Message ID | 20240226062245.2279635-1-jarkko@kernel.org |
---|---|
State | New |
Headers |
Return-Path: <linux-kernel+bounces-80587-ouuuleilei=gmail.com@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a05:7300:a81b:b0:108:e6aa:91d0 with SMTP id bq27csp1896515dyb; Sun, 25 Feb 2024 22:23:05 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCWDVSpGhsd2GE9W3LWmfUSc2kvmNiy0FIG29a3Go6a0lwyCM1erpjuyVCHY2OWBtojoN+I7k0jEosUtm9Ii5bC6mR731Q== X-Google-Smtp-Source: AGHT+IFnuiG7XXaXS3BCYR3sX/wDHz5bBmWBA2GY9+ZmKiL42lHQvCHE9dAkncRWSmyHXUWBhuZF X-Received: by 2002:a05:620a:450b:b0:787:d28c:2bb2 with SMTP id t11-20020a05620a450b00b00787d28c2bb2mr2266553qkp.67.1708928584825; Sun, 25 Feb 2024 22:23:04 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1708928584; cv=pass; d=google.com; s=arc-20160816; b=szl6zOak8n8wlGe3SImav/VafnZpapAFmnre+CwhbueiJ0Opm6fW5Ak5Gs7S3jfEQ+ emk+NGHCi81sVQHB/YlwnaAZl9GIXSaI+J8onK76s9YoSEZH3bMWb7n5IaXfri+79cs8 sr8GR1NUv19XvqhmBt+5F0Fe9qhG3OAbqx27V3ffneTFez4ATKRm26kDTSaxJqDBpOWt lqkfWSqVItu8+yrQVpu1qynk4D/gCOtbX1Zip/3A9ISahgzwsbIp+fhD9miz+opJjqck 3LqFoV1XQ6IZr9+kEd/9dGu7IujHrwqP+mEpfCs9ldM4ucLUr5UBI2/pXuvxfPkP1fQn vLzw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:message-id:date:subject:cc:to :from:dkim-signature; bh=zCl+VbMqVJge0knOsOuKOf/Q3a26Ya9zrVzcy7UPw3Y=; fh=dZzwwAwO8n8UiDB5HvMt4j7/BgiDWoKeE0u71YQxHlw=; b=RLHG2JHrNJzX3VCVqtrkZ096T7LzYs01MkVIws0cQS1vb84M9tSFnddrPjyX2Jsqa4 Wfce56foAXOH4RRnviMYGPGHlyxHgHkqeR1D0aj24bTocvTy5iJNjKkGUdDyXFe/ahP6 yo6injnWEaj8V0wH8Bmfu3BDAOIG4bbZM1v2ZqSHwGYexOkbA2Ykoy4oYF3uwCzzf9Nt BDfISABxX6JgWvsZAyNu38Yo92BG/QhOgv6e8WN2s2nkKE3fIPAGnwTVIxIwGqaT6DFr pbN6OxQK+iGOmQmrbw6F/isTOKGO/lHxeO3eGI48+5qup/vjJPnjUG4VUwUswLEAjt2E EeRg==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=ZdV0oQs3; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-80587-ouuuleilei=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-80587-ouuuleilei=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [2604:1380:45d1:ec00::1]) by mx.google.com with ESMTPS id xz19-20020a05620a5e1300b00787cb3045d3si2975586qkn.365.2024.02.25.22.23.04 for <ouuuleilei@gmail.com> (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 25 Feb 2024 22:23:04 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-80587-ouuuleilei=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) client-ip=2604:1380:45d1:ec00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=ZdV0oQs3; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-80587-ouuuleilei=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-80587-ouuuleilei=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 