[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <ZCc8J6wS1EpXrLQW@bombadil.infradead.org>
Date: Fri, 31 Mar 2023 13:01:43 -0700
From: Luis Chamberlain <mcgrof@...nel.org>
To: Ahelenia Ziemiańska
<nabijaczleweli@...ijaczleweli.xyz>
Cc: "open list:MODULE SUPPORT" <linux-modules@...r.kernel.org>,
"open list:MODULE SUPPORT" <linux-kernel@...r.kernel.org>
Subject: Re: [PATCH] KEYS: Make use of platform keyring for module signature
verification
On Fri, Mar 31, 2023 at 04:30:21PM +0200, Ahelenia Ziemiańska wrote:
> This allows a cert in DB to be used to sign modules,
> in addition to certs in the MoK and built-in keyrings.
>
> This key policy matches what's used for kexec.
>
> Signed-off-by: Ahelenia Ziemiańska <nabijaczleweli@...ijaczleweli.xyz>
Before I nose dive, the commit log should explain why this patch never
was sent upstream, if it was, why it was rejected. What makes it good now?
Who is using it? What are other distributions doing about it?
Luis
Powered by blists - more mailing lists