From 58133a96c894c043e48c74ddf0bfe8db90bac62f Mon Sep 17 00:00:00 2001 From: Lucas De Marchi Date: Thu, 7 Feb 2019 13:46:40 -0800 Subject: [PATCH] kmod 26 --- Makefile.am | 2 +- NEWS | 47 +++++++++++++++++++++++++++++++++++++++++++++++ configure.ac | 2 +- 3 files changed, 49 insertions(+), 2 deletions(-) diff --git a/Makefile.am b/Makefile.am index 3f8bf9f..ddb25f0 100644 --- a/Makefile.am +++ b/Makefile.am @@ -43,7 +43,7 @@ SED_PROCESS = \ $(SED_PROCESS) LIBKMOD_CURRENT=5 -LIBKMOD_REVISION=3 +LIBKMOD_REVISION=4 LIBKMOD_AGE=3 noinst_LTLIBRARIES = shared/libshared.la diff --git a/NEWS b/NEWS index 58a770e..58c4e2f 100644 --- a/NEWS +++ b/NEWS @@ -1,3 +1,50 @@ +kmod 26 +======= + +- Improvements + - Add more error-checking in library functions and remove warnings on newer + toolchains + + - Depmod now handles parallel invoctions better by protecting the temporary + files being used + + - Improvements to testsuite and added tests to check the our behavior + regardless of the features enabled in the kernel, or libraries we link to + + - Teach the --show-exports option to modprobe. This works similarly to + --show-modversions, but it reports the exported symbols from that module. + Under the hood this reads the .symtab and .strtab section rather than + __versions so it shows useful data even if kernel is configured without + modversions (CONFIG_MODVERSIONS) + + - Teach pkcs7 parsing to modinfo by using openssl. This allows modinfo to + correctly parse the signature appended to a module by the kernel build + system when configured with CONFIG_MODULE_SIG_ALL, or when externally + signed by the distro. Traditionally modules were signed and a struct + was appended together with the signature to the end of the module. + This has changed on the kernel for pkcs#7 and now the structure isn't + filled out with useful information. So we have to parse the signature + block in order to return useful data to the user. + + If kmod is linked with openssl we parse the signature and return the + fields as we do for other signatures. An example of the relevant part + on the output of modinfo is below: + + Before: + sig_id: PKCS#7 + signer: + sig_key: + sig_hashalgo: md4 + After: + sig_id: PKCS#7 + signer: Fedora kernel signing key + sig_key: 51:C4:0C:6D:7E:A5:6C:D8:8F:B4:3A:DF:91:78:4F:18:BC:D5:E4:C5 + sig_hashalgo: sha256 + + If kmod is not linked to openssl we just start printing "unknonwn" in the + sig_hashalgo field rather than the bogus value. + + kmod 25 ======= diff --git a/configure.ac b/configure.ac index 1b14c50..ee72283 100644 --- a/configure.ac +++ b/configure.ac @@ -1,6 +1,6 @@ AC_PREREQ(2.64) AC_INIT([kmod], - [25], + [26], [linux-modules@vger.kernel.org], [kmod], [http://git.kernel.org/?p=utils/kernel/kmod/kmod.git]) -- 2.7.4