9BD441C21954 for <ouuuleilei@gmail.com>; Mon, 26 Feb 2024 06:23:04 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 708141BDDC; Mon, 26 Feb 2024 06:22:53 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="ZdV0oQs3" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id E48361B96E; Mon, 26 Feb 2024 06:22:50 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708928571; cv=none; b=Wouc5TDtfLYUwKSc/ywY+zVRn+IZxyK7Hl0LnLPVuhIi7WQCVYoHFfTYR3hsduyQWsHhlasdvZeVVT33poL4Q2rBGSl4UMHQGuCOi73suF9xWqnamFOZgLL7fxPA+VXTsjwBzwY6xhLEF9ULgY4aDDzTMK6yEb1LJN5oS+xxJLg= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708928571; c=relaxed/simple; bh=VzBdBR270wk6Rw87wAt99T+r6rZIf27FEzJNxzBR9PE=; h=From:To:Cc:Subject:Date:Message-Id:MIME-Version; b=apx8C0z0ttN1hKhC9MfdYHBniGtBwRM/lYht2uSLN41PaIdnT+SHCvXtIt8wESLHGxndR4PTsgDZY+e2TNkcpEcA/HUd+xXLSpDFMVdxzlbpRiuRzuU0EDr4qPEQgO3HX5bSjX96zLkDsSw515M0EnTAAiYomMlrKe1wCO8nZT0= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=ZdV0oQs3; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id 0C024C433F1; Mon, 26 Feb 2024 06:22:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1708928570; bh=VzBdBR270wk6Rw87wAt99T+r6rZIf27FEzJNxzBR9PE=; h=From:To:Cc:Subject:Date:From; b=ZdV0oQs3SVvwwbtYNihraQfRgEde57fRXWC9BHgMFakv7y6ap7Csev4OR+sRCP3mQ ajvuLaPOkivv3vpCGdf+DvawnBXDXiDg4un+7QYie+RBGlIHizirL0WX9BJlpsdNwi UKVXNh7WJcUmZnZ7iXuZeXQQ5Rh77igVVZeA9Glc4ml6j6Yi5+QdDMzgrTtvDnu/Hk +SicwQ3NPdZjV1qbsfSOVS4Vp5zO8+cUoiFeYlmKOhYn4SUH9NscsUcnpaN3EXQSkC L09dsEg5j8lUO3BuJtwatfDtHPC33/zboOhc+nM8zXPQNuI0Duf7kHvaGh83Wf1lEC 8gJaHnNL8/quQ== From: Jarkko Sakkinen <jarkko@kernel.org> To: linux-kernel@vger.kernel.org Cc: Jarkko Sakkinen <jarkko@kernel.org>, Jason Gunthorpe <jgg@ziepe.ca>, Mimi Zohar <zohar@linux.ibm.com>, Peter Huewe <peterhuewe@gmx.de>, linux-integrity@vger.kernel.org Subject: [PATCH] MAINTAINERS: Update W's for KEYS/KEYRINGS_INTEGRITY and TPM DEVICE RIVER Date: Mon, 26 Feb 2024 08:22:45 +0200 Message-Id: <20240226062245.2279635-1-jarkko@kernel.org> X-Mailer: git-send-email 2.40.1 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: <linux-kernel.vger.kernel.org> List-Subscribe: <mailto:linux-kernel+subscribe@vger.kernel.org> List-Unsubscribe: <mailto:linux-kernel+unsubscribe@vger.kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1791941500023788639 X-GMAIL-MSGID: 1791941500023788639 |
Series |
MAINTAINERS: Update W's for KEYS/KEYRINGS_INTEGRITY and TPM DEVICE RIVER
|
|
Commit Message
Jarkko Sakkinen
Feb. 26, 2024, 6:22 a.m. UTC
Add TPM driver test suite URL to the MAINTAINERS files and move the wiki
URL to more appropriate location.
