Received: by 2002:ac0:bc90:0:0:0:0:0 with SMTP id a16csp683670img; Thu, 21 Mar 2019 06:56:03 -0700 (PDT) X-Google-Smtp-Source: APXvYqwKMkX3JVl6NhkArZBiWlFSxHVSpkcyVn+XHWKpvU/dTV/IOiIiUt/h5nOhGb3VRIcPabpT X-Received: by 2002:a17:902:e40a:: with SMTP id ci10mr3708827plb.77.1553176563485; Thu, 21 Mar 2019 06:56:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553176563; cv=none; d=google.com; s=arc-20160816; b=iheSGFI8PpN8RPefK1p/iv8fMeQIL+m9iqS+XuBoGvtCguCKZQmfKutzSEhix1XS4h vXwHNULQSlKdaAJ9XQw1K/LgADCR17rfCJi3dmzwi4LQVErJavVEo1+6Pb4Ii54S0CjN xTjiSLhnrMevf5ZnRmOCECiETHB0zvSlidEZ6v0o9u4V/LyeAYnSQHb2+8O1M3dOHa+I z54Izyti1pg9y3GKWXNJGB2n8yj++fz7Yu1woPH9SghevdiXfYgCF6aVPxBMnN1QW0Rz SENnFV7zjcKBC2TxErDw4iqW3ybOn4+goRrhCKYRfZ64q95mXDrrYkWJRsmKBfaJinKE jrTA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:organization:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=67upLihwLBdULi6kCJL6LedcY2oXT+DF1JBiVfG7+18=; b=cEqRhWQ5TH3PmEuD9UNH3Wx9xSjOR2vyAQUavU5BoNaRNYmc/0iPA2ME/AhspQF7KC L2utiBzQjB3dUcooNAbjORTcAS/0ydx5Dn/DMt4WwhCy7O0oM+CJW+q2zsa8432/KBM6 C9aRNtoaicvDSXNQhgcx+ILeRKGNZz/jaWzaNKuMi2iivejvTlxY3pHYDv0tauz553YQ cnA4bxslmunF3LhW8uCy6jZB69M07LwpctoYzpV5jeR4a4HYZCXKtKVW3hR/etGflH7c PSE9o2YkAM8Iml3wTVFl7cSnSiPxZUbqVbE4SwuTVdBeeCyxWdkmrvvE6Y/Zx9jdela7 m4Ig== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 67si4543352plf.222.2019.03.21.06.55.45; Thu, 21 Mar 2019 06:56:03 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728286AbfCUNy6 (ORCPT + 99 others); Thu, 21 Mar 2019 09:54:58 -0400 Received: from mga11.intel.com ([192.55.52.93]:33817 "EHLO mga11.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728032AbfCUNy5 (ORCPT ); Thu, 21 Mar 2019 09:54:57 -0400 X-Amp-Result: UNKNOWN X-Amp-Original-Verdict: FILE UNKNOWN X-Amp-File-Uploaded: False Received: from fmsmga008.fm.intel.com ([10.253.24.58]) by fmsmga102.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 21 Mar 2019 06:54:56 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.60,253,1549958400"; d="scan'208";a="133518019" Received: from dilu-mobl2.ccr.corp.intel.com (HELO localhost) ([10.249.254.184]) by fmsmga008.fm.intel.com with ESMTP; 21 Mar 2019 06:54:52 -0700 Date: Thu, 21 Mar 2019 15:54:51 +0200 From: Jarkko Sakkinen To: Dan Williams Cc: Roberto Sassu , James Bottomley , Mimi Zohar , David Howells , keyrings@vger.kernel.org, linux-nvdimm@lists.01.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH] security/keys/trusted: Allow operation without hardware TPM Message-ID: <20190321135451.GD4603@linux.intel.com> References: <155295271345.1945351.6465460744078693578.stgit@dwillia2-desk3.amr.corp.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <155295271345.1945351.6465460744078693578.stgit@dwillia2-desk3.amr.corp.intel.com> Organization: Intel Finland Oy - BIC 0357606-4 - Westendinkatu 7, 02160 Espoo User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Mar 18, 2019 at 04:45:13PM -0700, Dan Williams wrote: > Rather than fail initialization of the trusted.ko module, arrange for > the module to load, but rely on trusted_instantiate() to fail > trusted-key operations. > > Fixes: 240730437deb ("KEYS: trusted: explicitly use tpm_chip structure...") > Cc: Roberto Sassu > Cc: Jarkko Sakkinen > Cc: James Bottomley > Cc: Jarkko Sakkinen > Cc: Mimi Zohar > Cc: David Howells > Signed-off-by: Dan Williams It should check for chip in each function that uses TPM now that the code does not rely on default chip. Otherwise, the semantics are kind of inconsistent. /Jarkko