mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/herbert/cryptodev-2.6.git
synced 2026-04-18 03:23:53 -04:00
Merge tag 'modules-7.0-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/modules/linux
Pull module updates from Sami Tolvanen:
"Module signing:
- Remove SHA-1 support for signing modules.
SHA-1 is no longer considered secure for signatures due to
vulnerabilities that can lead to hash collisions. None of the major
distributions use SHA-1 anymore, and the kernel has defaulted to
SHA-512 since v6.11.
Note that loading SHA-1 signed modules is still supported.
- Update scripts/sign-file to use only the OpenSSL CMS API for
signing.
As SHA-1 support is gone, we can drop the legacy PKCS#7 API which
was limited to SHA-1. This also cleans up support for legacy
OpenSSL versions.
Cleanups and fixes:
- Use system_dfl_wq instead of the per-cpu system_wq following the
ongoing workqueue API refactoring.
- Avoid open-coded kvrealloc() in module decompression logic by using
the standard helper.
- Improve section annotations by replacing the custom __modinit with
__init_or_module and removing several unused __INIT*_OR_MODULE
macros.
- Fix kernel-doc warnings in include/linux/moduleparam.h.
- Ensure set_module_sig_enforced is only declared when module signing
is enabled.
- Fix gendwarfksyms build failures on 32-bit hosts.
MAINTAINERS:
- Update the module subsystem entry to reflect the maintainer
rotation and update the git repository link"
* tag 'modules-7.0-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/modules/linux:
modules: moduleparam.h: fix kernel-doc comments
module: Only declare set_module_sig_enforced when CONFIG_MODULE_SIG=y
module/decompress: Avoid open-coded kvrealloc()
gendwarfksyms: Fix build on 32-bit hosts
sign-file: Use only the OpenSSL CMS API for signing
module: Remove SHA-1 support for module signing
module: replace use of system_wq with system_dfl_wq
params: Replace __modinit with __init_or_module
module: Remove unused __INIT*_OR_MODULE macros
MAINTAINERS: Update module subsystem maintainers and repository
This commit is contained in:
@@ -299,10 +299,6 @@ choice
|
||||
possible to load a signed module containing the algorithm to check
|
||||
the signature on that module.
|
||||
|
||||
config MODULE_SIG_SHA1
|
||||
bool "SHA-1"
|
||||
select CRYPTO_SHA1
|
||||
|
||||
config MODULE_SIG_SHA256
|
||||
bool "SHA-256"
|
||||
select CRYPTO_SHA256
|
||||
@@ -332,7 +328,6 @@ endchoice
|
||||
config MODULE_SIG_HASH
|
||||
string
|
||||
depends on MODULE_SIG || IMA_APPRAISE_MODSIG
|
||||
default "sha1" if MODULE_SIG_SHA1
|
||||
default "sha256" if MODULE_SIG_SHA256
|
||||
default "sha384" if MODULE_SIG_SHA384
|
||||
default "sha512" if MODULE_SIG_SHA512
|
||||
|
||||
@@ -17,16 +17,16 @@
|
||||
static int module_extend_max_pages(struct load_info *info, unsigned int extent)
|
||||
{
|
||||
struct page **new_pages;
|
||||
unsigned int new_max = info->max_pages + extent;
|
||||
|
||||
new_pages = kvmalloc_array(info->max_pages + extent,
|
||||
sizeof(info->pages), GFP_KERNEL);
|
||||
new_pages = kvrealloc(info->pages,
|
||||
size_mul(new_max, sizeof(*info->pages)),
|
||||
GFP_KERNEL);
|
||||
if (!new_pages)
|
||||
return -ENOMEM;
|
||||
|
||||
memcpy(new_pages, info->pages, info->max_pages * sizeof(info->pages));
|
||||
kvfree(info->pages);
|
||||
info->pages = new_pages;
|
||||
info->max_pages += extent;
|
||||
info->max_pages = new_max;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
@@ -113,7 +113,7 @@ static void kmod_dup_request_complete(struct work_struct *work)
|
||||
* let this linger forever as this is just a boot optimization for
|
||||
* possible abuses of vmalloc() incurred by finit_module() thrashing.
|
||||
*/
|
||||
queue_delayed_work(system_wq, &kmod_req->delete_work, 60 * HZ);
|
||||
queue_delayed_work(system_dfl_wq, &kmod_req->delete_work, 60 * HZ);
|
||||
}
|
||||
|
||||
bool kmod_dup_request_exists_wait(char *module_name, bool wait, int *dup_ret)
|
||||
@@ -240,7 +240,7 @@ void kmod_dup_request_announce(char *module_name, int ret)
|
||||
* There is no rush. But we also don't want to hold the
|
||||
* caller up forever or introduce any boot delays.
|
||||
*/
|
||||
queue_work(system_wq, &kmod_req->complete_work);
|
||||
queue_work(system_dfl_wq, &kmod_req->complete_work);
|
||||
|
||||
out:
|
||||
mutex_unlock(&kmod_dup_mutex);
|
||||
|
||||
Reference in New Issue
Block a user