Received: by 10.213.65.68 with SMTP id h4csp479054imn; Tue, 13 Mar 2018 10:19:36 -0700 (PDT) X-Google-Smtp-Source: AG47ELv5nqqVzjTokz7qMIh+v5X+pl/qp4gngOYKxYvivmkERrY/1fXMiSb3/T8IwHMalKSmoJoK X-Received: by 10.98.144.146 with SMTP id q18mr1327270pfk.103.1520961575985; Tue, 13 Mar 2018 10:19:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1520961575; cv=none; d=google.com; s=arc-20160816; b=aibyHZYm8zZvMXWCiPKGYLb0Z260dWPRMLhRVwoz2k5AgNBFa+PY9hWRV9I8IJJFaP Um78NjOLkC4KXMib8Pk6r2Est4O3HOi6cccev5sNqFn8IRSymk3aOrI+w8ZDg9b3UfoB EThX61Nim320ALSLRKhpLVpJkGx9q4rV2SlNjBb93wE+lqLqhPXVLSQVt7MxKkXYJVl2 2paS35gau2uQjV2Kb1UwGt+bQhaL2HCyw9VMknFFvjzmGoNgJUUKj795Zyp7Ng8sE7Qf n2Ot58YFcpJoN5dsuRFEs4zl61PlPsCRulcMBL10GoWBsbwpzX1JrmFI3SrxFR3LxqQ9 rnsw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:date:cc:to:from:subject:message-id :dkim-signature:arc-authentication-results; bh=QbHrp+tePuoCSgwqIPfiVqy47krdZtlzQCr5StUcnEQ=; b=t4D6KyuqFEQ1VdJr/ra5HCOgwmQlQsj29FSHynt3b90IA2yiL1wwR0hpg7e6zYFFIL hbHgdPc8Gs3b01m58GNpOPxqLnlXl4MqALjJmzS+Ki0jJ+/3CLwIMb0f0K03SCj4QRry DeWjkwi+hCEMXNBCtQ0BeCP/sUn5HoqSqIIl9enkz2myrc42uxKlD4oCKswu9to6C15o o9b+msp2xN0GU9/50JIZHpdGYf+Baf/61M+yt3GnQYBOgOD2064utrLvUtNXdWt0e3f8 OzHqVa7klfrfXQlBGU/FutDWozOlRZT4qZM19eQ1dRnvYD0E3vD7lQbZjJaN7S8Lj+EQ NELQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@hansenpartnership.com header.s=20151216 header.b=ibn8vB6w; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=hansenpartnership.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w9si452408pfk.308.2018.03.13.10.19.21; Tue, 13 Mar 2018 10:19:35 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@hansenpartnership.com header.s=20151216 header.b=ibn8vB6w; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=hansenpartnership.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752611AbeCMRRx (ORCPT + 99 others); Tue, 13 Mar 2018 13:17:53 -0400 Received: from bedivere.hansenpartnership.com ([66.63.167.143]:43090 "EHLO bedivere.hansenpartnership.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751727AbeCMRRw (ORCPT ); Tue, 13 Mar 2018 13:17:52 -0400 Received: from localhost (localhost [127.0.0.1]) by bedivere.hansenpartnership.com (Postfix) with ESMTP id AC33C8EE139; Tue, 13 Mar 2018 10:17:51 -0700 (PDT) Received: from bedivere.hansenpartnership.com ([127.0.0.1]) by localhost (bedivere.hansenpartnership.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9Fi5MQ5EeUQ7; Tue, 13 Mar 2018 10:17:51 -0700 (PDT) Received: from [153.66.254.194] (unknown [50.35.65.221]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by bedivere.hansenpartnership.com (Postfix) with ESMTPSA id 3B8A68EE0C6; Tue, 13 Mar 2018 10:17:51 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=hansenpartnership.com; s=20151216; t=1520961471; bh=8bifNVB+2gmKKCkCsvpeShB/tGcQd7xcIgAXoZWcLgY=; h=Subject:From:To:Cc:Date:In-Reply-To:References:From; b=ibn8vB6wZWIZFs0MRdS+l9fqKo4qywPxIqzKe7s39a3VrBw7rGaKTmt1AcvAbZNQR +JeO9DhIWn9Ed38E4xPJVaBUdZj0+G3zY6VRSRBTMcZ8D2GF95lw+0YQ5HfC7azW9G LsV1R1EcOmQu7KF8ba/vh7YreNEW0Y2Iezg8QDKk= Message-ID: <1520961470.5360.18.camel@HansenPartnership.com> Subject: Re: [PATCH 2/5] MODSIGN: print appropriate status message when getting UEFI certificates list From: James Bottomley To: "Lee, Chun-Yi" , David Howells Cc: linux-fs@vger.kernel.org, linux-efi@vger.kernel.org, linux-kernel@vger.kernel.org Date: Tue, 13 Mar 2018 10:17:50 -0700 In-Reply-To: <20180313103559.13032-3-jlee@suse.com> References: <20180313103559.13032-1-jlee@suse.com> <20180313103559.13032-3-jlee@suse.com> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.20.5 Mime-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 2018-03-13 at 18:35 +0800, Lee, Chun-Yi wrote: > When getting certificates list from UEFI variable, the original error > message shows the state number from UEFI firmware. It's hard to be > read by human. This patch changed the error message to show the > appropriate string. > > The message will be showed as: > > [    0.788529] MODSIGN: Couldn't get UEFI MokListRT: EFI_NOT_FOUND > [    0.788537] MODSIGN: Couldn't get UEFI MokListXRT: EFI_NOT_FOUND I keep saying this, but these error messages need to be gated on the presence of shim for the non-shim secure boot case.  You can't assume the shim variables are there because they won't be in the case of a fully owned system. James