All of lore.kernel.org
 help / color / mirror / Atom feed
From: Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com>
To: Sumit Garg <sumit.garg@linaro.org>
Cc: dhowells@redhat.com, peterhuewe@gmx.de, keyrings@vger.kernel.org,
	linux-integrity@vger.kernel.org, linux-crypto@vger.kernel.org,
	linux-security-module@vger.kernel.org,
	herbert@gondor.apana.org.au, davem@davemloft.net, jgg@ziepe.ca,
	arnd@arndb.de, gregkh@linuxfoundation.org, jejb@linux.ibm.com,
	zohar@linux.ibm.com, jmorris@namei.org, serge@hallyn.com,
	jsnitsel@redhat.com, linux-kernel@vger.kernel.org,
	daniel.thompson@linaro.org
Subject: Re: [Patch v8 0/4] Create and consolidate trusted keys subsystem
Date: Wed, 23 Oct 2019 14:49:35 +0300	[thread overview]
Message-ID: <20191023114935.GE21973@linux.intel.com> (raw)
In-Reply-To: <20191023114133.GD21973@linux.intel.com>

On Wed, Oct 23, 2019 at 02:41:33PM +0300, Jarkko Sakkinen wrote:
> On Wed, Oct 16, 2019 at 10:44:51AM +0530, Sumit Garg wrote:
> > This patch-set does restructuring of trusted keys code to create and
> > consolidate trusted keys subsystem.
> > 
> > Also, patch #2 replaces tpm1_buf code used in security/keys/trusted.c and
> > crypto/asymmertic_keys/asym_tpm.c files to use the common tpm_buf code.
> > 
> > Changes in v8:
> > 1. Rebased to latest tpmdd/master.
> > 2. Added Reviewed-by tags.
> > 
> > Changes in v7:
> > 1. Rebased to top of tpmdd/master
> > 2. Patch #4: update tpm2 trusted keys code to use tpm_send() instead of
> >    tpm_transmit_cmd() which is an internal function.
> > 
> > Changes in v6:
> > 1. Switch TPM asymmetric code also to use common tpm_buf code. These
> >    changes required patches #1 and #2 update, so I have dropped review
> >    tags from those patches.
> > 2. Incorporated miscellaneous comments from Jarkko.
> > 
> > Changes in v5:
> > 1. Drop 5/5 patch as its more relavant along with TEE patch-set.
> > 2. Add Reviewed-by tag for patch #2.
> > 3. Fix build failure when "CONFIG_HEADER_TEST" and
> >    "CONFIG_KERNEL_HEADER_TEST" config options are enabled.
> > 4. Misc changes to rename files.
> > 
> > Changes in v4:
> > 1. Separate patch for export of tpm_buf code to include/linux/tpm.h
> > 2. Change TPM1.x trusted keys code to use common tpm_buf
> > 3. Keep module name as trusted.ko only
> > 
> > Changes in v3:
> > 
> > Move TPM2 trusted keys code to trusted keys subsystem.
> > 
> > Changes in v2:
> > 
> > Split trusted keys abstraction patch for ease of review.
> > 
> > Sumit Garg (4):
> >   tpm: Move tpm_buf code to include/linux/
> >   KEYS: Use common tpm_buf for trusted and asymmetric keys
> >   KEYS: trusted: Create trusted keys subsystem
> >   KEYS: trusted: Move TPM2 trusted keys code
> > 
> >  crypto/asymmetric_keys/asym_tpm.c                  | 101 +++----
> >  drivers/char/tpm/tpm-interface.c                   |  56 ----
> >  drivers/char/tpm/tpm.h                             | 223 ---------------
> >  drivers/char/tpm/tpm2-cmd.c                        | 307 --------------------
> >  include/Kbuild                                     |   1 -
> >  include/keys/{trusted.h => trusted_tpm.h}          |  49 +---
> >  include/linux/tpm.h                                | 248 ++++++++++++++--
> >  security/keys/Makefile                             |   2 +-
> >  security/keys/trusted-keys/Makefile                |   8 +
> >  .../{trusted.c => trusted-keys/trusted_tpm1.c}     |  96 +++----
> >  security/keys/trusted-keys/trusted_tpm2.c          | 314 +++++++++++++++++++++
> >  11 files changed, 649 insertions(+), 756 deletions(-)
> >  rename include/keys/{trusted.h => trusted_tpm.h} (77%)
> >  create mode 100644 security/keys/trusted-keys/Makefile
> >  rename security/keys/{trusted.c => trusted-keys/trusted_tpm1.c} (94%)
> >  create mode 100644 security/keys/trusted-keys/trusted_tpm2.c
> > 
> > -- 
> > 2.7.4
> > 
> 
> Tested-by: Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com>

