lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CAKv+Gu_sd26ZEj8O10O3jLdzzh7FasBq9Suw_5kG_9hwtdNqmg@mail.gmail.com>
Date:   Tue, 25 Feb 2020 21:38:03 +0100
From:   Ard Biesheuvel <ardb@...nel.org>
To:     Tom Lendacky <thomas.lendacky@....com>
Cc:     Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
        "the arch/x86 maintainers" <x86@...nel.org>,
        linux-efi <linux-efi@...r.kernel.org>,
        platform-driver-x86@...r.kernel.org,
        Darren Hart <dvhart@...radead.org>,
        Andy Shevchenko <andy@...radead.org>,
        Thomas Gleixner <tglx@...utronix.de>,
        Ingo Molnar <mingo@...hat.com>, Borislav Petkov <bp@...en8.de>,
        "H. Peter Anvin" <hpa@...or.com>
Subject: Re: [PATCH v3 0/2] SME EFI table updates/fixes

On Tue, 25 Feb 2020 at 21:34, Tom Lendacky <thomas.lendacky@....com> wrote:
>
> This patch series adds new EFI tables to the list of tables that are
> to be mapped unencrypted when SME is active
>
> - EFI TPM log and TPM final log tables
> - EFI RNG seed table
>
> ---
>
> Patches based on
>   git://git.kernel.org/pub/scm/linux/kernel/git/efi/efi.git next
>
> and commit:
>   dc235d62fc60 ("efi: Bump the Linux EFI stub major version number to #1")
>
> Changes since v2:
> - Split the patch into TPM related and RNG related patches
> - Account for the moving of the RNG seed EFI table from struct efi
>   to a static variable
>
> Tom Lendacky (2):
>   x86/efi: Add TPM related EFI tables to unencrypted mapping checks
>   x86/efi: Add RNG seed EFI table to unencrypted mapping check
>

Thanks Tom. I'll queue these up.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