On Mon, Jul 04, 2016 at 06:03:55PM -0700, James Bottomley wrote: > It's perhaps arguable that for parity we should set it when an > encrypted filesystem is mounted and unset it when they're all unmounted > (that implementation could be an entirely in-os thing for us ... > probably implemented as some type of "secrets held" reference count). > However, the point I was making is that anything that wants access to > a sealed or bound secret would likely also like to control this, so it > should be a property of the TSS (or at least the TSS should be a > participant in the implementation). We want to set it the moment anything secret lands in RAM. Tying it to TSS doesn't get us that. -- Matthew Garrett | mjg59@xxxxxxxxxxxxx -- To unsubscribe from this list: send the line "unsubscribe linux-efi" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html