Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp5828706ybe; Tue, 10 Sep 2019 09:22:28 -0700 (PDT) X-Google-Smtp-Source: APXvYqx7SCMJIfxfOwtNzwGg6kHM/lx+7dGMLoT/f8KC38r6NvIL09YETQlrSyFzPnccumOwwZjr X-Received: by 2002:a17:906:22d0:: with SMTP id q16mr25374035eja.115.1568132548845; Tue, 10 Sep 2019 09:22:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1568132548; cv=none; d=google.com; s=arc-20160816; b=Y1qZOOLQSi4oxRITeS+V4TI0EGo2olC2gPDcBe1WTlz0c1fmt8/JzxVBLQzAuwZich rEOiAse+E9clmNavFJ2R9Y0i5vB5i6QQ7QiQ8+/ijbe68IfNimgonsvf9AO4VPXEToM0 6ph2MUMjcIUVAHNx6Lz/Bp2ogicPOc9DLr+CrgUxPfZoAdt0dliSa40HAl9r0xu+Fu5I m44ScYS8o15yrjgQdsedGPI9t+OaqWpKEimpBnPhqUTFzcgXlsSKNmn6+u3HRf9JVD8E 7XKw/DMs+2XpNrZuwaLLRsLNTeXvWHqQjawHsRPe5cAFRLwexZPQ8W42HdchbKzC2ImN trAA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:organization:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=tN2LZ8F6aUAAQTM7NFGkH3tiEqwwxV1LsqmNr1K9QEc=; b=igjKgzUxrLyR7OcPB1OvMXv4oxoAv/Wwk7e+oE4G2chL5Z+fuDlhZBsYhVpuEH1g0A RRqIH6Q7z1dUN/BS0kWNBSbpLk42xuP1ziZD1DnWAibpberqztuuiOJ7jFpv1Bce6WlT bhz3KeXHUt26/qm9dzKry23U/dkvkdO+5K6LZYp9Zf2ItK1iu02FrFufP7Jh6st4d+HU KFXRtZtyzAXF9viLGc5IrZL57D06ggporOH9QClxMJJVQJYDbhu0etVVXJ0Frxwbd34C 62tnVGxN/HYFfnZo5uKDrcXO4wvrAsIWQ01gutHDMvx239T/egAAhEPsHJXCYdRTCbem Oaiw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z5si9544208edk.157.2019.09.10.09.21.56; Tue, 10 Sep 2019 09:22:28 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2394144AbfIJQVf (ORCPT + 99 others); Tue, 10 Sep 2019 12:21:35 -0400 Received: from mga18.intel.com ([134.134.136.126]:21091 "EHLO mga18.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2394113AbfIJQVf (ORCPT ); Tue, 10 Sep 2019 12:21:35 -0400 X-Amp-Result: UNSCANNABLE X-Amp-File-Uploaded: False Received: from orsmga004.jf.intel.com ([10.7.209.38]) by orsmga106.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 10 Sep 2019 09:21:35 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.64,489,1559545200"; d="scan'208";a="335968855" Received: from bhobinca-mobl1.ger.corp.intel.com (HELO localhost) ([10.252.53.13]) by orsmga004.jf.intel.com with ESMTP; 10 Sep 2019 09:21:33 -0700 Date: Tue, 10 Sep 2019 17:21:32 +0100 From: Jarkko Sakkinen To: James Bottomley Cc: linux-integrity@vger.kernel.org, linux-crypto@vger.kernel.org, linux-security-module@vger.kernel.org Subject: Re: [PATCH v6 00/12] add integrity and security to TPM2 transactions Message-ID: <20190910162132.GA11338@linux.intel.com> References: <1568031408.6613.29.camel@HansenPartnership.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1568031408.6613.29.camel@HansenPartnership.com> Organization: Intel Finland Oy - BIC 0357606-4 - Westendinkatu 7, 02160 Espoo User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Mon, Sep 09, 2019 at 01:16:48PM +0100, James Bottomley wrote: > Link to previous cover letter: > > https://lore.kernel.org/linux-integrity/1540193596.3202.7.camel@HansenPartnership.com/ > > This is marked v6 instead of v5 because I did a v5 after feedback on v4 > but didn't get around to posting it and then had to rework the whole of > the kernel space handling while I was on holiday. I also added the > documentation of how the whole thing works and the rationale for doing > it in tpm-security.rst (patch 11). The main reason for doing this now > is so we have something to discuss at Plumbers. > > The new patch set implements the various splits requested, but the main > changes are that the kernel space is gone and is replaced by a context > save and restore of the generated null seed. This is easier to handle > than a full kernel space given the new threading for TPM spaces, but > conceptually it is still very like a space. I've also made whether > integrity and encryption is turned on a Kconfig option. > > James So... is there a changelog for the revisions? /Jarkko