Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S965105AbcKOAZR (ORCPT ); Mon, 14 Nov 2016 19:25:17 -0500 Received: from mga14.intel.com ([192.55.52.115]:19753 "EHLO mga14.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S933642AbcKOAZQ (ORCPT ); Mon, 14 Nov 2016 19:25:16 -0500 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.31,640,1473145200"; d="scan'208";a="31006313" Date: Mon, 14 Nov 2016 16:25:14 -0800 From: Jarkko Sakkinen To: Nayna Jain Cc: tpmdd-devel@lists.sourceforge.net, peterhuewe@gmx.de, tpmdd@selhorst.net, jgunthorpe@obsidianresearch.com, linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org Subject: Re: [PATCH v6 0/9] tpm: cleanup/fixes in existing event log support Message-ID: <20161115002514.qhweuyzg5mgebusq@intel.com> References: <1479117656-12403-1-git-send-email-nayna@linux.vnet.ibm.com> <20161114223322.5uzdc7sob2vukwrq@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20161114223322.5uzdc7sob2vukwrq@intel.com> Organization: Intel Finland Oy - BIC 0357606-4 - Westendinkatu 7, 02160 Espoo User-Agent: Mutt/1.6.2-neo (2016-08-21) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 998 Lines: 22 On Mon, Nov 14, 2016 at 02:33:23PM -0800, Jarkko Sakkinen wrote: > On Mon, Nov 14, 2016 at 05:00:47AM -0500, Nayna Jain wrote: > > This patch set includes the cleanup and bug fixes patches, previously > > part of the "tpm: add the securityfs pseudo files support for TPM 2.0 > > firmware event log" patch set, in order to upstream them more quickly. > > I applied the patches. I'm not yet sure whether these are part of the > 4.10 pull request or whether I postpone to 4.11 (my preference would be > 4.10 but I do not want to close that right now). I'll do testing next > week before doing pull request. > > I hope that the commits gets some reviews and testing now that they are > easily testable in my master branch. Event log still works and they do not seem to break TPM 2.0 (tried both machine with tpm_crb and tpm_tis). Stefan: would you mind check that these do not break your TPM 1.2 environment? I already tried wih TPM 1.2 machine but probably would make sense to peer test. /Jarkko