Received: by 2002:a25:683:0:0:0:0:0 with SMTP id 125csp1076838ybg; Tue, 2 Jun 2020 00:18:58 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwB+XeQB/5xFlKMlnAQzl/GYvk+pLEXbp9LnSpLcvcJnGq872ovGcJJJWWPklcw9vobv8j/ X-Received: by 2002:a50:d1d3:: with SMTP id i19mr24662998edg.35.1591082338396; Tue, 02 Jun 2020 00:18:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1591082338; cv=none; d=google.com; s=arc-20160816; b=QSGTeabsgjrP6eleP/OClfG5FCON3T9UsdhfJF7s8Fk+BpAIoj0gp9Nkl6IYr60nUZ QsAYplMTFE9BJb7Wq9csAX6Vu2F1rO3FOHKqsyo+kkvBsjIM3ulYZcNKDR/Czml1/biE qgHKjNo2KyduB4y07YMplvmY//lyH9M1Nh4I5LVMLAmQCibRGzpcROG9T6W0kFDqp+g5 L3P7GK3BB/dRs3sQWRmP+/5HF/bi44sOc61EUBGh2DP8WzxzSEcWxyhGTOcHtAkApH+G +etDEug4zU9xGgZDcrJ15VixdIVM+GrqiWlpbeW3MlChUPT7wg5TfkPS9B+to8MHVeSN /NGw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:organization:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:ironport-sdr:ironport-sdr; bh=1FWwCimxdcb+Ak/gNERxZshSb8CpeQAS/zls0nUGoYM=; b=kxhx7dGC/MkomXQuIS5hFQxWZi8xE+a18OmLOq8ct2WJqsBHj8QAbw/nD3nABMr2sO eRIGXRNBgBAzHjzWEcg3WeLQ3dDYtaffsgKhewmn6K2dtxTdX0GEd60t8yB7HMSCkTN8 cz1by4byYecK4MlvimG0K5TnXZL78jONIhPtwGZcj94fYriCqlDVsO3i5MmCJOd473ZX naFANxbZSXTl/qvTIXkjltBCie9YiuCSupQ57zKo8l+56iCijgBupiICFoVohytuj7CB G2yj8m7zZIdkY47RAWH5uHPQoGgVdf7djfTxmpqPyXAqHyosoLH+KfNDslR7UeXMXu/R /x5A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id s20si913490edw.254.2020.06.02.00.18.35; Tue, 02 Jun 2020 00:18:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726365AbgFBHOO (ORCPT + 99 others); Tue, 2 Jun 2020 03:14:14 -0400 Received: from mga09.intel.com ([134.134.136.24]:36684 "EHLO mga09.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726139AbgFBHOO (ORCPT ); Tue, 2 Jun 2020 03:14:14 -0400 IronPort-SDR: prdJ3G2od+mYzF60Lp5gmCmarEdKcogx96PiHq0jbVeni4hWpV+2h87N3tog9yWCRndsKld6pA j/7vmeGmr06Q== X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga002.jf.intel.com ([10.7.209.21]) by orsmga102.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 02 Jun 2020 00:14:13 -0700 IronPort-SDR: coLgcfUzY1r0gMPZ3I7pF0lKRrgzpKRDvFxeMYNrhrx/osJaKh2dTYlvhflgsEOUyu4HtKmEfI lFu58/twi4ZA== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.73,463,1583222400"; d="scan'208";a="286546847" Received: from unknown (HELO localhost) ([10.252.59.102]) by orsmga002.jf.intel.com with ESMTP; 02 Jun 2020 00:14:08 -0700 Date: Tue, 2 Jun 2020 10:14:07 +0300 From: Jarkko Sakkinen To: Sumit Garg Cc: Mimi Zohar , James Bottomley , dhowells@redhat.com, Jens Wiklander , Jonathan Corbet , James Morris , "Serge E. Hallyn" , Casey Schaufler , Janne Karhunen , Daniel Thompson , Markus Wamser , "open list:ASYMMETRIC KEYS" , linux-integrity@vger.kernel.org, linux-security-module@vger.kernel.org, Linux Doc Mailing List , Linux Kernel Mailing List , linux-arm-kernel , op-tee@lists.trustedfirmware.org, "tee-dev @ lists . linaro . org" Subject: Re: [PATCH v4 1/4] KEYS: trusted: Add generic trusted keys framework Message-ID: <20200602071407.GB16602@linux.intel.com> References: <1588758017-30426-1-git-send-email-sumit.garg@linaro.org> <1588758017-30426-2-git-send-email-sumit.garg@linaro.org> <20200601021132.GA796225@linux.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Organization: Intel Finland Oy - BIC 0357606-4 - Westendinkatu 7, 02160 Espoo Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jun 01, 2020 at 02:41:55PM +0530, Sumit Garg wrote: > > This, I think is wrong. You should have a compile time flag for TPM e.g. > > CONFIG_TRUSTED_TPM, not this dynamic mess. > > > > The whole idea to have it dynamic was to have a common trusted keys > module which could support both TPM and TEE implementation depending > on hardware. I guess it may be useful in scenarios where a particular > hardware supports a TPM chip while other doesn't but both need to run > a common kernel image. For now it should only scale to what is needed. No problems refining it later when there is something to enable. /Jarkko