From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752030AbdAYVWv (ORCPT ); Wed, 25 Jan 2017 16:22:51 -0500 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:36856 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1751396AbdAYVWu (ORCPT ); Wed, 25 Jan 2017 16:22:50 -0500 To: linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org, tpmdd-devel@lists.sourceforge.net From: Ken Goldman Subject: Re: [tpmdd-devel] [PATCH v9 2/2] tpm: add securityfs support,for TPM 2.0 firmware event log Date: Wed, 25 Jan 2017 16:22:45 -0500 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.6.0 MIME-Version: 1.0 Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 7bit X-TM-AS-GCONF: 00 X-Content-Scanned: Fidelis XPS MAILER x-cbid: 17012521-0056-0000-0000-00000292918F X-IBM-SpamModules-Scores: X-IBM-SpamModules-Versions: BY=3.00006498; HX=3.00000240; KW=3.00000007; PH=3.00000004; SC=3.00000200; SDB=6.00812651; UDB=6.00396346; IPR=6.00590069; BA=6.00005090; NDR=6.00000001; ZLA=6.00000005; ZF=6.00000009; ZB=6.00000000; ZP=6.00000000; ZH=6.00000000; ZU=6.00000002; MB=3.00014048; XFM=3.00000011; UTC=2017-01-25 21:22:46 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 17012521-0057-0000-0000-000006C79160 Message-Id: X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:,, definitions=2017-01-25_16:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 spamscore=0 suspectscore=0 malwarescore=0 phishscore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1612050000 definitions=main-1701250198 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org > You do not need to send a new patch set version as long as this > one gets peer tested. And it needs to be tested without hacks > like plumbing TCPA with TPM 2.0 in QEMU. OF code paths needs to > be peer tested to be more specific. > > For me the code itself looks good but I simply cannot take it in > in the current situation. > > /Jarkko Tested-by: Kenneth Goldman I validated a firmware event log taken from a Power 8 against PCR 0-7 values for the SHA-1 and SHA-256 banks from a Nuvoton TPM 2.0 chip on that same platform.