Received: by 2002:ac0:aa62:0:0:0:0:0 with SMTP id w31-v6csp1649053ima; Thu, 25 Oct 2018 02:37:49 -0700 (PDT) X-Google-Smtp-Source: AJdET5cyZjWRUI2nCjnrU5381QuwRaAorxOUV+D2xUCOEfMfM4RqBYmsqE17yFTRZXm5oxb3Igu4 X-Received: by 2002:a63:314c:: with SMTP id x73mr764850pgx.323.1540460269936; Thu, 25 Oct 2018 02:37:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1540460269; cv=none; d=google.com; s=arc-20160816; b=kkSSoSAsWHCVax5HUwvs3wIrqbJXClRWDJwIfG5j2H2w/hv7rrDQvg9YkOE9l42uPi GMAmR+uG4sHaicoVKsnTVDYKj37NWaQNBsMgILHF6Uqn8YGEGM4TuLXq99d2oVVNkSUz 7ynRYp2SAqXqQ/PCwp2VmoEPZqQGLln+Fpiya+ncekcA3Yzkc/YjU0/kKtEM1OWLNcdH 1P9sBMv2y2cs4vKzgCHG2MgBCMVIwjetBdjLDyUw9TD6mZcQ9uBU7dB0tH8NLb7n+oO5 +OEwukrBaeWW4kzkYBkWMDzmbJUloEgLQV6RXYvmNu/OLn8+vWcldPex38XYv6S2atwt 504w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:message-id :subject:cc:to:from:date; bh=HIs1J3Jn/1p4LlhAFg+UMwSlGPpcqQ/0tO8hbT9IKdQ=; b=TNqmyp/xZgNeFFRW8WtcDXPqeJFrTsjWlD//c5z4NiOkVAlRJ517KYWRDMsiafusML 0oy2OeyWXGxe0qvMvgtKg947KMcpnsGuxRkntCHMmkHSAQZqQ1psfQg0pyA8f3AuE3gA AcojejzPH3GFLrjAjrgyEnxQFIets13NR+leoGfy8A8pxqEejzZ5g65qIIBLbVUp3z47 HjOPS+T2wI5Ir73xS0cu6RM/XDiMS82bbsZqwci3VSPZKxjN7Ou+Hxi6HY3mPtzBobOM 8ywEPCNpWUCmIhxbjxDyk15sj3X1GHikAqnjWHL1DwxVpVGW+oP8joitpc2KKh728pYb mEoA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w7-v6si7390837pgh.131.2018.10.25.02.37.33; Thu, 25 Oct 2018 02:37:49 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726829AbeJYSHR (ORCPT + 99 others); Thu, 25 Oct 2018 14:07:17 -0400 Received: from namei.org ([65.99.196.166]:49094 "EHLO namei.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726652AbeJYSHQ (ORCPT ); Thu, 25 Oct 2018 14:07:16 -0400 Received: from localhost (localhost [127.0.0.1]) by namei.org (8.14.4/8.14.4) with ESMTP id w9P9ZKDX031382; Thu, 25 Oct 2018 09:35:20 GMT Date: Thu, 25 Oct 2018 20:35:20 +1100 (AEDT) From: James Morris To: Linus Torvalds cc: linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org Subject: [GIT PULL] security: TPM updates for v4.20 Message-ID: User-Agent: Alpine 2.21 (LRH 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Please pull. From Jarkko: "These are the updates to v4.20. The only new feature is non-blocking operation for /dev/tpm0." --- The following changes since commit 2ecefa0a15fd0ef88b9cd5d15ceb813008136431: keys: Fix the use of the C++ keyword "private" in uapi/linux/keyctl.h (2018-09-28 09:51:51 -0700) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security.git next-tpm for you to fetch changes up to b8d7b758145252e60ea0198e531a8b00a75b8895: Merge tag 'tpmdd-next-20181005' of git://git.infradead.org/users/jjs/linux-tpmdd into next-tpm (2018-10-05 11:21:23 -0700) ---------------------------------------------------------------- Dr. Greg Wettstein (1): tpm: Restore functionality to xen vtpm driver. James Morris (1): Merge tag 'tpmdd-next-20181005' of git://git.infradead.org/users/jjs/linux-tpmdd into next-tpm Jarkko Sakkinen (1): tpm: fix response size validation in tpm_get_random() Javier Martinez Canillas (1): tpm: suppress transmit cmd error logs when TPM 1.2 is disabled/deactivated Peter Huewe (1): tpm: Make SECURITYFS a weak dependency Tadeusz Struk (2): tpm: add ptr to the tpm_space struct to file_priv tpm: add support for nonblocking operation drivers/char/tpm/Kconfig | 2 +- drivers/char/tpm/tpm-dev-common.c | 147 ++++++++++++++++++++++++++++---------- drivers/char/tpm/tpm-dev.c | 11 +-- drivers/char/tpm/tpm-dev.h | 18 +++-- drivers/char/tpm/tpm-interface.c | 30 ++++++-- drivers/char/tpm/tpm.h | 2 + drivers/char/tpm/tpm2-cmd.c | 4 +- drivers/char/tpm/tpmrm-dev.c | 15 +--- drivers/char/tpm/xen-tpmfront.c | 2 +- 9 files changed, 157 insertions(+), 74 deletions(-)