[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <de409ad1-de39-20d2-bda6-5d2a965e7256@linux.vnet.ibm.com>
Date: Wed, 25 Jan 2017 16:22:45 -0500
From: Ken Goldman <kgold@...ux.vnet.ibm.com>
To: linux-kernel@...r.kernel.org,
linux-security-module@...r.kernel.org,
tpmdd-devel@...ts.sourceforge.net
Subject: Re: [tpmdd-devel] [PATCH v9 2/2] tpm: add securityfs support,for TPM
2.0 firmware event log
> You do not need to send a new patch set version as long as this
> one gets peer tested. And it needs to be tested without hacks
> like plumbing TCPA with TPM 2.0 in QEMU. OF code paths needs to
> be peer tested to be more specific.
>
> For me the code itself looks good but I simply cannot take it in
> in the current situation.
>
> /Jarkko
Tested-by: Kenneth Goldman <kgold@...ux.vnet.ibm.com>
I validated a firmware event log taken from a Power 8 against PCR 0-7
values for the SHA-1 and SHA-256 banks from a Nuvoton TPM 2.0 chip on
that same platform.
Powered by blists - more mailing lists