Received: by 2002:ac0:946b:0:0:0:0:0 with SMTP id j40csp915127imj; Thu, 7 Feb 2019 14:03:23 -0800 (PST) X-Google-Smtp-Source: AHgI3IYA4EomOwrGUgz2GJuPPy/7sRWKpCjnMGFwKZy1KNvb2bFFiR26HuIX4N0s72T+Y8yJLUnW X-Received: by 2002:a63:e655:: with SMTP id p21mr1999226pgj.70.1549577003339; Thu, 07 Feb 2019 14:03:23 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1549577003; cv=none; d=google.com; s=arc-20160816; b=WoHg+hfXxdn5pF/sLkSdnzPXP+fzDSh3k5LLVJYvGeUraZ1LKI9X1sYQsEtxq/PuzJ yJvpIiqMC/ZoZMK39HzQagaFtDjGt2VLtQb8khv1aiwBOpkx2oI4TKczv7+QIaof+BYz BmRKpWwyNXjfDlY/+d7hqDmP1i773E93uWzONRUPsKtLc3wT8e3IZbg47544BfODrlKJ 91RPnRyilwudgR0SASdU22lo84Wn/T40xr0lUlC4KSXd4rtFOONiywrUYky3zBiieVb3 7XXOE07FeqNhw/Ken2SXp4eEd7h1vYDa6n3vjBStQ+MSlMOHiiLBG0a2BNRu+fCVPd55 qFuw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :mime-version:dkim-signature; bh=gWoW5koaP9q+iibI0nW5zt88QENkry54DzTcBCQdDWc=; b=d9jOzB0mqHrc7R8Aut6FKruuKQScdtgQJH0SyE/3FWDbpshlo8gAff1QJr6aikxZt0 aI38djUoTB1VydUFbugPA9n1DkzBKquMLJdKkIPHyBsNaQSQYefGk3oIXd93H1CX3AYD FNNrd5AX0bN6qK6kQeRJKqwIbNTBNNCX48SDGDjfNToGdpjhSiOyKVSibZmyWPHk+hAv GPKqs73Vie6sW781mYh6euUkV2GhiJ00XY4iOeMjA2PooscceW5aNjEmy3KFzcUw5+Xi 3JpFr8z9Y8GzMOX/6WinGIYFtPS/v2EXPlB9CndjyA5eg/3VmBBGDD6wlwVxAZEsNhPS wl8Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=RQNbCPCk; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m9si163071pgr.202.2019.02.07.14.02.52; Thu, 07 Feb 2019 14:03:23 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=RQNbCPCk; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726956AbfBGV5i (ORCPT + 99 others); Thu, 7 Feb 2019 16:57:38 -0500 Received: from mail-wm1-f65.google.com ([209.85.128.65]:36422 "EHLO mail-wm1-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726622AbfBGV5h (ORCPT ); Thu, 7 Feb 2019 16:57:37 -0500 Received: by mail-wm1-f65.google.com with SMTP id p6so1479782wmc.1; Thu, 07 Feb 2019 13:57:36 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:from:date:message-id:subject:to:cc; bh=gWoW5koaP9q+iibI0nW5zt88QENkry54DzTcBCQdDWc=; b=RQNbCPCk1QJH34DabpF8pHT9EecHy71Xzdr+Z535uv2+BaQ8KQQb/2kWAruTXEGKIS vs9wQXZjCA6inFfLAI8d13ONmtXOvyuUHRo8hJ7wzJ95toKP/B143N8og5yQz57U0bZy gU13F/vkkBd1Urx8C9bMbe/8uvJcZG0pyAKFDBELm8ybXtKsDQReO6DelQN4ql5UmL9C m6gdItg8+Ipy2M0JU6/RqKapesZwULN0fo2tEUJEPT1wLGbk7uIa+3aG1MP6clcy52cY BeobVYel++VRV3d9eO9LmKaMmBQzgLHL9Njc2xByRQP5zdEKODB/AaGHuApkk9O5NB1x ekqA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to:cc; bh=gWoW5koaP9q+iibI0nW5zt88QENkry54DzTcBCQdDWc=; b=J5WG2AmTDHJl/j/gQF6TDcw7QyFHV7Bht9r4yV+DNs7ahUBBkbLgCh2wsPXgCMNBId pN4waCXFATCQNo/3W9/YShdXyJXTWp6gFIybQN+XsvQ2+VM3yFKlUN6GVkTF1CMK3lnH mtgq2YWPpLb5NQ3cJZw1bsKriejbGiggB7yFUFoEZG5Mn/S08hBUHHEkHc/iuz9F32ZZ rBA9SNje8WIXUbgnrlZON+8POulN7rKSuBAyslHV1OaEu+0CfgJToNn1vpA/Tuc5Tawf HGe5K/6WS/jtoOQIdHoeLcaPCJ6YFbvOR4tviBGW73AauHoDgGYubZ8ubgFEk5SvFvDu zGNQ== X-Gm-Message-State: AHQUAuaECHKs3j4yTSueaAJpuGcbhdAvMndN2wjvvvRmFjbJI55C2bNf 0VveizO7YmlNx32tjqRQ5Hn6USQbHQDVetIQ4xu1rbvTIZc= X-Received: by 2002:a7b:c4cb:: with SMTP id g11mr9055735wmk.149.1549576655504; Thu, 07 Feb 2019 13:57:35 -0800 (PST) MIME-Version: 1.0 From: Lucas De Marchi Date: Thu, 7 Feb 2019 13:57:23 -0800 Message-ID: Subject: [ANNOUNCE] kmod 26 To: linux-modules Cc: Jessica Yu , Rusty Russell , lkml Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org kmod 26 is out: https://www.kernel.org/pub/linux/utils/kernel/kmod/kmod-26.tar.xz https://www.kernel.org/pub/linux/utils/kernel/kmod/kmod-26.tar.sign