Pushed. I'll include them to my v5.5 PR :-) Thank you for doing
this.

/Jarkko

WARNING: multiple messages have this Message-ID (diff)
From: Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com>
To: Sumit Garg <sumit.garg@linaro.org>
Cc: dhowells@redhat.com, peterhuewe@gmx.de, keyrings@vger.kernel.org,
	linux-integrity@vger.kernel.org, linux-crypto@vger.kernel.org,
	linux-security-module@vger.kernel.org,
	herbert@gondor.apana.org.au, davem@davemloft.net, jgg@ziepe.ca,
	arnd@arndb.de, gregkh@linuxfoundation.org, jejb@linux.ibm.com,
	zohar@linux.ibm.com, jmorris@namei.org, serge@hallyn.com,
	jsnitsel@redhat.com, linux-kernel@vger.kernel.org,
	daniel.thompson@linaro.org
Subject: Re: [Patch v8 0/4] Create and consolidate trusted keys subsystem
Date: Wed, 23 Oct 2019 11:49:35 +0000	[thread overview]
Message-ID: <20191023114935.GE21973@linux.intel.com> (raw)
In-Reply-To: <20191023114133.GD21973@linux.intel.com>

On Wed, Oct 23, 2019 at 02:41:33PM +0300, Jarkko Sakkinen wrote:
> On Wed, Oct 16, 2019 at 10:44:51AM +0530, Sumit Garg wrote:
> > This patch-set does restructuring of trusted keys code to create and
> > consolidate trusted keys subsystem.
> > 
> > Also, patch #2 replaces tpm1_buf code used in security/keys/trusted.c and
> > crypto/asymmertic_keys/asym_tpm.c files to use the common tpm_buf code.
> > 
> > Changes in v8:
> > 1. Rebased to latest tpmdd/master.
> > 2. Added Reviewed-by tags.
> > 
> > Changes in v7:
> > 1. Rebased to top of tpmdd/master
> > 2. Patch #4: update tpm2 trusted keys code to use tpm_send() instead of
> >    tpm_transmit_cmd() which is an internal function.
> > 
> > Changes in v6:
> > 1. Switch TPM asymmetric code also to use common tpm_buf code. These
> >    changes required patches #1 and #2 update, so I have dropped review
> >    tags from those patches.
> > 2. Incorporated miscellaneous comments from Jarkko.
> > 
> > Changes in v5:
> > 1. Drop 5/5 patch as its more relavant along with TEE patch-set.
> > 2. Add Reviewed-by tag for patch #2.
> > 3. Fix build failure when "CONFIG_HEADER_TEST" and
> >    "CONFIG_KERNEL_HEADER_TEST" config options are enabled.
> > 4. Misc changes to rename files.
> > 
> > Changes in v4:
> > 1. Separate patch for export of tpm_buf code to include/linux/tpm.h
> > 2. Change TPM1.x trusted keys code to use common tpm_buf
> > 3. Keep module name as trusted.ko only
> > 
> > Changes in v3:
> > 
> > Move TPM2 trusted keys code to trusted keys subsystem.
> > 
> > Changes in v2:
> > 
> > Split trusted keys abstraction patch for ease of review.
> > 
> > Sumit Garg (4):
> >   tpm: Move tpm_buf code to include/linux/
> >   KEYS: Use common tpm_buf for trusted and asymmetric keys
> >   KEYS: trusted: Create trusted keys subsystem
> >   KEYS: trusted: Move TPM2 trusted keys code
> > 
> >  crypto/asymmetric_keys/asym_tpm.c                  | 101 +++----
> >  drivers/char/tpm/tpm-interface.c                   |  56 ----
> >  drivers/char/tpm/tpm.h                             | 223 ---------------
> >  drivers/char/tpm/tpm2-cmd.c                        | 307 --------------------
> >  include/Kbuild                                     |   1 -
> >  include/keys/{trusted.h => trusted_tpm.h}          |  49 +---
> >  include/linux/tpm.h                                | 248 ++++++++++++++--
> >  security/keys/Makefile                             |   2 +-
> >  security/keys/trusted-keys/Makefile                |   8 +
> >  .../{trusted.c => trusted-keys/trusted_tpm1.c}     |  96 +++----
> >  security/keys/trusted-keys/trusted_tpm2.c          | 314 +++++++++++++++++++++
> >  11 files changed, 649 insertions(+), 756 deletions(-)
> >  rename include/keys/{trusted.h => trusted_tpm.h} (77%)
> >  create mode 100644 security/keys/trusted-keys/Makefile
> >  rename security/keys/{trusted.c => trusted-keys/trusted_tpm1.c} (94%)
> >  create mode 100644 security/keys/trusted-keys/trusted_tpm2.c
> > 
> > -- 
> > 2.7.4
> > 
> 
> Tested-by: Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com>

