[Acked/CMT] [PATCH][EOAN] UBUNTU: [Config] enable secureboot signing on s390x
Andy Whitcroft
apw at canonical.com
Thu Jul 18 14:32:28 UTC 2019
On Tue, Jul 16, 2019 at 01:02:04AM +0100, Dimitri John Ledkov wrote:
> Bug-Link: https://bugs.launchpad.net/bugs/1829749
>
> Signed-off-by: Dimitri John Ledkov <xnox at ubuntu.com>
> ---
> debian.master/rules.d/s390x.mk | 2 +-
> debian/rules | 2 +-
> debian/rules.d/1-maintainer.mk | 1 +
> debian/rules.d/2-binary-arch.mk | 5 +++++
> 4 files changed, 8 insertions(+), 2 deletions(-)
>
> diff --git a/debian.master/rules.d/s390x.mk b/debian.master/rules.d/s390x.mk
> index dad66b1a674f..14e58db17d27 100644
> --- a/debian.master/rules.d/s390x.mk
> +++ b/debian.master/rules.d/s390x.mk
> @@ -11,7 +11,7 @@ vdso = vdso_install
> no_dumpfile = true
>
> do_extras_package = true
> -
> +sipl_signed = true
> do_tools_usbip = true
> do_tools_cpupower = true
> do_tools_perf = true
> diff --git a/debian/rules b/debian/rules
> index 0953195f5ab1..80205f30b265 100755
> --- a/debian/rules
> +++ b/debian/rules
> @@ -49,7 +49,7 @@ ifneq ($(DEB_HOST_ARCH),$(DEB_BUILD_ARCH))
> endif
>
> # Are any of the kernel signing options enabled.
> -any_signed=$(sort $(filter-out false,$(uefi_signed) $(opal_signed)))
> +any_signed=$(sort $(filter-out false,$(uefi_signed) $(opal_signed) $(sipl_signed)))
> ifeq ($(any_signed),true)
> bin_pkg_name=$(bin_pkg_name_unsigned)
> else
> diff --git a/debian/rules.d/1-maintainer.mk b/debian/rules.d/1-maintainer.mk
> index e71bf3c281ef..efc5e50841c9 100644
> --- a/debian/rules.d/1-maintainer.mk
> +++ b/debian/rules.d/1-maintainer.mk
> @@ -92,6 +92,7 @@ printenv:
> @echo "any_signed = $(any_signed)"
> @echo " uefi_signed = $(uefi_signed)"
> @echo " opal_signed = $(opal_signed)"
> + @echo " sipl_signed = $(sipl_signed)"
> @echo "full_build = $(full_build)"
> @echo "libc_dev_version = $(libc_dev_version)"
> @echo "DEB_HOST_GNU_TYPE = $(DEB_HOST_GNU_TYPE)"
> diff --git a/debian/rules.d/2-binary-arch.mk b/debian/rules.d/2-binary-arch.mk
> index f3ab06748cf6..083b64772439 100644
> --- a/debian/rules.d/2-binary-arch.mk
> +++ b/debian/rules.d/2-binary-arch.mk
> @@ -151,6 +151,11 @@ ifeq ($(opal_signed),true)
> cp -p $(pkgdir_bin)/boot/$(instfile)-$(abi_release)-$* \
> $(signingv)/$(instfile)-$(abi_release)-$*.opal;
> endif
> +ifeq ($(sipl_signed),true)
> + install -d $(signingv)
> + cp -p $(pkgdir_bin)/boot/$(instfile)-$(abi_release)-$* \
> + $(signingv)/$(instfile)-$(abi_release)-$*.sipl;
> +endif
>
> install -d $(pkgdir)/boot
> install -m644 $(builddir)/build-$*/.config \
> --
> 2.20.1
Looks in the ball-park.
Acked-by: Andy Whitcroft <apw at canonical.com>
Was there something we were waiting for before allowing the kernel to be
signed, making sure it was appropriately locked down as is done in x86 I
think. Xnox has that landed?
-apw
More information about the kernel-team
mailing list