Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp2012116imm; Sat, 28 Jul 2018 07:29:54 -0700 (PDT) X-Google-Smtp-Source: AAOMgpe1EbPcJGTJxDAlFrCJqLwc1zRZrP/wFqldb3geHWWCnfyyrY886QxiXm0WtQxQBth0ORKV X-Received: by 2002:a63:2b89:: with SMTP id r131-v6mr9660737pgr.39.1532788194043; Sat, 28 Jul 2018 07:29:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1532788194; cv=none; d=google.com; s=arc-20160816; b=yz3WvI7z3o6QGa8JNM60qG2glZ9FH2jaZ4JsqIhfLqDYAQbuCKuGS//pxCrRxHncfN 9IbmITkPCJKzXMSWwuvw214PT9qWv+GHg++too0/OsnTyLxgoaNf/0hJ9+E6uaPURaXi dQ+lMFHycDexAwP94eDq89a1A6yrXENVUQCv1k0b2kW5UdLaETvgL/SyiMoX8KfCzISI d6qO6SWyg3zSDvcG4yYyKbjPx6FwzcZLAnxrIiHG6GiydM7VPUfzB0KpA6gMj39LU35K 87wXHkMyk4CB/UGXwoodmNzwQ7cJobmzbZRfX5MS8ZgQy8V4031Hf9/pw2gA+NZzQtGF lqzA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:organization:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=GVWnmxDrrFTl+mBI0aY0mT9hosdIFqtdqHYSlQBbqY0=; b=rtubW57rhEExZ5dvkx9zD6SbWkXPz2xmVTZ91G9xOqS+CmXJ7ZH5XnaeUlMI8m1xo9 HC1DhlHNm+ZZV5k/tDiZPL01Y0FeWlmAVG9n1RsgmJaVs/qsQnPdOFZnUssxRboXbFWm ILdJJMapbUaKrqOcoKEnNypXtC1m/6F4KevsFyuSa5hTKQFinWgzSoQR5dscF2je4Yqf DzNJVzT5KFU/c9EpmfEUG2+OcSfiKa4trvmiwAdiubuQRRz+9DyayFCdnZEsNSV8zaEL OzKCVteINiVw5yJdYLeK7jV29Gj1sN/Y/1E9coNofdCgQdvHQ7FxSVmaT5OZlRGkGd5J 90Rw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v3-v6si5685397plo.208.2018.07.28.07.29.37; Sat, 28 Jul 2018 07:29:54 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728969AbeG1Pz3 (ORCPT + 99 others); Sat, 28 Jul 2018 11:55:29 -0400 Received: from mga07.intel.com ([134.134.136.100]:5231 "EHLO mga07.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728941AbeG1Pz3 (ORCPT ); Sat, 28 Jul 2018 11:55:29 -0400 X-Amp-Result: UNSCANNABLE X-Amp-File-Uploaded: False Received: from orsmga005.jf.intel.com ([10.7.209.41]) by orsmga105.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 28 Jul 2018 07:28:47 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.51,414,1526367600"; d="scan'208";a="244103857" Received: from valeriof-mobl2.ger.corp.intel.com (HELO localhost) ([10.252.48.151]) by orsmga005.jf.intel.com with ESMTP; 28 Jul 2018 07:28:36 -0700 Date: Sat, 28 Jul 2018 17:28:35 +0300 From: Jarkko Sakkinen To: jmorris@namei.org Cc: linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org, linux-integrity@vger.kernel.org Subject: Re: [GIT PULL] tpmdd 4.19 updates Message-ID: <20180728142835.GA13620@linux.intel.com> References: <20180728142130.GA13541@linux.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180728142130.GA13541@linux.intel.com> Organization: Intel Finland Oy - BIC 0357606-4 - Westendinkatu 7, 02160 Espoo User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi James, Sorry, I pressed send before writing anything. Here is the summary: * Migrated away from PM runtime as explicit cmdReady/goIdle trasactions for every command is a spec requirement. PM runtime adds only a layer of complexity on our case. * tpm_tis drivers can now specify the hwrng quality. * TPM 2.0 code uses now tpm_buf for constructing messages. I think Tomas Winkler has done the same for TPM 1.2. I'll start digging those changes from the patchwork in the near future. * Bug fixes and clean ups. /Jarkko On Sat, Jul 28, 2018 at 05:21:30PM +0300, Jarkko Sakkinen wrote: > The following changes since commit 87ea58433208d17295e200d56be5e2a4fe4ce7d6: > > security: check for kstrdup() failure in lsm_append() (2018-07-17 21:27:06 -0700) > > are available in the Git repository at: > > git://git.infradead.org/users/jjs/linux-tpmdd.git tags/tpmdd-next-20180728 > > for you to fetch changes up to ec403d8ed08c8272cfeeeea154fdebcd289988c8: > > ima: Get rid of ima_used_chip and use ima_tpm_chip != NULL instead (2018-07-28 17:03:11 +0300) > > ---------------------------------------------------------------- > tpmdd updates for Linux 4.19 > > ---------------------------------------------------------------- > Jarkko Sakkinen (5): > tpm: migrate tpm2_shutdown() to use struct tpm_buf > tpm: migrate tpm2_probe() to use struct tpm_buf > tpm: migrate tpm2_get_tpm_pt() to use struct tpm_buf > tpm: migrate tpm2_get_random() to use struct tpm_buf > tpm: replace TPM_TRANSMIT_RAW with TPM_TRANSMIT_NESTED > > Linus Walleij (1): > tpm_tis_spi: Pass the SPI IRQ down to the driver > > Louis Collard (1): > tpm: Allow tpm_tis drivers to set hwrng quality. > > Peter Rosin (1): > tpm/tpm_i2c_infineon: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT) > > Ricardo Schwarzmeier (1): > tpm: Return the actual size when receiving an unsupported command > > Stefan Berger (5): > tpm: rename tpm_chip_find_get() to tpm_find_get_ops() > tpm: Implement tpm_default_chip() to find a TPM chip > tpm: Convert tpm_find_get_ops() to use tpm_default_chip() > ima: Use tpm_default_chip() and call TPM functions with a tpm_chip > ima: Get rid of ima_used_chip and use ima_tpm_chip != NULL instead > > Tomas Winkler (1): > tpm: separate cmd_ready/go_idle from runtime_pm > > drivers/char/tpm/tpm-chip.c | 68 +++++++--- > drivers/char/tpm/tpm-interface.c | 72 +++++++--- > drivers/char/tpm/tpm.h | 31 +++-- > drivers/char/tpm/tpm2-cmd.c | 258 +++++++++++++++--------------------- > drivers/char/tpm/tpm2-space.c | 12 +- > drivers/char/tpm/tpm_crb.c | 101 ++++---------- > drivers/char/tpm/tpm_i2c_infineon.c | 8 +- > drivers/char/tpm/tpm_tis_core.c | 2 + > drivers/char/tpm/tpm_tis_core.h | 1 + > drivers/char/tpm/tpm_tis_spi.c | 9 +- > drivers/char/tpm/tpm_vtpm_proxy.c | 2 +- > include/linux/tpm.h | 7 + > security/integrity/ima/ima.h | 2 +- > security/integrity/ima/ima_crypto.c | 4 +- > security/integrity/ima/ima_init.c | 16 +-- > security/integrity/ima/ima_queue.c | 4 +- > 16 files changed, 289 insertions(+), 308 deletions(-)