[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <1547223220.19931.471.camel@linux.ibm.com>
Date: Fri, 11 Jan 2019 11:13:40 -0500
From: Mimi Zohar <zohar@...ux.ibm.com>
To: Dave Young <dyoung@...hat.com>, Kairui Song <kasong@...hat.com>
Cc: linux-kernel@...r.kernel.org, dhowells@...hat.com,
dwmw2@...radead.org, jwboyer@...oraproject.org,
keyrings@...r.kernel.org, jmorris@...ei.org, serge@...lyn.com,
bauerman@...ux.ibm.com, ebiggers@...gle.com, nayna@...ux.ibm.com,
linux-integrity@...r.kernel.org, kexec@...ts.infradead.org
Subject: Re: [RFC PATCH 2/2] kexec, KEYS: Make use of platform keyring for
signature verify
On Fri, 2019-01-11 at 21:43 +0800, Dave Young wrote:
[snip]
> Personally I would like to see platform key separated from integrity.
> But for the kexec_file part I think it is good at least it works with
> this fix.
>
> Acked-by: Dave Young <dyoung@...hat.com>
The original "platform" keyring patches that Nayna posted multiple
times were in the certs directory, but nobody commented/responded. So
she reworked the patches, moving them to the integrity directory and
posted them (cc'ing the kexec mailing list). It's a bit late to be
asking to move it, isn't it?
Mimi
Powered by blists - more mailing lists