Link: https://gitlab.com/jarkkojs/linux-tpmdd-test
Link: https://kernsec.org/wiki/index.php/Linux_Kernel_Integrity
Cc: Jason Gunthorpe <jgg@ziepe.ca>
Cc: Mimi Zohar <zohar@linux.ibm.com>
Cc: Peter Huewe <peterhuewe@gmx.de>
Cc: linux-integrity@vger.kernel.org
Signed-off-by: Jarkko Sakkinen <jarkko@kernel.org>
---
MAINTAINERS | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
Comments
Dear Jarkko, Thank you for your patch. Two nits: s/RIVER/DRIVER/ Am 26.02.24 um 07:22 schrieb Jarkko Sakkinen: > Add TPM driver test suite URL to the MAINTAINERS files and move the wiki s/files/file/ > URL to more appropriate location. (Two commits would make the commit message shorter.) > Link: https://gitlab.com/jarkkojs/linux-tpmdd-test > Link: https://kernsec.org/wiki/index.php/Linux_Kernel_Integrity > Cc: Jason Gunthorpe <jgg@ziepe.ca> > Cc: Mimi Zohar <zohar@linux.ibm.com> > Cc: Peter Huewe <peterhuewe@gmx.de> > Cc: linux-integrity@vger.kernel.org > Signed-off-by: Jarkko Sakkinen <jarkko@kernel.org> > --- > MAINTAINERS | 3 ++- > 1 file changed, 2 insertions(+), 1 deletion(-) > > diff --git a/MAINTAINERS b/MAINTAINERS > index bf77be03fb2b..6380c1109b86 100644 > --- a/MAINTAINERS > +++ b/MAINTAINERS > @@ -11947,6 +11947,7 @@ M: Mimi Zohar <zohar@linux.ibm.com> > L: linux-integrity@vger.kernel.org > L: keyrings@vger.kernel.org > S: Supported > +W: https://kernsec.org/wiki/index.php/inux_Kernel_Integrity > F: security/integrity/platform_certs > > KFENCE > @@ -22278,7 +22279,7 @@ M: Jarkko Sakkinen <jarkko@kernel.org> > R: Jason Gunthorpe <jgg@ziepe.ca> > L: linux-integrity@vger.kernel.org > S: Maintained > -W: https://kernsec.org/wiki/index.php/Linux_Kernel_Integrity > +W: https://gitlab.com/jarkkojs/linux-tpmdd-test > Q: https://patchwork.kernel.org/project/linux-integrity/list/ > T: git git://git.kernel.org/pub/scm/linux/kernel/git/jarkko/linux-tpmdd.git > F: drivers/char/tpm/ Acked-by: Paul Menzel <pmenzel@molgen.mpg.de> Kind regards, Paul
On Mon, 2024-02-26 at 08:22 +0200, Jarkko Sakkinen wrote: > Add TPM driver test suite URL to the MAINTAINERS files and move the > wiki > URL to more appropriate location. > > Link: https://gitlab.com/jarkkojs/linux-tpmdd-test > Link: https://kernsec.org/wiki/index.php/Linux_Kernel_Integrity > Cc: Jason Gunthorpe <jgg@ziepe.ca> > Cc: Mimi Zohar <zohar@linux.ibm.com> > Cc: Peter Huewe <peterhuewe@gmx.de> > Cc: linux-integrity@vger.kernel.org > Signed-off-by: Jarkko Sakkinen <jarkko@kernel.org> > --- > MAINTAINERS | 3 ++- > 1 file changed, 2 insertions(+), 1 deletion(-) > > diff --git a/MAINTAINERS b/MAINTAINERS > index bf77be03fb2b..6380c1109b86 100644 > --- a/MAINTAINERS > +++ b/MAINTAINERS > @@ -11947,6 +11947,7 @@ M: Mimi Zohar <zohar@linux.ibm.com> > L: linux-integrity@vger.kernel.org > L: keyrings@vger.kernel.org > S: Supported > +W: https://kernsec.org/wiki/index.php/inux_Kernel_Integrity ^ Missing L James
On Mon Feb 26, 2024 at 8:35 AM EET, Paul Menzel wrote: > Dear Jarkko, > > > Thank you for your patch. Two nits: > > s/RIVER/DRIVER/ lol, thanks for picking up this ;-) > > Am 26.02.24 um 07:22 schrieb Jarkko Sakkinen: > > Add TPM driver test suite URL to the MAINTAINERS files and move the wiki > > s/files/file/ > > > URL to more appropriate location. > > (Two commits would make the commit message shorter.) I think I just remove link-tags as there is not much else than the links in the actual change (trivial to pick them up from there). BR, Jarkko
