[PATCH] KEYS: Make use of platform keyring for module signature verify
authorRobert Holmes <robeholmes@gmail.com>
Tue, 23 Apr 2019 07:39:29 +0000 (07:39 +0000)
committerSalvatore Bonaccorso <carnil@debian.org>
Sat, 10 Oct 2020 19:40:31 +0000 (20:40 +0100)
commit741343e97c3bb0422fdd92b110458c82e2f61b9b
treeb88f2d28ffe85706fe94f4fb5ea3bc8923241b9a
parente18f7da5d5e2a8e2957f3995de3daeac0c103735
[PATCH] KEYS: Make use of platform keyring for module signature verify

Bug-Debian: https://bugs.debian.org/935945
Origin: https://src.fedoraproject.org/rpms/kernel/raw/master/f/KEYS-Make-use-of-platform-keyring-for-module-signature.patch

This patch completes commit 278311e417be ("kexec, KEYS: Make use of
platform keyring for signature verify") which, while adding the
platform keyring for bzImage verification, neglected to also add
this keyring for module verification.

As such, kernel modules signed with keys from the MokList variable
were not successfully verified.

Signed-off-by: Robert Holmes <robeholmes@gmail.com>
Signed-off-by: Jeremy Cline <jcline@redhat.com>
Gbp-Pq: Topic features/all/db-mok-keyring
Gbp-Pq: Name KEYS-Make-use-of-platform-keyring-for-module-signature.patch
kernel/module_signing.c