From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752711AbdA3JlI (ORCPT ); Mon, 30 Jan 2017 04:41:08 -0500 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:39280 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752534AbdA3JkZ (ORCPT ); Mon, 30 Jan 2017 04:40:25 -0500 Subject: Re: Fwd: Re: [tpmdd-devel] [PATCH v9 2/2] tpm: add securityfs support,for TPM 2.0 firmware event log References: To: Kenneth Goldman , Jarkko Sakkinen Cc: "moderated list:TPM DEVICE DRIVER" , open list , linux-security-module@vger.kernel.org From: Nayna Date: Mon, 30 Jan 2017 15:08:42 +0530 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.6.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit X-TM-AS-GCONF: 00 X-Content-Scanned: Fidelis XPS MAILER x-cbid: 17013009-0012-0000-0000-0000137E257C X-IBM-SpamModules-Scores: X-IBM-SpamModules-Versions: BY=3.00006524; HX=3.00000240; KW=3.00000007; PH=3.00000004; SC=3.00000201; SDB=6.00814664; UDB=6.00397631; IPR=6.00592106; BA=6.00005098; NDR=6.00000001; ZLA=6.00000005; ZF=6.00000009; ZB=6.00000000; ZP=6.00000000; ZH=6.00000000; ZU=6.00000002; MB=3.00014103; XFM=3.00000011; UTC=2017-01-30 09:39:15 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 17013009-0013-0000-0000-00004AF3F762 Message-Id: <588F09A2.4090502@linux.vnet.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:,, definitions=2017-01-30_07:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 spamscore=0 suspectscore=2 malwarescore=0 phishscore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1612050000 definitions=main-1701300101 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org > From: "Ken Goldman" > > Date: 26-Jan-2017 2:53 AM > Subject: Re: [tpmdd-devel] [PATCH v9 2/2] tpm: add securityfs > support,for TPM 2.0 firmware event log > To: >, > >, > > > Cc: > > You do not need to send a new patch set version as long as this > one gets peer tested. And it needs to be tested without hacks > like plumbing TCPA with TPM 2.0 in QEMU. OF code paths needs to > be peer tested to be more specific. > > For me the code itself looks good but I simply cannot take it in > in the current situation. > > /Jarkko > > > Tested-by: Kenneth Goldman > > > I validated a firmware event log taken from a Power 8 against PCR 0-7 > values for the SHA-1 and SHA-256 banks from a Nuvoton TPM 2.0 chip on > that same platform. > Thank You Ken. Jarkko, I hope now these patches can be accepted for 4.11. Thanks & Regards, - Nayna > -- > To unsubscribe from this list: send the line "unsubscribe > linux-security-module" in > the body of a message to majordomo@vger.kernel.org > > More majordomo info at http://vger.kernel.org/majordomo-info.html > From mboxrd@z Thu Jan 1 00:00:00 1970 From: Nayna Subject: Re: Fwd: Re: [PATCH v9 2/2] tpm: add securityfs support, for TPM 2.0 firmware event log Date: Mon, 30 Jan 2017 15:08:42 +0530 Message-ID: <588F09A2.4090502@linux.vnet.ibm.com> References: Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: tpmdd-devel-bounces-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f@public.gmane.org To: Kenneth Goldman , Jarkko Sakkinen Cc: linux-security-module-u79uwXL29TY76Z2rM5mHXA@public.gmane.org, "moderated list:TPM DEVICE DRIVER" , open list List-Id: tpmdd-devel@lists.sourceforge.net > From: "Ken Goldman" > > Date: 26-Jan-2017 2:53 AM > Subject: Re: [tpmdd-devel] [PATCH v9 2/2] tpm: add securityfs > support,for TPM 2.0 firmware event log > To: >, > >, > > > Cc: > > You do not need to send a new patch set version as long as this > one gets peer tested. And it needs to be tested without hacks > like plumbing TCPA with TPM 2.0 in QEMU. OF code paths needs to > be peer tested to be more specific. > > For me the code itself looks good but I simply cannot take it in > in the current situation. > > /Jarkko > > > Tested-by: Kenneth Goldman > > > I validated a firmware event log taken from a Power 8 against PCR 0-7 > values for the SHA-1 and SHA-256 banks from a Nuvoton TPM 2.0 chip on > that same platform. > Thank You Ken. Jarkko, I hope now these patches can be accepted for 4.11. Thanks & Regards, - Nayna > -- > To unsubscribe from this list: send the line "unsubscribe > linux-security-module" in > the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org > > More majordomo info at http://vger.kernel.org/majordomo-info.html > ------------------------------------------------------------------------------ Check out the vibrant tech community on one of the world's most engaging tech sites, SlashDot.org! http://sdm.link/slashdot