[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <1548268560.3971.2.camel@linux.ibm.com>
Date: Wed, 23 Jan 2019 13:36:00 -0500
From: Mimi Zohar <zohar@...ux.ibm.com>
To: Kairui Song <kasong@...hat.com>, linux-kernel@...r.kernel.org
Cc: dhowells@...hat.com, dwmw2@...radead.org,
jwboyer@...oraproject.org, keyrings@...r.kernel.org,
jmorris@...ei.org, serge@...lyn.com, bauerman@...ux.ibm.com,
ebiggers@...gle.com, nayna@...ux.ibm.com, dyoung@...hat.com,
linux-integrity@...r.kernel.org, kexec@...ts.infradead.org
Subject: Re: [PATCH v5 0/2] let kexec_file_load use platform keyring to
verify the kernel image
On Mon, 2019-01-21 at 17:59 +0800, Kairui Song wrote:
> This patch series adds a .platform_trusted_keys in system_keyring as the
> reference to .platform keyring in integrity subsystem, when platform
> keyring is being initialized it will be updated, so it will be
> accessable for verifying PE signed kernel image.
There were some scripts/checkpatch.pl errors/warnings emitted on these
patches. I've fixed them, but in the future please follow the
guidelines in Documentation/process/submitting-patches.rst.
These patches are now queued in the next-integrity branch of
https://git.kernel.org/pub/scm/linux/kernel/git/zohar/linux-integrity.git
Mimi
Powered by blists - more mailing lists