From: Stefan Berger <stefanb@linux.vnet.ibm.com> To: Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com> Cc: tpmdd-devel@lists.sourceforge.net, linux-security-module@vger.kernel.org, jgunthorpe@obsidianresearch.com, linux-kernel@vger.kernel.org Subject: Re: [PATCH v2 0/3] Extend the vTPM proxy driver to pass locality to emulator Date: Wed, 3 May 2017 19:42:06 -0400 [thread overview] Message-ID: <72bacff5-5213-b114-ebf4-6e3fe7284bdc@linux.vnet.ibm.com> (raw) In-Reply-To: <20170503223849.qcoc6xqncbyi6jwj@intel.com> On 05/03/2017 06:38 PM, Jarkko Sakkinen wrote: > On Fri, Apr 28, 2017 at 09:02:15AM -0400, Stefan Berger wrote: >> The purpose of this series of patches is to enable the passing of the locality >> a command is executing in to a TPM emulator. To enable this we introduce a new >> flag for the device creation ioctl that requests that the locality be prepended >> to every command. For applications to check which flags the driver supports, we >> add a new ioctl that returns a bitmask of supported flags. > This is a weird change proposal as you could use tpm_vtpm_proxy for > other than some TPM emulator. I think in most cases the recipient of the TPM commands from the vtpm_proxy driver will be a TPM emulator. What do you have in mind? > >> v1->v2: >> - fixed return value from function in patch 3/3 >> >> >> Stefan Berger (3): >> tpm: vtpm_proxy: Add ioctl to get supported flags >> tpm: vtpm_proxy: Implement request_locality >> tpm: vtpm_proxy: Add ioctl to request locality prepended to command >> >> drivers/char/tpm/tpm_vtpm_proxy.c | 53 +++++++++++++++++++++++++++++++++++---- >> include/uapi/linux/vtpm_proxy.h | 15 ++++++++++- >> 2 files changed, 62 insertions(+), 6 deletions(-) >> >> -- >> 2.4.3 >> > /Jarkko > -- > To unsubscribe from this list: send the line "unsubscribe linux-security-module" in > the body of a message to majordomo@vger.kernel.org > More majordomo info at http://vger.kernel.org/majordomo-info.html >
WARNING: multiple messages have this Message-ID (diff)
From: stefanb@linux.vnet.ibm.com (Stefan Berger) To: linux-security-module@vger.kernel.org Subject: [PATCH v2 0/3] Extend the vTPM proxy driver to pass locality to emulator Date: Wed, 3 May 2017 19:42:06 -0400 [thread overview] Message-ID: <72bacff5-5213-b114-ebf4-6e3fe7284bdc@linux.vnet.ibm.com> (raw) In-Reply-To: <20170503223849.qcoc6xqncbyi6jwj@intel.com> On 05/03/2017 06:38 PM, Jarkko Sakkinen wrote: > On Fri, Apr 28, 2017 at 09:02:15AM -0400, Stefan Berger wrote: >> The purpose of this series of patches is to enable the passing of the locality >> a command is executing in to a TPM emulator. To enable this we introduce a new >> flag for the device creation ioctl that requests that the locality be prepended >> to every command. For applications to check which flags the driver supports, we >> add a new ioctl that returns a bitmask of supported flags. > This is a weird change proposal as you could use tpm_vtpm_proxy for > other than some TPM emulator. I think in most cases the recipient of the TPM commands from the vtpm_proxy driver will be a TPM emulator. What do you have in mind? > >> v1->v2: >> - fixed return value from function in patch 3/3 >> >> >> Stefan Berger (3): >> tpm: vtpm_proxy: Add ioctl to get supported flags >> tpm: vtpm_proxy: Implement request_locality >> tpm: vtpm_proxy: Add ioctl