Received: by 2002:ab2:6a05:0:b0:1f8:1780:a4ed with SMTP id w5csp1723571lqo; Sun, 12 May 2024 16:04:12 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCVoqJ8ofLZ1hyPvnlkrzHmuAxyW7a++w+fDRoAyxlLV3Jsz/JP2k77j9xtvPgp+bZie+LZXSPfBeXZnVSVYHH4VzgvUIBoTFMuhX+ydMA== X-Google-Smtp-Source: AGHT+IEKYfHg36tvtj+5u0rnoccirUwelm+VcF8hEZfJKhLfmOnr4n6Kd/+9OTgVAXzUn/OHRgqJ X-Received: by 2002:ac8:7f10:0:b0:43b:9f:5ac8 with SMTP id d75a77b69052e-43dfce579ddmr130173491cf.31.1715555052177; Sun, 12 May 2024 16:04:12 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1715555052; cv=pass; d=google.com; s=arc-20160816; b=B+1gL8Cm/t2TTCnDN2/UeVsEkhpAgQQMxQFnVkpwwDWcF+qUdRMDjfeSjmsFkfo3sl 1AwsvQi2/9NfiETvKkCae0c9xrHyfmz/wvgNgBeO5Ka3OMGBWC1PaiqWGEMrA9Q+Chkf 54KXXoXi4h7UCwSbwCGmYvMiviPwdxLDBXsobRhP3gKfyKPH8a6hwWtMGLCG5TSar+VS zzuf+3QkVvYdM69Dso2JVe/Y5vtS8kEC5rwbkxG6pvr7ksNeSun2nyBXM+EwNSfOW2Kb 9hoDMV+ZwJquPKOW0N1J5HFGWCNGUTTR0C1o4hxLJ3RA6NxPxsbBghzgX6OoHHd+OHOT ch9w== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:references:to:from:subject:cc:message-id:date :content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:dkim-signature; bh=HdBy/BXiE+iGCe3nnDtGNBsluA57/XImyBOfExM8xy0=; fh=qXJyQXgJLWngQS71nfRfr8/HlpuOHUB9Z7TSwATHMA0=; b=Oevq7Tt/yMTQkcxZ7JrR+aeR7LnQCaJ+H81Zskna1zTRn5k/oaCHduf1xa2pu7YKBF oCf+Ce135SdHDsTAWEvlLjgrgRkF3xNCSr8S/DhZ+T7Kx8BjCd1HJoqAWKZjNKhU29xm fBnenYyJsHo9+yI4Rp3QN8iHHR5FO0JvqZbyeIMO8IeQa13OzNpMqzPzyLbWnlU7JB6W Ps6JxtoircNkckAuy7HUdt/G96wBqA5AZAUL6NAtDo4tm5OOu8RiIPs45Q3pTDlsGq+N TKEI9Ov7lfBEXe+CeakQfYKlebR82mmjCfo1CPDbcUCQv3ctPTS3dfNhd7MOHPsHzg+/ c8Qw==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=FnMTJLxV; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-177045-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-177045-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [147.75.199.223]) by mx.google.com with ESMTPS id d75a77b69052e-43df56d0614si83255911cf.647.2024.05.12.16.04.12 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 12 May 2024 16:04:12 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-177045-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) client-ip=147.75.199.223; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=FnMTJLxV; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-177045-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-177045-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id DFDBA1C209DE for ; Sun, 12 May 2024 23:04:11 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id A2D7F5914D; Sun, 12 May 2024 23:04:04 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="FnMTJLxV" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id BE93928F5; Sun, 12 May 2024 23:04:03 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1715555043; cv=none; b=ENnMojsQipXZCbhC3HWWMtU66Eznj1EYZPUVXFZu/Boujd3aiKmjxCvzDqff14/oAn/Np3srLCiat2xkr3sl+ZIhTtzLGiaW+8VeamFC/VHPkOYJdHXCXQg9F6KZKuCaPkCaBHcCLHNqwfYjeBdk0BgHda4x6P1MVXR45ft509w= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1715555043; c=relaxed/simple; bh=5RS9nKU72vuoWK/oLzWJN2joGQUKg0ve4S4/I5HbJbk=; h=Mime-Version:Content-Type:Date:Message-Id:Cc:Subject:From:To: References:In-Reply-To; b=NeNMitkad0j6lsRpS1nHgnI29jNvoJgtDijMqPfUeBTlvIW5INlXimEygKBBAJOh7xqTKjj50+arVOgxv5V9Ff2JedRN4OpZqaenRcKhbM+V/a2AcUmTXa+AbNkKHYYpHXdQLl2k3VHnfoaC0TpdUAHhrzuDveXZUKruxkMoDv0= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=FnMTJLxV; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id EE049C116B1; Sun, 12 May 2024 23:04:00 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1715555043; bh=5RS9nKU72vuoWK/oLzWJN2joGQUKg0ve4S4/I5HbJbk=; h=Date:Cc:Subject:From:To:References:In-Reply-To:From; b=FnMTJLxVqqs94BVPzUTyYswte1nnYnqEbYfjaW7MCmCMM8bCH8Mb+A0LMnWQtIoHu SQXNGB2ujnOwUIfwFWuZu1LyKDXz8ktRHp0osk9IBA4Y/SFSW85STEcsUNoB1npT3G +lhr5LVJAL82pO3y7LLi8Eta1hZ+CfGnIlIxkW0PhhNKUCvAUZhpY9aLLR/XMstrg2 9C55EUhXVjSY9uLwun3VnQdgJCj0G7L/C4/aXQoN+MkkfQP1bLYFNXhGougJiykBRh HSqTejI/yp/j0kMNooAeNpilzaUPpnszCn7v0bnpDEvzPibIr34O9YY9ytZDtOrxG9 kFKDwHh5d/KDA== Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=UTF-8 Date: Mon, 13 May 2024 02:03:59 +0300 Message-Id: Cc: , , , , Subject: Re: [PATCH] integrity: Update comment for load_moklist_certs() From: "Jarkko Sakkinen" To: "Yusong Gao" , , , , , , , X-Mailer: aerc 0.17.0 References: <20240511032224.818418-1-a869920004@gmail.com> In-Reply-To: <20240511032224.818418-1-a869920004@gmail.com> On Sat May 11, 2024 at 6:22 AM EEST, Yusong Gao wrote: > After commit 45fcd5e521cd ("integrity: add new keyring handler for > mok keys"), the comment about load_moklist_certs() is out-of-date. > Change keyring name from platform to machine. > > Signed-off-by: Yusong Gao > --- > security/integrity/platform_certs/load_uefi.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/security/integrity/platform_certs/load_uefi.c b/security/int= egrity/platform_certs/load_uefi.c > index d1fdd113450a..e954776d3cfb 100644 > --- a/security/integrity/platform_certs/load_uefi.c > +++ b/security/integrity/platform_certs/load_uefi.c > @@ -97,7 +97,7 @@ static __init void *get_cert_list(efi_char16_t *name, e= fi_guid_t *guid, > * load_moklist_certs() - Load MokList certs > * > * Load the certs contained in the UEFI MokListRT database into the > - * platform trusted keyring. > + * machine keyring. > * > * This routine checks the EFI MOK config table first. If and only if > * that fails, this routine uses the MokListRT ordinary UEFI variable. Alone pretty useless change to be honest. Can be fixed up when something relevant is changed. BR, Jarkko