From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 887466FB0; Thu, 7 Nov 2024 00:54:13 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1730940853; cv=none; b=aFl4nfIc8f1UWOTO8UAaMB3xgJAHJNFD1/o94r+7b5Rf4n4+uPneE9ijw7IPsidFLnLax3tUGvPNv2irzUM/6oDu2sDMPctcc0v9iHP2DRDZs8Fpot/5Bpwbb0EzoHRbWMmB9CkvNyALfSVFTn0GRleq/c8QyXzONRbz03mbk7c= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1730940853; c=relaxed/simple; bh=QVkV01TgCCZQGuMOm/6A+ScfjpttzoC0niUpm4u+fhQ=; h=Mime-Version:Content-Type:Date:Message-Id:Subject:From:To:Cc: References:In-Reply-To; b=Uh0z+7lMLSr5pk5j8Qk729lkQ3f83+vxax/4YNP3JgMiQKe84BBOOY0nh6+MldZKtC2o/BTMMbNLKDlrEOeaC+wdgIq9iAy/LbNyPehNMN4XkbOlNW86m1bUDbyKePVwW+Mfa9GtRo2lVA6vwGho2OkxDPvtVokAlHRYZnTNZT0= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=XLAltaiv; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="XLAltaiv" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 607DAC4CEC6; Thu, 7 Nov 2024 00:54:12 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1730940853; bh=QVkV01TgCCZQGuMOm/6A+ScfjpttzoC0niUpm4u+fhQ=; h=Date:Subject:From:To:Cc:References:In-Reply-To:From; b=XLAltaiv4124D68kxQOYDHRzNE7CWL4XO9E59lzkBWYxxVU+iWb5SuNc8oGnzcyiv a22MhpXr12vH3g+nT4hBj2GbwrSJyr10F9g3NlAipJonqo5zPbCvWRVcUSHFvjwWRV djbUv6wCubCn3exTMFX4frmAp4blAwWuJCMxMDgwBhG2TqY0Utet10tmPHYsoPPUu2 MmugxKSE+hmp98A4JTgKvFYX4AZzWuBWgy0hmp+WcJABkdvDvlRDhd7EeQPDvtdoja a4Lkr2x1hnHtG7PMlBIRNQ0rlhJgddSt3C4yyRtARQkyqPSH+926p4vHZT95+x12Os qyu6M5mgI19vw== Precedence: bulk X-Mailing-List: linux-doc@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=UTF-8 Date: Thu, 07 Nov 2024 02:54:08 +0200 Message-Id: Subject: Re: [PATCH] tpm: Opt-in in disable PCR encryption on TPM2 chips From: "Jarkko Sakkinen" To: "Jarkko Sakkinen" , , "Jonathan Corbet" , "Peter Huewe" , "Jason Gunthorpe" , "James Bottomley" Cc: "Mimi Zohar" , "Roberto Sassu" , , X-Mailer: aerc 0.18.2 References: <20241107004708.108667-1-jarkko@kernel.org> In-Reply-To: On Thu Nov 7, 2024 at 2:51 AM EET, Jarkko Sakkinen wrote: > On Thu Nov 7, 2024 at 2:47 AM EET, Jarkko Sakkinen wrote: > > From: Mimi Zohar > > > > The initial encrypted HMAC session feature added TPM bus encryption to > > various in-kernel TPM operations. This can cause performance bottleneck= s > > with IMA, as it heavily utilizes PCR extend operations. > > > > In order to address this performance issue, introduce disable_encrypt_p= crs > > kernel command-line parameter to the TPM driver. > > > > Cc: James Bottomley We also probably want this: Cc: stable@vger.kernel.org # v6.10+ BR, Jarkko