From: Sumit Garg <sumit.garg@linaro.org> To: Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com> Cc: keyrings@vger.kernel.org, linux-integrity@vger.kernel.org, "open list:HARDWARE RANDOM NUMBER GENERATOR CORE" <linux-crypto@vger.kernel.org>, linux-security-module@vger.kernel.org, dhowells@redhat.com, Herbert Xu <herbert@gondor.apana.org.au>, davem@davemloft.net, peterhuewe@gmx.de, jgg@ziepe.ca, jejb@linux.ibm.com, Arnd Bergmann <arnd@arndb.de>, Greg Kroah-Hartman <gregkh@linuxfoundation.org>, Mimi Zohar <zohar@linux.ibm.com>, James Morris <jmorris@namei.org>, "Serge E. Hallyn" <serge@hallyn.com>, Casey Schaufler <casey@schaufler-ca.com>, Ard Biesheuvel <ard.biesheuvel@linaro.org>, Daniel Thompson <daniel.thompson@linaro.org>, Linux Kernel Mailing List <linux-kernel@vger.kernel.org>, "tee-dev @ lists . linaro . org" <tee-dev@lists.linaro.org> Subject: Re: [RFC/RFT v4 0/5] Add generic trusted keys framework/subsystem Date: Tue, 20 Aug 2019 11:16:46 +0530 Message-ID: <CAFA6WYMCjKCf=aCVEXrQtZJ57V+2MCLNZKov6t37unzgpLmc0A@mail.gmail.com> (raw) In-Reply-To: <20190819165400.xsgpbtbj26y7d2wb@linux.intel.com> On Mon, 19 Aug 2019 at 22:24, Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com> wrote: > > On Tue, Aug 13, 2019 at 01:22:59PM +0530, Sumit Garg wrote: > > This patch-set is an outcome of discussion here [1]. It has evolved very > > much since v1 to create, consolidate and generalize trusted keys > > subsystem. > > > > This framework has been tested with trusted keys support provided via TEE > > but I wasn't able to test it with a TPM device as I don't possess one. It > > would be really helpful if others could test this patch-set using a TPM > > device. > > I think 1/5-4/5 make up a non-RFC patch set that needs to reviewed, > tested and merged as a separate entity. > Okay. > On the other hand 5/5 cannot be merged even if I fully agreed on > the code change as without TEE patch it does not add any value for > Linux. > I agree here that 5/5 should go along with TEE patch-set. But if you look at initial v1 patch-set, the idea was to get feedback on trusted keys abstraction as a standalone patch along with testing using a TPM (1.x or 2.0). Since Mimi has tested this patch-set with TPM (1.x & 2.0), I am happy to merge 5/5 with TEE patch-set. But it would be nice if I could get feedback on 5/5 before I send next version of TEE patch-set. > To straighten up thing I would suggest that the next patch set > version would only consists of the first four patches and we meld > them to the shape so that we can land them to the mainline. Then > it should be way more easier to concentrate the actual problem you > are trying to resolve. > Okay will send next patch-set version with first four patches only. -Sumit > /Jarkko
next prev parent reply index Thread overview: 26+ messages / expand[flat|nested] mbox.gz Atom feed top 2019-08-13 7:52 Sumit Garg 2019-08-13 7:53 ` [RFC/RFT v4 1/5] tpm: move tpm_buf code to include/linux/ Sumit Garg 2019-08-19 16:56 ` Jarkko Sakkinen 2019-08-20 5:52 ` Sumit Garg 2019-08-21 19:13 ` Jarkko Sakkinen 2019-08-13 7:53 ` [RFC/RFT v4 2/5] KEYS: trusted: use common tpm_buf for TPM1.x code Sumit Garg 2019-08-19 16:57 ` Jarkko Sakkinen 2019-08-13 7:53 ` [RFC/RFT v4 3/5] KEYS: trusted: create trusted keys subsystem Sumit Garg 2019-08-19 17:04 ` Jarkko Sakkinen 2019-08-19 17:06 ` Jarkko Sakkinen 2019-08-20 5:53 ` Sumit Garg 2019-08-13 7:53 ` [RFC/RFT v4 4/5] KEYS: trusted: move tpm2 trusted keys code Sumit Garg 2019-08-19 17:07 ` Jarkko Sakkinen 2019-08-20 5:54 ` Sumit Garg 2019-08-13 7:53 ` [RFC/RFT v4 5/5] KEYS: trusted: Add generic trusted keys framework Sumit Garg 2019-08-30 9:19 ` Sumit Garg 2019-08-30 17:20 ` Jarkko Sakkinen 2019-08-30 17:24 ` Jarkko Sakkinen 2019-09-02 5:07 ` Sumit Garg 2019-08-14 13:24 ` [RFC/RFT v4 0/5] Add generic trusted keys framework/subsystem Mimi Zohar 2019-08-15 13:03 ` Sumit Garg 2019-08-15 15:06 ` Mimi Zohar 2019-08-16 4:58 ` Sumit Garg 2019-08-19 16:54 ` Jarkko Sakkinen 2019-08-20 5:46 ` Sumit Garg [this message] 2019-08-21 19:12 ` Jarkko Sakkinen
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to='CAFA6WYMCjKCf=aCVEXrQtZJ57V+2MCLNZKov6t37unzgpLmc0A@mail.gmail.com' \ --to=sumit.garg@linaro.org \ --cc=ard.biesheuvel@linaro.org \ --cc=arnd@arndb.de \ --cc=casey@schaufler-ca.com \ --cc=daniel.thompson@linaro.org \ --cc=davem@davemloft.net \ --cc=dhowells@redhat.com \ --cc=gregkh@linuxfoundation.org \ --cc=herbert@gondor.apana.org.au \ --cc=jarkko.sakkinen@linux.intel.com \ --cc=jejb@linux.ibm.com \ --cc=jgg@ziepe.ca \ --cc=jmorris@namei.org \ --cc=keyrings@vger.kernel.org \ --cc=linux-crypto@vger.kernel.org \ --cc=linux-integrity@vger.kernel.org \ --cc=linux-kernel@vger.kernel.org \ --cc=linux-security-module@vger.kernel.org \ --cc=peterhuewe@gmx.de \ --cc=serge@hallyn.com \ --cc=tee-dev@lists.linaro.org \ --cc=zohar@linux.ibm.com \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: link
Linux-Crypto Archive on lore.kernel.org Archives are clonable: git clone --mirror https://lore.kernel.org/linux-crypto/0 linux-crypto/git/0.git # If you have public-inbox 1.1+ installed, you may # initialize and index your mirror using the following commands: public-inbox-init -V2 linux-crypto linux-crypto/ https://lore.kernel.org/linux-crypto \ linux-crypto@vger.kernel.org public-inbox-index linux-crypto Example config snippet for mirrors Newsgroup available over NNTP: nntp://nntp.lore.kernel.org/org.kernel.vger.linux-crypto AGPL code for this site: git clone https://public-inbox.org/public-inbox.git