On Mon Feb 26, 2024 at 8:49 AM EET, James Bottomley wrote: > On Mon, 2024-02-26 at 08:22 +0200, Jarkko Sakkinen wrote: > > Add TPM driver test suite URL to the MAINTAINERS files and move the > > wiki > > URL to more appropriate location. > > > > Link: https://gitlab.com/jarkkojs/linux-tpmdd-test > > Link: https://kernsec.org/wiki/index.php/Linux_Kernel_Integrity > > Cc: Jason Gunthorpe <jgg@ziepe.ca> > > Cc: Mimi Zohar <zohar@linux.ibm.com> > > Cc: Peter Huewe <peterhuewe@gmx.de> > > Cc: linux-integrity@vger.kernel.org > > Signed-off-by: Jarkko Sakkinen <jarkko@kernel.org> > > --- > > MAINTAINERS | 3 ++- > > 1 file changed, 2 insertions(+), 1 deletion(-) > > > > diff --git a/MAINTAINERS b/MAINTAINERS > > index bf77be03fb2b..6380c1109b86 100644 > > --- a/MAINTAINERS > > +++ b/MAINTAINERS > > @@ -11947,6 +11947,7 @@ M: Mimi Zohar <zohar@linux.ibm.com> > > L: linux-integrity@vger.kernel.org > > L: keyrings@vger.kernel.org > > S: Supported > > +W: https://kernsec.org/wiki/index.php/inux_Kernel_Integrity > ^ > Missing L > > James Thanks! I'll fixup that. "linux-tpmdd-test" is the suite that I'm using to test your patch set. It has swtpm integrated. I wonder if there was easy to way to tweak swtpm to emulate "interposer", i.e. reset its state while it is running (preferably not by restarting it). BR, Jarkko
On Mon, 2024-02-26 at 11:26 +0200, Jarkko Sakkinen wrote: > On Mon Feb 26, 2024 at 8:49 AM EET, James Bottomley wrote: > > On Mon, 2024-02-26 at 08:22 +0200, Jarkko Sakkinen wrote: > > > Add TPM driver test suite URL to the MAINTAINERS files and move > > > the > > > wiki > > > URL to more appropriate location. > > > > > > Link: https://gitlab.com/jarkkojs/linux-tpmdd-test > > > Link: https://kernsec.org/wiki/index.php/Linux_Kernel_Integrity > > > Cc: Jason Gunthorpe <jgg@ziepe.ca> > > > Cc: Mimi Zohar <zohar@linux.ibm.com> > > > Cc: Peter Huewe <peterhuewe@gmx.de> > > > Cc: linux-integrity@vger.kernel.org > > > Signed-off-by: Jarkko Sakkinen <jarkko@kernel.org> > > > --- > > > MAINTAINERS | 3 ++- > > > 1 file changed, 2 insertions(+), 1 deletion(-) > > > > > > diff --git a/MAINTAINERS b/MAINTAINERS > > > index bf77be03fb2b..6380c1109b86 100644 > > > --- a/MAINTAINERS > > > +++ b/MAINTAINERS > > > @@ -11947,6 +11947,7 @@ M: Mimi Zohar <zohar@linux.ibm.com> > > > L: linux-integrity@vger.kernel.org > > > L: keyrings@vger.kernel.org > > > S: Supported > > > +W: https://kernsec.org/wiki/index.php/inux_Kernel_Integrity > > ^ > > Missing L > > > > James > > Thanks! I'll fixup that. > > "linux-tpmdd-test" is the suite that I'm using to test your patch > set. It has swtpm integrated. I wonder if there was easy to way to > tweak swtpm to emulate "interposer", i.e. reset its state while it is > running (preferably not by restarting it). The way I do it is to use a qemu patch https://lore.kernel.org/qemu-devel/20231004184219.6594-1-jejb@linux.ibm.com/ which allows qemu to connect to the mssim (or ibmswtpm2) TPM over an inet socket which means I can execute TPM commands from the host (like resetting the TPM) as well as the guest and snoop the TPM traffic. James
