Re: [tboot-devel] PATCH: Fix linux command line after 429:664e69
Hi Martin, Thanks for the patch, we will go through some validation before upstreaming your patch... Regards, -Ning -Original Message- From: Wilck, Martin [mailto:martin.wi...@ts.fujitsu.com] Sent: Tuesday, February 23, 2016 6:00 AM To: tboot-devel@lists.sourceforge.net Subject: [tboot-devel] PATCH: Fix linux command line after 429:664e69 Don't skip first argument in Linux kernel command line Since 429:664e696da669, tboot doesn't skip the first argument of a given command line any more. Consequently, it shouldn't be skipped either when passed to the kernel in expand_linux_image(). -- Site24x7 APM Insight: Get Deep Visibility into Application Performance APM + Mobile APM + RUM: Monitor 3 App instances at just $35/Month Monitor end-to-end web transactions and take corrective actions now Troubleshoot faster and improve end-user experience. Signup Now! http://pubads.g.doubleclick.net/gampad/clk?id=272487151=/4140 ___ tboot-devel mailing list tboot-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/tboot-devel
[tboot-devel] PATCH: Fix linux command line after 429:664e69
Don't skip first argument in Linux kernel command line Since 429:664e696da669, tboot doesn't skip the first argument of a given command line any more. Consequently, it shouldn't be skipped either when passed to the kernel in expand_linux_image(). changeset: 434:b0bf3985ec93 user:Martin Wilckdate:Tue Feb 23 14:50:16 2016 +0100 files: tboot/common/linux.c description: Don't skip first argument in Linux kernel command line Since 429:664e696da669, tboot doesn't skip the first argument of a given command line any more. Condequently, it shoudldn't be skipped either when passed to the kernel in expand_linux_image(). diff -r 562a62118a72 -r b0bf3985ec93 tboot/common/linux.c --- a/tboot/common/linux.c Tue Nov 03 14:57:03 2015 -0800 +++ b/tboot/common/linux.c Tue Feb 23 14:50:16 2016 +0100 @@ -302,7 +302,7 @@ (unsigned long)(real_mode_base + real_mode_size)); /* copy cmdline */ -const char *kernel_cmdline = skip_filename(get_cmdline(g_ldr_ctx)); +const char *kernel_cmdline = get_cmdline(g_ldr_ctx); printk(TBOOT_INFO"Linux cmdline placed in header: "); printk_long(kernel_cmdline); -- Site24x7 APM Insight: Get Deep Visibility into Application Performance APM + Mobile APM + RUM: Monitor 3 App instances at just $35/Month Monitor end-to-end web transactions and take corrective actions now Troubleshoot faster and improve end-user experience. Signup Now! http://pubads.g.doubleclick.net/gampad/clk?id=272487151=/4140___ tboot-devel mailing list tboot-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/tboot-devel
Re: [tboot-devel] Question about TXT + TPM 2.0
On Tue, Feb 23, 2016 at 09:50:54AM +0100, Wilck, Martin wrote: > There's one point about TXT + TPM 2.0 I couldn't figure out. I can see > that tboot itself supports TPM 2.0. I can also see lcptools_v2 to create > policies for it. But tools for writing policy to TPM 2.0 NVM seem to be > missing. This seems understandable as there is no "standard" TSS 2.0 > user space yet - but what's the plan for users, how are they supposed to > commit LCP2.0 policy to the TPM NVM? I only have TPM1.2 laptops with TXT, however I have a couple of TPM 2.0 laptops without TXT. https://github.com/01org/tpm2.0-tools.git has tools that work with my TPM, such as tpm2_listpcrs and commands like tpm2_nvread/nvwrite. Might be worth looking to see if there's anything from there that you can use. Paul -- Site24x7 APM Insight: Get Deep Visibility into Application Performance APM + Mobile APM + RUM: Monitor 3 App instances at just $35/Month Monitor end-to-end web transactions and take corrective actions now Troubleshoot faster and improve end-user experience. Signup Now! http://pubads.g.doubleclick.net/gampad/clk?id=272487151=/4140 ___ tboot-devel mailing list tboot-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/tboot-devel
[tboot-devel] Question about TXT + TPM 2.0
There's one point about TXT + TPM 2.0 I couldn't figure out. I can see that tboot itself supports TPM 2.0. I can also see lcptools_v2 to create policies for it. But tools for writing policy to TPM 2.0 NVM seem to be missing. This seems understandable as there is no "standard" TSS 2.0 user space yet - but what's the plan for users, how are they supposed to commit LCP2.0 policy to the TPM NVM? Thanks, Martin -- Site24x7 APM Insight: Get Deep Visibility into Application Performance APM + Mobile APM + RUM: Monitor 3 App instances at just $35/Month Monitor end-to-end web transactions and take corrective actions now Troubleshoot faster and improve end-user experience. Signup Now! http://pubads.g.doubleclick.net/gampad/clk?id=272487151=/4140 ___ tboot-devel mailing list tboot-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/tboot-devel