Pushed. I'll include them to my v5.5 PR :-) Thank you for doing
this.

/Jarkko

  reply	other threads:[~2019-10-23 11:49 UTC|newest]

Thread overview: 14+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2019-10-16  5:14 [Patch v8 0/4] Create and consolidate trusted keys subsystem Sumit Garg
2019-10-16  5:26 ` Sumit Garg
2019-10-16  5:14 ` [Patch v8 1/4] tpm: Move tpm_buf code to include/linux/ Sumit Garg
2019-10-16  5:26   ` Sumit Garg
2019-10-16  5:14 ` [Patch v8 2/4] KEYS: Use common tpm_buf for trusted and asymmetric keys Sumit Garg
2019-10-16  5:26   ` Sumit Garg
2019-10-16  5:14 ` [Patch v8 3/4] KEYS: trusted: Create trusted keys subsystem Sumit Garg
2019-10-16  5:26   ` Sumit Garg
2019-10-16  5:14 ` [Patch v8 4/4] KEYS: trusted: Move TPM2 trusted keys code Sumit Garg
2019-10-16  5:26   ` Sumit Garg
2019-10-23 11:41 ` [Patch v8 0/4] Create and consolidate trusted keys subsystem Jarkko Sakkinen
2019-10-23 11:41   ` Jarkko Sakkinen
2019-10-23 11:49   ` Jarkko Sakkinen [this message]
2019-10-23 11:49     ` Jarkko Sakkinen

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20191023114935.GE21973@linux.intel.com \
    --to=jarkko.sakkinen@linux.intel.com \
    --cc=arnd@arndb.de \
    --cc=daniel.thompson@linaro.org \
    --cc=davem@davemloft.net \
    --cc=dhowells@redhat.com \
    --cc=gregkh@linuxfoundation.org \
    --cc=herbert@gondor.apana.org.au \
    --cc=jejb@linux.ibm.com \
    --cc=jgg@ziepe.ca \
    --cc=jmorris@namei.org \
    --cc=jsnitsel@redhat.com \
    --cc=keyrings@vger.kernel.org \
    --cc=linux-crypto@vger.kernel.org \
    --cc=linux-integrity@vger.kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux-security-module@vger.kernel.org \
    --cc=peterhuewe@gmx.de \
    --cc=serge@hallyn.com \
    --cc=sumit.garg@linaro.org \
    --cc=zohar@linux.ibm.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.