On Mon Feb 26, 2024 at 12:11 PM EET, James Bottomley wrote: > On Mon, 2024-02-26 at 11:26 +0200, Jarkko Sakkinen wrote: > > On Mon Feb 26, 2024 at 8:49 AM EET, James Bottomley wrote: > > > On Mon, 2024-02-26 at 08:22 +0200, Jarkko Sakkinen wrote: > > > > Add TPM driver test suite URL to the MAINTAINERS files and move > > > > the > > > > wiki > > > > URL to more appropriate location. > > > > > > > > Link: https://gitlab.com/jarkkojs/linux-tpmdd-test > > > > Link: https://kernsec.org/wiki/index.php/Linux_Kernel_Integrity > > > > Cc: Jason Gunthorpe <jgg@ziepe.ca> > > > > Cc: Mimi Zohar <zohar@linux.ibm.com> > > > > Cc: Peter Huewe <peterhuewe@gmx.de> > > > > Cc: linux-integrity@vger.kernel.org > > > > Signed-off-by: Jarkko Sakkinen <jarkko@kernel.org> > > > > --- > > > > MAINTAINERS | 3 ++- > > > > 1 file changed, 2 insertions(+), 1 deletion(-) > > > > > > > > diff --git a/MAINTAINERS b/MAINTAINERS > > > > index bf77be03fb2b..6380c1109b86 100644 > > > > --- a/MAINTAINERS > > > > +++ b/MAINTAINERS > > > > @@ -11947,6 +11947,7 @@ M: Mimi Zohar <zohar@linux.ibm.com> > > > > L: linux-integrity@vger.kernel.org > > > > L: keyrings@vger.kernel.org > > > > S: Supported > > > > +W: https://kernsec.org/wiki/index.php/inux_Kernel_Integrity > > > ^ > > > Missing L > > > > > > James > > > > Thanks! I'll fixup that. > > > > "linux-tpmdd-test" is the suite that I'm using to test your patch > > set. It has swtpm integrated. I wonder if there was easy to way to > > tweak swtpm to emulate "interposer", i.e. reset its state while it is > > running (preferably not by restarting it). > > The way I do it is to use a qemu patch > > https://lore.kernel.org/qemu-devel/20231004184219.6594-1-jejb@linux.ibm.com/ > > which allows qemu to connect to the mssim (or ibmswtpm2) TPM over an > inet socket which means I can execute TPM commands from the host (like > resetting the TPM) as well as the guest and snoop the TPM traffic. To which exact and most recent possible QEMU version I can apply that cleanly? My build configuration builds both QEMU and swtpm [1] for every build so I could pick that patch, copy it to board/qemu/patches/qemu, and set the version in the BuildRoot configuration appropriately. [1] https://gitlab.com/jarkkojs/linux-tpmdd-test/-/tree/main/package/libtpms https://gitlab.com/jarkkojs/linux-tpmdd-test/-/tree/main/package/swtpm BR, Jarkko
diff --git a/MAINTAINERS b/MAINTAINERS index bf77be03fb2b..6380c1109b86 100644 --- a/MAINTAINERS +++ b/MAINTAINERS @@ -11947,6 +11947,7 @@ M: Mimi Zohar <zohar@linux.ibm.com> L: linux-integrity@vger.kernel.org L: keyrings@vger.kernel.org S: Supported +W: https://kernsec.org/wiki/index.php/inux_Kernel_Integrity F: security/integrity/platform_certs KFENCE @@ -22278,7 +22279,7 @@ M: Jarkko Sakkinen <jarkko@kernel.org> R: Jason Gunthorpe <jgg@ziepe.ca> L: linux-integrity@vger.kernel.org S: Maintained -W: https://kernsec.org/wiki/index.php/Linux_Kernel_Integrity +W: https://gitlab.com/jarkkojs/linux-tpmdd-test Q: https://patchwork.kernel.org/project/linux-integrity/list/ T: git git://git.kernel.org/pub/scm/linux/kernel/git/jarkko/linux-tpmdd.git F: drivers/char/tpm/