Received: by 2002:a05:6358:45e:b0:b5:b6eb:e1f9 with SMTP id 30csp3687597rwe; Mon, 29 Aug 2022 17:54:47 -0700 (PDT) X-Google-Smtp-Source: AA6agR6a7ZiuIbJahoZcT0/Uc0ao6HDkihLPcdRqXwhF6NPnMeqOC2108pW9WupGZz9l4UuFY/sL X-Received: by 2002:a63:64e:0:b0:42c:7687:384c with SMTP id 75-20020a63064e000000b0042c7687384cmr2685757pgg.617.1661820887403; Mon, 29 Aug 2022 17:54:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1661820887; cv=none; d=google.com; s=arc-20160816; b=SjiPriqlz4h5tviic9M/F9iaJIpcyyTgIQFVLKoMHpMUSix1Yki3TwZUOnH4bbUnWe xlQ+C/RQbwA6T6FElGL2r2YSWpDfH6PPKNczUYebmB5JHseBcl3G86Gy8fZHO7dVDhcE 3/S5f7Nqa/BKFTFmsht3CGPvEYH2JVo5bjFIqAlkSCqdPy0YrxFVIRBjq1U4vsoveIaM UmijkoUQFperGSwc7r7Ytb6GzJil2gxgg2rL7KgO5iYpWXzZ5ECkKB0k57enGjgN6Do3 bx4MjN9+OgdEFfI6i4jdYKmIMFjPs2vkNqUR7MZ4YUtVHH+EHBZzcfuFvr7vnwy2W/DU QEtw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=vu7WwGg8hHjHQMxVBeejwIO9X7hwzWU+rYfumkNTH28=; b=N3h3g9ix/P1B1Pb7J4YP+DWOKmQiNpkE1I+yO/Ch14+IzY2iCn/Mefo/ij48tD0aWN VlAR88+wFIbztquBsNg1wiIsIvjmWehtJW4bheNqa9rHWMXpIlgjO5KT1lj6P2c9Ki0z 1NjCad8ZTOH+2oTo2kurSHOe3dnPza3IsTFRSiPzi8Roez/VsJKskzS9d7NtqYWUEF/m dKmUgItOmk4S7FT66TCTvn+CrVxaFrIAcgFjSX0sJrMZaUseK1eQ6JCM6r50dO7z2nKR QRMyzQsfBpYrnOQRlTmK/CaU6/GFc+wI7rHra40AEjhG18nlGumxEKafCTddWz5M4c5H j4NA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b="b6S3/gCK"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id w190-20020a6382c7000000b0042b77aa55fdsi678675pgd.464.2022.08.29.17.54.36; Mon, 29 Aug 2022 17:54:47 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b="b6S3/gCK"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229696AbiH3AqT (ORCPT + 99 others); Mon, 29 Aug 2022 20:46:19 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45924 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229558AbiH3AqS (ORCPT ); Mon, 29 Aug 2022 20:46:18 -0400 Received: from mail-pg1-x533.google.com (mail-pg1-x533.google.com [IPv6:2607:f8b0:4864:20::533]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 7C6FA7EFC1 for ; Mon, 29 Aug 2022 17:46:15 -0700 (PDT) Received: by mail-pg1-x533.google.com with SMTP id r69so9238869pgr.2 for ; Mon, 29 Aug 2022 17:46:15 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:from:to:cc; bh=vu7WwGg8hHjHQMxVBeejwIO9X7hwzWU+rYfumkNTH28=; b=b6S3/gCKo9NnWhn25HJlEhO8WEl7M4A1s/ssomIGAzJE1FH4gXEurRRpcCR9M6R3Se gcZNRDdvw/CyXRDSoZE8QCSDE3T2kQkYNrDeQnXJw4CgKfMwaTsJqzQ2oVOVNrZsD61p dNilZgZ0MKd5EZdlmfh9+HiVlYYhnlFyJPFSo= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-message-state:from:to:cc; bh=vu7WwGg8hHjHQMxVBeejwIO9X7hwzWU+rYfumkNTH28=; b=FNUdzouJ9N5MyPh6tjnLOFTY03LpIIxIrUVYjgX6SHagC7Dt0DUT5kw+I5+2zgSWEm Vir8HvLut+RlJLKbXudG7m2GaQ/JKDNQYifmbsYWR4oG/0tp2znPypAUFBgbpkJE5CYX 4I+3aMLIkIrkO0dD0NKDc/9CXS993DcIhL/qEseKD0XyYNuTv7rUgT8Hmrnu0trh4cZc QQ+SwDhMMbDFlyGJy1lwbSYx9A2Wr4bKHspy77Z/o93CuHgaw0r6VxCiv0+iYBoEWkzT NdcQtrmejvBudMNz2TK8tpKt7iAMu+Ox+JDJvo+cvpEC8Xn44S3kxZnIkc2+b6EYVR59 4nrg== X-Gm-Message-State: ACgBeo0ny0V0DUeLaOOLb63kZBZciLwsBzKlLJjVzSnys1MqT3qy4cWp PQ/yLjXdkJJ3mS9VRO0x8KB3zQ== X-Received: by 2002:a63:5b61:0:b0:41d:3227:37b8 with SMTP id l33-20020a635b61000000b0041d322737b8mr15863985pgm.265.1661820375015; Mon, 29 Aug 2022 17:46:15 -0700 (PDT) Received: from localhost ([2620:15c:11a:202:49ac:6e1:90a2:a0e0]) by smtp.gmail.com with UTF8SMTPSA id o18-20020a170903009200b00172ff99d0afsm2331495pld.140.2022.08.29.17.46.14 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Mon, 29 Aug 2022 17:46:14 -0700 (PDT) From: Matthias Kaehlcke To: James Morris , Kees Cook , Paul Moore , "Serge E . Hallyn" Cc: Jae Hoon Kim , Matthias Kaehlcke , linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org Subject: [PATCH] LoadPin: Fix Kconfig doc about format of file with verity digests Date: Mon, 29 Aug 2022 17:46:10 -0700 Message-Id: <20220829174557.1.I5d202d1344212a3800d9828f936df6511eb2d0d1@changeid> X-Mailer: git-send-email 2.37.2.672.g94769d06f0-goog MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The doc for CONFIG_SECURITY_LOADPIN_VERITY says that the file with verity digests must contain a comma separated list of digests. That was the case at some stage of the development, but was changed during the review process to one digest per line. Update the Kconfig doc accordingly. Reported-by: Jae Hoon Kim Signed-off-by: Matthias Kaehlcke --- security/loadpin/Kconfig | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/security/loadpin/Kconfig b/security/loadpin/Kconfig index 70e7985b2561..994c1d9376e6 100644 --- a/security/loadpin/Kconfig +++ b/security/loadpin/Kconfig @@ -33,4 +33,4 @@ config SECURITY_LOADPIN_VERITY on the LoadPin securityfs entry 'dm-verity'. The ioctl expects a file descriptor of a file with verity digests as parameter. The file must be located on the pinned root and - contain a comma separated list of digests. + contain one digest per line. -- 2.37.2.672.g94769d06f0-goog