to request locality prepended to command >> >> drivers/char/tpm/tpm_vtpm_proxy.c | 53 +++++++++++++++++++++++++++++++++++---- >> include/uapi/linux/vtpm_proxy.h | 15 ++++++++++- >> 2 files changed, 62 insertions(+), 6 deletions(-) >> >> -- >> 2.4.3 >> > /Jarkko > -- > To unsubscribe from this list: send the line "unsubscribe linux-security-module" in > the body of a message to majordomo at vger.kernel.org > More majordomo info at http://vger.kernel.org/majordomo-info.html > -- To unsubscribe from this list: send the line "unsubscribe linux-security-module" in the body of a message to majordomo at vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
next prev parent reply other threads:[~2017-05-03 23:42 UTC|newest] Thread overview: 52+ messages / expand[flat|nested] mbox.gz Atom feed top 2017-04-28 13:02 [PATCH v2 0/3] Extend the vTPM proxy driver to pass locality to emulator Stefan Berger 2017-04-28 13:02 ` Stefan Berger 2017-04-28 13:02 ` [PATCH v2 1/3] tpm: vtpm_proxy: Add ioctl to get supported flags Stefan Berger 2017-04-28 13:02 ` Stefan Berger 2017-04-28 13:02 ` Stefan Berger 2017-05-03 22:31 ` Jarkko Sakkinen 2017-05-03 22:31 ` Jarkko Sakkinen 2017-04-28 13:02 ` [PATCH v2 2/3] tpm: vtpm_proxy: Implement request_locality Stefan Berger 2017-04-28 13:02 ` Stefan Berger 2017-04-28 13:02 ` Stefan Berger 2017-04-28 13:02 ` [PATCH v2 3/3] tpm: vtpm_proxy: Add ioctl to request locality prepended to command Stefan Berger 2017-04-28 13:02 ` Stefan Berger 2017-04-29 7:02 ` kbuild test robot 2017-04-29 7:02 ` kbuild test robot 2017-04-29 7:02 ` kbuild test robot 2017-05-03 22:37 ` Jarkko Sakkinen 2017-05-03 22:37 ` Jarkko Sakkinen 2017-05-03 23:40 ` Stefan Berger 2017-05-03 23:40 ` Stefan Berger 2017-05-03 23:40 ` Stefan Berger 2017-05-04 9:17 ` Jarkko Sakkinen 2017-05-04 9:17 ` Jarkko Sakkinen 2017-05-04 9:17 ` Jarkko Sakkinen 2017-05-04 11:14 ` Stefan Berger 2017-05-04 11:14 ` Stefan Berger 2017-05-04 18:40 ` Jarkko Sakkinen 2017-05-04 18:40 ` Jarkko Sakkinen 2017-05-04 20:03 ` Stefan Berger 2017-05-04 20:03 ` Stefan Berger 2017-05-04 20:03 ` Stefan Berger 2017-05-08 23:43 ` Jarkko Sakkinen 2017-05-08 23:43 ` Jarkko Sakkinen 2017-05-09 15:49 ` Stefan Berger 2017-05-09 15:49 ` Stefan Berger 2017-05-09 15:49 ` Stefan Berger 2017-05-10 12:47 ` Jarkko Sakkinen 2017-05-10 12:47 ` Jarkko Sakkinen 2017-05-10 13:20 ` Stefan Berger 2017-05-10 13:20 ` Stefan Berger 2017-05-10 18:33 ` Jarkko Sakkinen 2017-05-10 18:33 ` Jarkko Sakkinen 2017-05-10 18:33 ` Jarkko Sakkinen 2017-04-29 11:58 ` [PATCH v2 0/3] Extend the vTPM proxy driver to pass locality to emulator Jarkko Sakkinen 2017-04-29 11:58 ` Jarkko Sakkinen 2017-04-29 11:58 ` Jarkko Sakkinen 2017-05-03 22:38 ` Jarkko Sakkinen 2017-05-03 22:38 ` Jarkko Sakkinen 2017-05-03 23:42 ` Stefan Berger [this message] 2017-05-03 23:42 ` Stefan Berger 2017-05-04 9:18 ` Jarkko Sakkinen 2017-05-04 9:18 ` Jarkko Sakkinen 2017-05-04 9:18 ` Jarkko Sakkinen
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=72bacff5-5213-b114-ebf4-6e3fe7284bdc@linux.vnet.ibm.com \ --to=stefanb@linux.vnet.ibm.com \ --cc=jarkko.sakkinen@linux.intel.com \ --cc=jgunthorpe@obsidianresearch.com \ --cc=linux-kernel@vger.kernel.org \ --cc=linux-security-module@vger.kernel.org \ --cc=tpmdd-devel@lists.sourceforge.net \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.