Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp2525437imm; Thu, 7 Jun 2018 12:07:27 -0700 (PDT) X-Google-Smtp-Source: ADUXVKIvKOQQ27lp2M5xEjDWm9h1TixKRpY1ZNXcnbRtD5InHycJrbHNQP3nKm2DKNsTqPOrdhVe X-Received: by 2002:a62:86c3:: with SMTP id x186-v6mr2902711pfd.4.1528398447854; Thu, 07 Jun 2018 12:07:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1528398447; cv=none; d=google.com; s=arc-20160816; b=zmSbth54xDnVPL+L+VMsKkOun13/YwwnkaZWOray10jVXorSpHMA476BFBqTP2Z1w8 JJ+xsXHmEPYYJwnL6AdT3g1D0La7lfmdZwupMYcCLUsLKeaKLxwPR6NRKj346fFjybsY OwiK/k/1SXi70AEW98nqAgipqhwWof9U/EVwzpHcuLS7LiBfwaiXhz1YiDdOlbPh7zQ/ ph6D82Pm/evsowMWQN5Edl/412mhNJbjiDGPlDckpncC30U8A6YEeGdQUWy43/mKhn4a eBgFODpWXrPVLtueOhBkpeMj5dBBq0cMRohIl8yuA/jtNy6+UFYhL39h2H5B/50qRHHt 7WZQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:message-id :subject:cc:to:from:date:arc-authentication-results; bh=xH7pgCgb8W7tMFbbF8GnwyWn+4B//vnxo4ryXi6oW54=; b=AFqovrjzGYSGK8YZzr3koQwW/qRu5aDWPlJ+suEt5Ykeod9SGXvTiFrmnPKZvQqAC0 SJzKSpPMtaj5y+BfUlxN3uYABRpbYpag+ItdNtdB0xmz5P4JTjJAaGwvKvp2L7wSHuYr GrYl3BzJ09VgA7Z3SnR8jB43arhq0ILHpeJaTRv+NGPNVVfQ0EnYwaZnSyxh/+hxLdl4 Qgc4C7ZOf8kKGEjIKdEUrdRbUhsDQnMfrJEsL8cR+4TW6vg0inRB7KHiRuYDaGijt0fN 6U0Otz+FWDKYhHdBzjszG3061ngdSPSbbTGsv6ymQoahZC8XzTU/MRZGMHx+mo3LZuAk QH1g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n6-v6si55045043pla.12.2018.06.07.12.07.13; Thu, 07 Jun 2018 12:07:27 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S935029AbeFGRv3 (ORCPT + 99 others); Thu, 7 Jun 2018 13:51:29 -0400 Received: from namei.org ([65.99.196.166]:58478 "EHLO namei.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S933071AbeFGRv2 (ORCPT ); Thu, 7 Jun 2018 13:51:28 -0400 Received: from localhost (localhost [127.0.0.1]) by namei.org (8.14.4/8.14.4) with ESMTP id w57HpQhU031388; Thu, 7 Jun 2018 17:51:26 GMT Date: Fri, 8 Jun 2018 03:51:26 +1000 (AEST) From: James Morris To: Linus Torvalds cc: linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [GIT PULL] Security subsystem: TPM updates for v4.18 Message-ID: User-Agent: Alpine 2.21 (LRH 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Please pull these updates for the TPM subsystem. From Jarkko: "this purely a bug fix release. The only major change is to move the event log code to its own subdirectory because there starts to be so much of it." --- The following changes since commit 890e2abe1028c39e5399101a2c277219cd637aaa: dh key: get rid of stack allocated array for zeroes (2018-05-11 13:07:49 -0700) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security.git next-tpm for you to fetch changes up to 2d06236ab3276000665ef55eccc111c3bbf90589: Merge tag 'tpmdd-next-20180602' of git://git.infradead.org/users/jjs/linux-tpmdd into next-tpm (2018-06-04 09:08:21 -0700) ---------------------------------------------------------------- Colin Ian King (2): tpm: st33zp24: remove redundant null check on chip tpm/st33zp24: Fix spelling mistake in macro ST33ZP24_TISREGISTER_UKNOWN James Morris (2): Merge tag 'tpmdd-next-20180518' of git://git.infradead.org/users/jjs/linux-tpmdd into next-tpm Merge tag 'tpmdd-next-20180602' of git://git.infradead.org/users/jjs/linux-tpmdd into next-tpm Jerry Snitselaar (1): tpm_tis: verify locality released before returning from release_locality Ji-Hun Kim (2): tpm: replace kmalloc() + memcpy() with kmemdup() tpm: replace kmalloc() + memcpy() with kmemdup() Nayna Jain (3): tpm: move the delay_msec increment after sleep in tpm_transmit() tpm: reduce poll sleep time in tpm_transmit() tpm: reduce polling time to usecs for even finer granularity Tadeusz Struk (2): tpm: fix use after free in tpm2_load_context() tpm: fix race condition in tpm_common_write() Thiebaud Weksteen (4): tpm: Add explicit endianness cast tpm: Move eventlog files to a subdirectory tpm: Move shared eventlog functions to common.c tpm: Move eventlog declarations to its own header Winkler, Tomas (1): tpm: tpm_crb: relinquish locality on error path. drivers/char/tpm/Makefile | 10 +- .../tpm/{tpm_eventlog_acpi.c => eventlog/acpi.c} | 3 +- drivers/char/tpm/eventlog/common.c | 195 ++++++++++++++++++++ drivers/char/tpm/eventlog/common.h | 35 ++++ .../tpm/{tpm_eventlog_efi.c => eventlog/efi.c} | 6 +- .../char/tpm/{tpm_eventlog_of.c => eventlog/of.c} | 11 +- .../char/tpm/{tpm1_eventlog.c => eventlog/tpm1.c} | 200 ++------------------- .../char/tpm/{tpm2_eventlog.c => eventlog/tpm2.c} | 3 +- drivers/char/tpm/st33zp24/spi.c | 4 +- drivers/char/tpm/st33zp24/st33zp24.c | 2 - drivers/char/tpm/tpm-dev-common.c | 40 ++--- drivers/char/tpm/tpm-dev.h | 2 +- drivers/char/tpm/tpm-interface.c | 5 +- drivers/char/tpm/tpm.h | 32 +--- drivers/char/tpm/tpm2-space.c | 3 +- drivers/char/tpm/tpm_crb.c | 10 +- drivers/char/tpm/tpm_tis_core.c | 58 +++++- 17 files changed, 350 insertions(+), 269 deletions(-) rename drivers/char/tpm/{tpm_eventlog_acpi.c => eventlog/acpi.c} (98%) create mode 100644 drivers/char/tpm/eventlog/common.c create mode 100644 drivers/char/tpm/eventlog/common.h rename drivers/char/tpm/{tpm_eventlog_efi.c => eventlog/efi.c} (91%) rename drivers/char/tpm/{tpm_eventlog_of.c => eventlog/of.c} (91%) rename drivers/char/tpm/{tpm1_eventlog.c => eventlog/tpm1.c} (58%) rename drivers/char/tpm/{tpm2_eventlog.c => eventlog/tpm2.c} (99%)