Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp973911ybv; Fri, 7 Feb 2020 11:55:12 -0800 (PST) X-Google-Smtp-Source: APXvYqwn1Ia4EHJMriz0asCIeyFulqIJ/5nbKsWzR5ZFIck/GANwSv0z1JGW2cZYKnEiqK/6u6uA X-Received: by 2002:a05:6808:5d0:: with SMTP id d16mr3191535oij.45.1581105312690; Fri, 07 Feb 2020 11:55:12 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1581105312; cv=none; d=google.com; s=arc-20160816; b=NHw3aPuotvIt02GOoAaRVOtyC2oCxnB6zI8gvJFdupdd4NFCyjIsrCx/pHGHgILZbF Ku0pkSwFYnp5fLrBiLCwpSdDGsodfDl57QCiYAl+RIO6JpMiFhjekehKMlSKlpVgu8vZ R+65UQrzXpoK5Wx5QMzE52XkoAdF1+pCwYnfPQXhXnsVvvH/rCXfr64kQ0ysH5gmxaq4 H4adgqMUSSEXw5iGZp2eCwy1x9SzEfQe4dJws2z/K7AD2atqdbFDbJ1Fnfiu1WogR7ms 9+cyHsmespVDgdzeF+VhETJlomaisf2wVQGkr5ty0zd/8pTklhCWBxo16grgCdnJf0Vq i5uw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :dkim-signature:dkim-filter; bh=XHJmcrml0bOhkfiWegb1wXW/R0Kk93NkGo6uSyYSInU=; b=vE5jCFHwLsKBA2A/sgcUeAdrGOehj0UtJKwQcm52xEI5GrIayDQYgl8idA7Rxaemck NjENg7Su3E3BXhAEiF01ctEkkEh5FtPtkV749kJurSNV005Dig6mSHexQwTg1exuXH/T yrb6r9vWRm569yFEilVyPjMp6FCus9/2ppXuZUJV2zcmKdjcZGqQsgEdkcklgCk68Te3 wMZBbQG8x0CdiNSxZc9YT3Vip9T7Q+FSrVv0SB8hJwrlFcKu5HgUH+GZ2AEd5prxrdqI a1qlp1aGGGLfyn4LiPhjnA5n8bm4Wkz7E+myYZYy8mPOyqEUAPSMRTQ9L95NYCmu2UeX D/BA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b="svy/L+qC"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 65si4673420oif.14.2020.02.07.11.54.59; Fri, 07 Feb 2020 11:55:12 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b="svy/L+qC"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727379AbgBGTx6 (ORCPT + 99 others); Fri, 7 Feb 2020 14:53:58 -0500 Received: from linux.microsoft.com ([13.77.154.182]:34358 "EHLO linux.microsoft.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726900AbgBGTx5 (ORCPT ); Fri, 7 Feb 2020 14:53:57 -0500 Received: from tusharsu-Ubuntu.corp.microsoft.com (unknown [131.107.147.225]) by linux.microsoft.com (Postfix) with ESMTPSA id 063A820B9C02; Fri, 7 Feb 2020 11:53:57 -0800 (PST) DKIM-Filter: OpenDKIM Filter v2.11.0 linux.microsoft.com 063A820B9C02 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.microsoft.com; s=default; t=1581105237; bh=XHJmcrml0bOhkfiWegb1wXW/R0Kk93NkGo6uSyYSInU=; h=From:To:Cc:Subject:Date:From; b=svy/L+qCddYOBiDWszf+9lBzkqheX7WtX+y0MJKKAHeTc7meqOqESv7AcgYMDL4o7 zDbUkNJpp5YoUmiw6mvZ8AX4EG/Vhzggrcm6JAwBytUFmWNoIRueyBaCDZmncgMSwy +69Vgw896VF6BevTuYpdJQHPfzOxSp+kQI3Fja/8= From: Tushar Sugandhi To: zohar@linux.ibm.com, linux-integrity@vger.kernel.org Cc: sashal@kernel.org, nramas@linux.microsoft.com, linux-kernel@vger.kernel.org Subject: [PATCH] IMA: Updated KBUILD_MODNAME for IMA files to ima Date: Fri, 7 Feb 2020 11:53:45 -0800 Message-Id: <20200207195346.4017-1-tusharsu@linux.microsoft.com> X-Mailer: git-send-email 2.17.1 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Log statements from ima_mok.c, ima_asymmetric_keys.c, and ima_queue_keys.c are prefixed with the respective file names and not with the string "ima". This change fixes the log statement prefix to be consistent with the rest of the IMA files. Signed-off-by: Tushar Sugandhi Reviewed-by: Lakshmi Ramasubramanian --- security/integrity/ima/Makefile | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/security/integrity/ima/Makefile b/security/integrity/ima/Makefile index 064a256f8725..67dabca670e2 100644 --- a/security/integrity/ima/Makefile +++ b/security/integrity/ima/Makefile @@ -11,6 +11,6 @@ ima-y := ima_fs.o ima_queue.o ima_init.o ima_main.o ima_crypto.o ima_api.o \ ima-$(CONFIG_IMA_APPRAISE) += ima_appraise.o ima-$(CONFIG_IMA_APPRAISE_MODSIG) += ima_modsig.o ima-$(CONFIG_HAVE_IMA_KEXEC) += ima_kexec.o -obj-$(CONFIG_IMA_BLACKLIST_KEYRING) += ima_mok.o -obj-$(CONFIG_IMA_MEASURE_ASYMMETRIC_KEYS) += ima_asymmetric_keys.o -obj-$(CONFIG_IMA_QUEUE_EARLY_BOOT_KEYS) += ima_queue_keys.o +ima-$(CONFIG_IMA_BLACKLIST_KEYRING) += ima_mok.o +ima-$(CONFIG_IMA_MEASURE_ASYMMETRIC_KEYS) += ima_asymmetric_keys.o +ima-$(CONFIG_IMA_QUEUE_EARLY_BOOT_KEYS) += ima_queue_keys.o -- 2.17.1