From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-9.8 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH, MAILING_LIST_MULTI,SIGNED_OFF_BY,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id E288EC433E7 for ; Tue, 13 Oct 2020 11:30:39 +0000 (UTC) Received: from merlin.infradead.org (merlin.infradead.org [205.233.59.134]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 593A520659 for ; Tue, 13 Oct 2020 11:30:39 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=lists.infradead.org header.i=@lists.infradead.org header.b="GpxqfGrf"; dkim=fail reason="signature verification failed" (2048-bit key) header.d=linaro.org header.i=@linaro.org header.b="X04ds4sw" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 593A520659 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=linaro.org Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=merlin.20170209; h=Sender:Content-Transfer-Encoding: Content-Type:Cc:List-Subscribe:List-Help:List-Post:List-Archive: List-Unsubscribe:List-Id:To:Subject:Message-ID:Date:From:In-Reply-To: References:MIME-Version:Reply-To:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Owner; bh=Z/Ur+8ECxDPn525XC3LtSvxsgbkQmVKFJ3/XNHE3N58=; b=GpxqfGrfqjy+u0oFyFVCwJ6UT Pz/4TaVkrbpDJ20ii9zKc8ameyeiNeKxobVXEb/lW2XrkLAX4y1CdIjsuVWXFb5r6Lij4k79CTXzI lVxyNdUk2J6VpK5IjF/CHMAd06p/epd9c6uRAjWh9LWFZzMcUXpnbVlf/9hHzgGErg9os6aWTbczU Ou11SNLXxJ3K6SfbcqKrwEdtJ+f/TEunSbqw6dDXgQxagYDgB5HZeTLwepUzNU3aB1xiCSKHDDsxA CDS6MyjBv/A6nBaixt/ws0MrmKCGYNzYGAqaNiN61kGohxAtH9yy/ivfjzcuH9GxQLMtk+MK8Gpdg Sf97dZ1AQ==; Received: from localhost ([::1] helo=merlin.infradead.org) by merlin.infradead.org with esmtp (Exim 4.92.3 #3 (Red Hat Linux)) id 1kSIUJ-0003Js-6B; Tue, 13 Oct 2020 11:29:03 +0000 Received: from mail-lj1-x241.google.com ([2a00:1450:4864:20::241]) by merlin.infradead.org with esmtps (Exim 4.92.3 #3 (Red Hat Linux)) id 1kSIUG-0003JD-1H for linux-arm-kernel@lists.infradead.org; Tue, 13 Oct 2020 11:29:01 +0000 Received: by mail-lj1-x241.google.com with SMTP id i2so20044160ljg.4 for ; Tue, 13 Oct 2020 04:28:59 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=0fe/rUPknWKjJHQfNjjMwuy0QlI3MJO2qD6YuDAy3qE=; b=X04ds4sw8SJNth6bHlu9JhQBVORr5yXBEE2b8Ov6oelmRazUaaNvD13K/TWOr7gyQd JtSzTS0gJ58yo0XSpqWYK1jQHHs/1WMjRF3P1PTENrCFQnIpZ5LiVmcWjBwm9T+zuUW2 SObFz5u+I6H+0434419wjVX6I/i1yL21PJbuy64REF65mLZ1WpcTPD35PS+JZGo92Aob y7O2v7+WQ3tMF6CnPEJ6hDtes809zD5L1gVi2BClPDgRPJuYgAoZ+OVqNAzmgAcalLmv x31cXMyUTmcv177luuQPMuZSOZ0Nom9Ci2+XWlhVqB1ZJJtUZ5FN0hrOTB5f9PgVV+6l pixw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=0fe/rUPknWKjJHQfNjjMwuy0QlI3MJO2qD6YuDAy3qE=; b=mq6TlUz2nrH7Dc/mxqZDWQT6udlseC7LpvXGCfe7ojErna5zkPEyEowBFJW5aXo7F9 1koO2jM5ZNn3Mwel/vhckMHfft6a63U2PitqhN5soMrhab7tpL0lGxK9v5/WE9v8uSS5 tv4IjPcPOF1lL1NP1nsMzjBxmrKabbIXRJ3o2mF88fialkwRuSuYXrJwuPm9RF0S8FtU LdZTqjQ3Jz4jXJ2vRuDERdYzS+c+OCEnuQRHJOSQE7sXR/XKRwzy78q/YdZXXEvCLftd k2wmNLVgkhsdbGOwsH97mNJfKm1bxEVoxwA7RlQKBFd5v9Gmc8vuf+ljKBb/S3YUH9nA IPMg== X-Gm-Message-State: AOAM531KogFRh6VPcsZFyzDwAL4lj4Sf/goIxJtDdxzT7GQ3Hke/vipA Sjetw9gsA2JkBWVCuyVRWoXyd2LCtseEyZXPR3ltPg== X-Google-Smtp-Source: ABdhPJxOlDao8AKCPBsqF7gTeRCRcVgwmk5ldXZOHlGJBEkPdQNH+RZ2Xsbw1swjy/dOe6vjwFkeKOoQY7F5HG7Wnf4= X-Received: by 2002:a2e:9d8d:: with SMTP id c13mr11367812ljj.339.1602588538772; Tue, 13 Oct 2020 04:28:58 -0700 (PDT) MIME-Version: 1.0 References: <1602065268-26017-1-git-send-email-sumit.garg@linaro.org> <1602065268-26017-5-git-send-email-sumit.garg@linaro.org> <20201013022157.GA47751@linux.intel.com> In-Reply-To: <20201013022157.GA47751@linux.intel.com> From: Sumit Garg Date: Tue, 13 Oct 2020 16:58:47 +0530 Message-ID: Subject: Re: [PATCH v7 4/4] MAINTAINERS: Add entry for TEE based Trusted Keys To: Jarkko Sakkinen X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20201013_072900_337022_B075D9FE X-CRM114-Status: GOOD ( 26.27 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: linux-security-module@vger.kernel.org, Daniel Thompson , op-tee@lists.trustedfirmware.org, Jonathan Corbet , James Bottomley , Janne Karhunen , Linux Doc Mailing List , James Morris , Mimi Zohar , Linux Kernel Mailing List , David Howells , Luke Hinds , "open list:ASYMMETRIC KEYS" , Markus Wamser , Casey Schaufler , linux-integrity@vger.kernel.org, Jens Wiklander , linux-arm-kernel , "Serge E. Hallyn" Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org On Tue, 13 Oct 2020 at 07:52, Jarkko Sakkinen wrote: > > On Wed, Oct 07, 2020 at 03:37:48PM +0530, Sumit Garg wrote: > > Add MAINTAINERS entry for TEE based Trusted Keys framework. > > > > Signed-off-by: Sumit Garg > > Acked-by: Jarkko Sakkinen > > --- > > MAINTAINERS | 8 ++++++++ > > 1 file changed, 8 insertions(+) > > > > diff --git a/MAINTAINERS b/MAINTAINERS > > index 48aff80..eb3d889 100644 > > --- a/MAINTAINERS > > +++ b/MAINTAINERS > > @@ -9663,6 +9663,14 @@ F: include/keys/trusted-type.h > > F: include/keys/trusted_tpm.h > > F: security/keys/trusted-keys/ > > > > +KEYS-TRUSTED-TEE > > +M: Sumit Garg > > +L: linux-integrity@vger.kernel.org > > +L: keyrings@vger.kernel.org > > +S: Supported > > +F: include/keys/trusted_tee.h > > +F: security/keys/trusted-keys/trusted_tee.c > > + > > KEYS/KEYRINGS > > M: David Howells > > M: Jarkko Sakkinen > > -- > > 2.7.4 > > I'm sorry but I think I have changed my mind on this. This has been > spinning for a while and sometimes conclusions change over the time. > > I don't think that we really need a separate subsystem tag. I don't see it as a separate subsystem but rather a kind of underlying trust source (TEE) driver plugged into existing trusted keys subsystem. We could relate it to the RNG subsystem as well where there is a subsystem maintainer and specific driver maintainers. IMO, having a dedicated entry like this brings clarity in maintenance and in future we may have more trust sources like this added where everyone may not have access to all the trust sources to test. > I'd be for a > new M-entry or R-entry to the existing subsystem tag. It's essential to > have ack from someone with ARM and TEE knowledge but this way too heavy > for the purpose. If you still think otherwise then I am fine with a new M-entry for existing trusted keys subsystem as well. > > I also see it the most manageable if the trusted keys PR's come from a > single source. I echo here with you to have a single source for trusted keys PR's irrespective of whether we go with a separate trust source entry or update existing subsystem entry. -Sumit > > /Jarkko _______________________________________________ linux-arm-kernel mailing list linux-arm-kernel@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-arm-kernel