Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp3197159imu; Mon, 17 Dec 2018 15:17:50 -0800 (PST) X-Google-Smtp-Source: AFSGD/WwFkxiraQ3S4q6CjkGT0IZLewBgr4PaImUT5Gf7QfWxJc9GW0FAew8vr1d5oSpTgJ5gLWi X-Received: by 2002:a17:902:4225:: with SMTP id g34mr14744798pld.152.1545088670196; Mon, 17 Dec 2018 15:17:50 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1545088670; cv=none; d=google.com; s=arc-20160816; b=xp9WbI3K4aF37WHX58w+kzw7d6AquXaFIzrg0EHqErKKrH/FqZld6Dmt1peoYE623k hBtdtCMmui6I9RjGiYN51tvMc+o2JLKeBeAuiEu8lCu5ybayuCQtuzbLbMW/uVNlREiB 5ZoBWROI+xuvR61oQHkF/o5ViNVKfeoHWyKlFgai+wQMv01k35wEz/ZvkgyPpFjMMWjX DYtEZJdyruHgAvzTNiWpjvYEiQ0KquP3IADD8LeEYnqY//2WGFd7xUyltuk6mQwHexQH 2bmjVcuxawGN0hl/P2pVjtg4OSUm7Aqrcej3wjVCrTHmjbwcnu4TYH3Mimjv8+5M+c7w ZsHg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date; bh=GLRi9MMS/O9CLxrawjU6bavXHgYvw31mRa3uW0Np4R0=; b=uvai5tSbNSvPDDq5/R2aWdqhu1xD7h29506X855UUCDjaoUwI/MFcyz4mCuT98+u0d e1bGQOV0njqE0aXnZC7cctVQiLlEbFg+9l5Q0pI/faupEk1Pwv9VDkgXZzqXdHWMJCCR UtFlc4e5xyKc/iruLiEV2jfWF6BthT00z5YOyjiBD3peyHjhKzOFmPiNGgIScVxNFsQ4 J0yhM0Q6hxgTnyrgESHA1fx8DRxJJBP8QgjVDEb7etzSas3xzwX0vrYwX1XJsbadMKmd +G0uTiGRNuVdNcTcpc0/+zHlwIIQGN3VlRnsrpW6i9XWJQ0ZmzGP0+hJEQLS/BUoo9wi NSng== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l135si11748377pga.69.2018.12.17.15.17.34; Mon, 17 Dec 2018 15:17:50 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389284AbeLQTd5 (ORCPT + 99 others); Mon, 17 Dec 2018 14:33:57 -0500 Received: from namei.org ([65.99.196.166]:52214 "EHLO namei.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2387846AbeLQTdz (ORCPT ); Mon, 17 Dec 2018 14:33:55 -0500 Received: from localhost (localhost [127.0.0.1]) by namei.org (8.14.4/8.14.4) with ESMTP id wBHJXj01029677; Mon, 17 Dec 2018 19:33:45 GMT Date: Tue, 18 Dec 2018 06:33:45 +1100 (AEDT) From: James Morris To: Thiago Jung Bauermann cc: linux-security-module@vger.kernel.org, "Serge E. Hallyn" , Mimi Zohar , linux-kernel@vger.kernel.org Subject: Re: [PATCH] integrity: Remove references to module keyring In-Reply-To: <20181213013909.25737-1-bauerman@linux.ibm.com> Message-ID: References: <20181213013909.25737-1-bauerman@linux.ibm.com> User-Agent: Alpine 2.21 (LRH 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 12 Dec 2018, Thiago Jung Bauermann wrote: > >From what I can tell, it has never been used. > > Signed-off-by: Thiago Jung Bauermann Mimi, can I add your acked-by? > --- > security/integrity/digsig.c | 1 - > security/integrity/integrity.h | 5 ++--- > 2 files changed, 2 insertions(+), 4 deletions(-) > > diff --git a/security/integrity/digsig.c b/security/integrity/digsig.c > index c5585e75d5d9..1ff8eab7bc8c 100644 > --- a/security/integrity/digsig.c > +++ b/security/integrity/digsig.c > @@ -34,7 +34,6 @@ static const char * const keyring_name[INTEGRITY_KEYRING_MAX] = { > ".evm", > ".ima", > #endif > - "_module", > ".platform", > }; > > diff --git a/security/integrity/integrity.h b/security/integrity/integrity.h > index aafa1266e3d5..26c415c3f879 100644 > --- a/security/integrity/integrity.h > +++ b/security/integrity/integrity.h > @@ -152,9 +152,8 @@ int integrity_kernel_read(struct file *file, loff_t offset, > > #define INTEGRITY_KEYRING_EVM 0 > #define INTEGRITY_KEYRING_IMA 1 > -#define INTEGRITY_KEYRING_MODULE 2 > -#define INTEGRITY_KEYRING_PLATFORM 3 > -#define INTEGRITY_KEYRING_MAX 4 > +#define INTEGRITY_KEYRING_PLATFORM 2 > +#define INTEGRITY_KEYRING_MAX 3 > > extern struct dentry *integrity_dir; > > -- James Morris