Now we also have a new archive for the mailing list: https://lore.kernel.org/linux-modules/ - Improvements - Add more error-checking in library functions and remove warnings on newer toolchains - Depmod now handles parallel invocations better by protecting the temporary files being used - Improvements to testsuite and added tests to check the behavior regardless of the features enabled in the kernel and libraries we link to - Teach the --show-exports option to modprobe. This works similarly to --show-modversions, but it reports the exported symbols from that module. Under the hood this reads the .symtab and .strtab sections rather than __versions so it shows useful data even if kernel is configured without modversions (CONFIG_MODVERSIONS) - Teach pkcs7 parsing to modinfo by using openssl. This allows modinfo to correctly parse the signature appended to a module by the kernel build system when configured with CONFIG_MODULE_SIG_ALL, or when externally signed by the distro. Traditionally modules were signed and a struct was appended together with the signature to the end of the module. This has changed on the kernel for pkcs#7 and now the structure isn't filled out with useful information. So we have to parse the signature block in order to return useful data to the user. If kmod is linked with openssl we parse the signature and return the fields as we do for other signatures. An example of the relevant part on the output of modinfo is below: Before: sig_id: PKCS#7 signer: sig_key: sig_hashalgo: md4 After: sig_id: PKCS#7 signer: Fedora kernel signing key sig_key: 51:C4:0C:6D:7E:A5:6C:D8:8F:B4:3A:DF:91:78:4F:18:BC:D5:E4:C5 sig_hashalgo: sha256 If kmod is not linked to openssl we just start printing "unknown" in the sig_hashalgo field rather than the bogus value. Shortlog is below: Caio Marcelo de Oliveira Filho (1): testsuite: add Clear's mkosi configuration Chris Stackpole (1): Phrasing correction in modprobe man page Daniel Kahn Gillmor (1): man: Fix typo Jakov Simunic (1): build: fix wrong quotes on bootstrap Jan Engelhardt (1): kmod: build: cure compiler warnings showing up externally Luca Bruno (1): libkmod-module: check for NULL before accessing pointers Lucas De Marchi (17): testsuite: raise arch image to 3GB man: depmod: remove deprecated -m option mkosi: allow Clear to use test modules testsuite: add simple test for --show-exports README: Add link to mailing list archive Remove bootstrap* scripts testsuite: split out function to compare outputs exactly testsuite: add support for testing output against regex testsuite: move --show-exports test to use regex Add semaphoreci 2.0 configuration testsuite: fix modinfo test without openssl build: enable openssl by default build: add openssl to CI deps build: check openssl version testsuite: mkosi: update files build: fix make distcheck kmod 26 Michal Suchanek (3): depmod: prevent module dependency files missing during depmod invocation depmod: prevent module dependency files corruption due to parallel invocation. depmod: shut up gcc insufficinet buffer warning Yauheni Kaliuta (6): modprobe: add --show-exports signature: do not report wrong data for pkc#7 signature testsuite: track number of descriptors instead of their state testsuite: factor out fd related parameters to a structure testsuite: add modinfo pkcs7 signature test libkmod-signature: implement pkcs7 parsing with openssl -- Lucas De Marchi