Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1760219AbYJIR6R (ORCPT ); Thu, 9 Oct 2008 13:58:17 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1754828AbYJIR6E (ORCPT ); Thu, 9 Oct 2008 13:58:04 -0400 Received: from gprs189-60.eurotel.cz ([160.218.189.60]:37120 "EHLO gprs189-60.eurotel.cz" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754295AbYJIR6B (ORCPT ); Thu, 9 Oct 2008 13:58:01 -0400 Date: Thu, 9 Oct 2008 19:59:38 +0200 From: Pavel Machek To: Chris Wright Cc: "Cihula, Joseph" , linux-kernel@vger.kernel.org, "Wang, Shane" , "Wei, Gang" , "Van De Ven, Arjan" , "Mallick, Asit K" , "Nakajima, Jun" , Chris Wright , Jan Beulich , mingo@elte.hu, tytso@mit.edu Subject: Re: [RFC][PATCH 0a/3] TXT: Intel(R) Trusted Execution Technology support for Linux - Overview Message-ID: <20081009175938.GA12507@elf.ucw.cz> References: <20081009125311.GD1623@ucw.cz> <20081009174427.GB6912@sequoia.sous-sol.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20081009174427.GB6912@sequoia.sous-sol.org> X-Warning: Reading this can be dangerous to your mental health. User-Agent: Mutt/1.5.18 (2008-05-17) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1368 Lines: 32 On Thu 2008-10-09 10:44:27, Chris Wright wrote: > * Pavel Machek (pavel@suse.cz) wrote: > > Ok, I don't get it, why would I want to measure my kernel? > > Trusted boot. There's always the double-edge sword w/ this. Clearly, > a requirement is that you don't just brick your own box, and have some > policy/mechanism for defining how you'd use trusted boot. I believe > that's all there w/ TXT patch (since it's mostly handled before kernel > boots, TXT kernel bit is just to help w/ handoff). I have never used trusted boot and I'm not sure I want to. Why would I want to do that? > > I see why Disney would want to do that, but I don't see why we would > > want to help them. > > > > Plus, the fact that trusted mode is pretty much incompatible with > > s3/s4 makes it useless, right? > > Why do you say that? Did you look at patch 3/3, see tboot_sleep(). You exit/reenter the trusted mode accross sleep... so any guarantees "trusted" mode does are void, right? Pavel -- (english) http://www.livejournal.com/~pavelmachek (cesky, pictures) http://atrey.karlin.mff.cuni.cz/~pavel/picture/horses/blog.html -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/