar 2 12:52:26 CET 2018 - tiwai@suse.de
|
||||||
|
|
||||||
|
@ -60,7 +60,7 @@ License: GPL-2.0
|
|||||||
Group: System/Kernel
|
Group: System/Kernel
|
||||||
Version: 4.15.13
|
Version: 4.15.13
|
||||||
%if 0%{?is_kotd}
|
%if 0%{?is_kotd}
|
||||||
Release: <RELEASE>.g950fc49
|
Release: <RELEASE>.g12abbef
|
||||||
%else
|
%else
|
||||||
Release: 0
|
Release: 0
|
||||||
%endif
|
%endif
|
||||||
|
@ -970,6 +970,36 @@ Wed Mar 7 16:09:53 CET 2018 - tiwai@suse.de
|
|||||||
MMIO when running nested (bsc#1081431).
|
MMIO when running nested (bsc#1081431).
|
||||||
- commit 4e5b14d
|
- commit 4e5b14d
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue Mar 6 14:08:41 CET 2018 - jslaby@suse.cz
|
||||||
|
|
||||||
|
- Update config files.
|
||||||
|
Enable module signing (bnc#1082905):
|
||||||
|
* CONFIG_MODULE_SIG=y
|
||||||
|
* # CONFIG_MODULE_SIG_FORCE is not set
|
||||||
|
* # CONFIG_MODULE_SIG_ALL is not set
|
||||||
|
* # CONFIG_MODULE_SIG_SHA1 is not set
|
||||||
|
* # CONFIG_MODULE_SIG_SHA224 is not set
|
||||||
|
* CONFIG_MODULE_SIG_SHA256=y
|
||||||
|
* # CONFIG_MODULE_SIG_SHA384 is not set
|
||||||
|
* # CONFIG_MODULE_SIG_SHA512 is not set
|
||||||
|
* CONFIG_MODULE_SIG_HASH="sha256"
|
||||||
|
* CONFIG_MODULE_SIG_KEY="certs/signing_key.pem"
|
||||||
|
* CONFIG_SECONDARY_TRUSTED_KEYRING=y
|
||||||
|
* CONFIG_SYSTEM_BLACKLIST_KEYRING=y
|
||||||
|
* CONFIG_SYSTEM_BLACKLIST_HASH_LIST=""
|
||||||
|
This commit synchronizes these options with SLE15.
|
||||||
|
We do not add patches for loading keys from the shim layer (as in
|
||||||
|
SLE15) for the time being. They were rejected multiple times in
|
||||||
|
upstream and we do not want to forward-port them infinitely. This only
|
||||||
|
means that loading KMPs with none/invalid signatures generates this:
|
||||||
|
<module_name>: loading out-of-tree module taints kernel.
|
||||||
|
<module_name>: module verification failed: signature and/or required key missing - tainting kernel
|
||||||
|
But the modules load fine after that as we have MODULE_SIG_FORCE set
|
||||||
|
to 'n'.
|
||||||
|
Tested in qemu+OVMF and bare metal and everything looks fine.
|
||||||
|
- commit 12abbef
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Fri Mar 2 12:52:26 CET 2018 - tiwai@suse.de
|
Fri Mar 2 12:52:26 CET 2018 - tiwai@suse.de
|
||||||
|
|
||||||
|
@ -60,7 +60,7 @@ License: GPL-2.0
|
|||||||
Group: System/Kernel
|
Group: System/Kernel
|
||||||
Version: 4.15.13
|
Version: 4.15.13
|
||||||
%if 0%{?is_kotd}
|
%if 0%{?is_kotd}
|
||||||
Release: <RELEASE>.g950fc49
|
Release: <RELEASE>.g12abbef
|
||||||
%else
|
%else
|
||||||
Release: 0
|
Release: 0
|
||||||
%endif
|
%endif
|
||||||
|
@ -970,6 +970,36 @@ Wed Mar 7 16:09:53 CET 2018 - tiwai@suse.de
|
|||||||
MMIO when running nested (bsc#1081431).
|
MMIO when running nested (bsc#1081431).
|
||||||
- commit 4e5b14d
|
- commit 4e5b14d
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue Mar 6 14:08:41 CET 2018 - jslaby@suse.cz
|
||||||
|
|
||||||
|
- Update config files.
|
||||||
|
Enable module signing (bnc#1082905):
|
||||||
|
* CONFIG_MODULE_SIG=y
|
||||||
|
* # CONFIG_MODULE_SIG_FORCE is not set
|
||||||
|
* # CONFIG_MODULE_SIG_ALL is not set
|
||||||
|
* # CONFIG_MODULE_SIG_SHA1 is not set
|
||||||
|
* # CONFIG_MODULE_SIG_SHA224 is not set
|
||||||
|
* CONFIG_MODULE_SIG_SHA256=y
|
||||||
|
* # CONFIG_MODULE_SIG_SHA384 is not set
|
||||||
|
* # CONFIG_MODULE_SIG_SHA512 is not set
|
||||||
|
* CONFIG_MODULE_SIG_HASH="sha256"
|
||||||
|
* CONFIG_MODULE_SIG_KEY="certs/signing_key.pem"
|
||||||
|
* CONFIG_SECONDARY_TRUSTED_KEYRING=y
|
||||||
|
* CONFIG_SYSTEM_BLACKLIST_KEYRING=y
|
||||||
|
* CONFIG_SYSTEM_BLACKLIST_HASH_LIST=""
|
||||||
|
This commit synchronizes these options with SLE15.
|
||||||
|
We do not add patches for loading keys from the shim layer (as in
|
||||||
|
SLE15) for the time being. They were rejected multiple times in
|
||||||
|
upstream and we do not want to forward-port them infinitely. This only
|
||||||
|
means that loading KMPs with none/invalid signatures generates this:
|
||||||
|
<module_name>: loading out-of-tree module taints kernel.
|
||||||
|
<module_name>: module verification failed: signature and/or required key missing - tainting kernel
|
||||||
|
But the modules load fine after that as we have MODULE_SIG_FORCE set
|
||||||
|
to 'n'.
|
||||||
|
Tested in qemu+OVMF and bare metal and everything looks fine.
|
||||||
|
- commit 12abbef
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Fri Mar 2 12:52:26 CET 2018 - tiwai@suse.de
|
Fri Mar 2 12:52:26 CET 2018 - tiwai@suse.de
|
||||||
|
|
||||||
|
@ -60,7 +60,7 @@ License: GPL-2.0
|
|||||||
Group: System/Kernel
|
Group: System/Kernel
|
||||||
Version: 4.15.13
|
Version: 4.15.13
|
||||||
%if 0%{?is_kotd}
|
%if 0%{?is_kotd}
|
||||||
Release: <RELEASE>.g950fc49
|
Release: <RELEASE>.g12abbef
|
||||||
%else
|
%else
|
||||||
Release: 0
|
Release: 0
|
||||||
%endif
|
%endif
|
||||||
|
@ -1,3 +1,3 @@
|
|||||||
2018-03-25 10:34:58 +0200
|
2018-03-25 22:21:41 +0200
|
||||||
GIT Revision: 950fc49446f43cd0aa5c406e5dd837053ee73f3b
|
GIT Revision: 12abbef0096b249fb517902aff4cb227c51e4a21
|
||||||
GIT Branch: stable
|
GIT Branch: stable
|
||||||
|
Loading…
Reference in New Issue
Block a user