Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp1357979imm; Wed, 15 Aug 2018 16:23:58 -0700 (PDT) X-Google-Smtp-Source: AA+uWPyO/pUshUK/D4sFjpOxfWa6NwwqyDyKSbKCcJPrkowt3CTZ9XSx0pHk1XRHPsAS61r3m4Tn X-Received: by 2002:a65:6110:: with SMTP id z16-v6mr27363516pgu.412.1534375438377; Wed, 15 Aug 2018 16:23:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1534375438; cv=none; d=google.com; s=arc-20160816; b=FoVzNQFTXPAwISrEO3OpzYVMFl51K6q9gjw27PCKy5C5Atsv1hK/6qtPmnMkAzgToX AhaMAhcEupbA/r5sQGLd42FX5d8pt8AxYxpbOdHyQUxgxGDSBufraXXNp9pBoSf04IIA YC7oIfVVnNODx4W1pLfsohuSPCop9rDJOtCfcZQJeac4sqBxUGZT0/XDbyYJtqMJQbQf /KY4k5B+md9uaiUJ8PWve24kBxmeNglgIPtNBd7s7+grK2pt6lPk2W5KHbDBZLCp70Nw 0vmfDngIXw6hwY070tLqw+vObEfCzNWkK2r/BlVBHTZjw8fD7I7QJrOZzxBBfbexe9vH gvog== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:message-id :subject:cc:to:from:date:arc-authentication-results; bh=xDeUPuVgqHmHusApDdMwOLlHm/RNMkhDHpoI7mVa4OM=; b=aTIyjo6EDd02/MoInRkLkmPNLBOXoPmk0etgocrzOS3mdFEcUik65lMiAU0JgXuv2M EeN21/q5omaqL8dImQnKwC6oKy9M6G7ChCcRVwPrZQXFuY4weuUtu0fcjBRKQAWnynlI 90Uv4JqfxkrTf0PuzjNoXQRxcYh8NUr1xjUlksrg5gU0Ho3AuCYQuYN0BXBrr9CTl930 yMChYM0pz/zoaoKhTaJkq3PEfMfVEOAufDOCRgN3MhWcCU9cBAoVhO/bIvYnM0/yCNJW MvW3sbHdCq+Av1BvsWuvo9DeLPIft5f9ZydqDOJmRaYdvDE81LMxSFNNy9NOV3hSBgrM nnLQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b12-v6si25116759pgh.264.2018.08.15.16.23.28; Wed, 15 Aug 2018 16:23:58 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729851AbeHPBcC (ORCPT + 99 others); Wed, 15 Aug 2018 21:32:02 -0400 Received: from namei.org ([65.99.196.166]:43380 "EHLO namei.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728977AbeHPBcA (ORCPT ); Wed, 15 Aug 2018 21:32:00 -0400 Received: from localhost (localhost [127.0.0.1]) by namei.org (8.14.4/8.14.4) with ESMTP id w7FMbo0V022747; Wed, 15 Aug 2018 22:37:50 GMT Date: Thu, 16 Aug 2018 08:37:50 +1000 (AEST) From: James Morris To: Linus Torvalds cc: linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [GIT PULL] security subsystem: TPM updates for v4.19 Message-ID: User-Agent: Alpine 2.21 (LRH 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From Jarkko: " * Migrated away from PM runtime as explicit cmdReady/goIdle trasactions for every command is a spec requirement. PM runtime adds only a layer of complexity on our case. * tpm_tis drivers can now specify the hwrng quality. * TPM 2.0 code uses now tpm_buf for constructing messages. I think Tomas Winkler has done the same for TPM 1.2. I'll start digging those changes from the patchwork in the near future. * Bug fixes and clean ups." The following changes since commit 87ea58433208d17295e200d56be5e2a4fe4ce7d6: security: check for kstrdup() failure in lsm_append() (2018-07-17 21:27:06 -0700) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security.git next-tpm for you to fetch changes up to 5da08f7d01693433ff6bea0c3462a5173d577540: Merge tag 'tpmdd-next-20180728' of git://git.infradead.org/users/jjs/linux-tpmdd into next-tpm (2018-07-30 09:30:19 -0700) ---------------------------------------------------------------- James Morris (1): Merge tag 'tpmdd-next-20180728' of git://git.infradead.org/users/jjs/linux-tpmdd into next-tpm Jarkko Sakkinen (5): tpm: migrate tpm2_shutdown() to use struct tpm_buf tpm: migrate tpm2_probe() to use struct tpm_buf tpm: migrate tpm2_get_tpm_pt() to use struct tpm_buf tpm: migrate tpm2_get_random() to use struct tpm_buf tpm: replace TPM_TRANSMIT_RAW with TPM_TRANSMIT_NESTED Linus Walleij (1): tpm_tis_spi: Pass the SPI IRQ down to the driver Louis Collard (1): tpm: Allow tpm_tis drivers to set hwrng quality. Peter Rosin (1): tpm/tpm_i2c_infineon: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT) Ricardo Schwarzmeier (1): tpm: Return the actual size when receiving an unsupported command Stefan Berger (5): tpm: rename tpm_chip_find_get() to tpm_find_get_ops() tpm: Implement tpm_default_chip() to find a TPM chip tpm: Convert tpm_find_get_ops() to use tpm_default_chip() ima: Use tpm_default_chip() and call TPM functions with a tpm_chip ima: Get rid of ima_used_chip and use ima_tpm_chip != NULL instead Tomas Winkler (1): tpm: separate cmd_ready/go_idle from runtime_pm drivers/char/tpm/tpm-chip.c | 68 +++++++--- drivers/char/tpm/tpm-interface.c | 72 +++++++--- drivers/char/tpm/tpm.h | 31 +++-- drivers/char/tpm/tpm2-cmd.c | 258 +++++++++++++++--------------------- drivers/char/tpm/tpm2-space.c | 12 +- drivers/char/tpm/tpm_crb.c | 101 ++++---------- drivers/char/tpm/tpm_i2c_infineon.c | 8 +- drivers/char/tpm/tpm_tis_core.c | 2 + drivers/char/tpm/tpm_tis_core.h | 1 + drivers/char/tpm/tpm_tis_spi.c | 9 +- drivers/char/tpm/tpm_vtpm_proxy.c | 2 +- include/linux/tpm.h | 7 + security/integrity/ima/ima.h | 2 +- security/integrity/ima/ima_crypto.c | 4 +- security/integrity/ima/ima_init.c | 16 +-- security/integrity/ima/ima_queue.c | 4 +- 16 files changed, 289 insertions(+), 308 deletions(-)