From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751372AbdBXU31 (ORCPT ); Fri, 24 Feb 2017 15:29:27 -0500 Received: from bedivere.hansenpartnership.com ([66.63.167.143]:59212 "EHLO bedivere.hansenpartnership.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751163AbdBXU3U (ORCPT ); Fri, 24 Feb 2017 15:29:20 -0500 Message-ID: <1487968155.2190.14.camel@HansenPartnership.com> Subject: Re: [PATCH v2 6/7] tpm: expose spaces via a device link /dev/tpms From: James Bottomley To: Jason Gunthorpe , Jarkko Sakkinen Cc: tpmdd-devel@lists.sourceforge.net, linux-security-module@vger.kernel.org, dhowells@redhat.com, Peter Huewe , Marcel Selhorst , open list Date: Fri, 24 Feb 2017 15:29:15 -0500 In-Reply-To: <20170224181126.GC22491@obsidianresearch.com> References: <20170216192529.25467-1-jarkko.sakkinen@linux.intel.com> <20170216192529.25467-7-jarkko.sakkinen@linux.intel.com> <20170223090917.jq7thil5ggjmagil@intel.com> <1487941328.2249.23.camel@HansenPartnership.com> <20170224173922.qwuhfxeitbyct52o@intel.com> <20170224181126.GC22491@obsidianresearch.com> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.16.5 Mime-Version: 1.0 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 2017-02-24 at 11:11 -0700, Jason Gunthorpe wrote: > On Fri, Feb 24, 2017 at 07:39:22PM +0200, Jarkko Sakkinen wrote: > > > > I think therefore that tpmns for TPM Namespace would be very > > > appropriate. > > > > Makes sense. We can go with tpmns. > > When we have talked about TPM namespaces in the past it has been > around the idea of restricting which TPMs the namespace has access > too and changing the 'kernel tpm' for that namespace. Well, you know, nothing in the TPM Space code prevents us from exposing the namespace so that it could be shared. However, I think the namespace follows connect (device open) paradigm is pretty much the behaviour everyone (including the kernel) wants, mostly because TPM2 has such a tiny amount of resources that you're always dealing with loadable keys meaning you don't really want to see anyone else's volatile state. James