Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp2629241imu; Mon, 17 Dec 2018 05:22:22 -0800 (PST) X-Google-Smtp-Source: AFSGD/UjDWy0uHz8/yCbsm9OViIvPf2PpnyQsTiGMQMnzZiu4KKQrj8wrx0/0q4eZMIIRWkT50hU X-Received: by 2002:a63:cb4a:: with SMTP id m10mr11574612pgi.105.1545052942843; Mon, 17 Dec 2018 05:22:22 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1545052942; cv=none; d=google.com; s=arc-20160816; b=SGsD0FX+anu7YLKjbyQ7IrXUbl9T7tk6KvyQlYlaq9eZ8y1EmBpAzPl1JI3F6rWekr DG/aGdXLck/I5Ng9UMjeAWFi7yg5KIzbneDebVYMXS2yP0pJHu/L4zPoveJInC/K00c6 4t+O/kInJqxtTlYVC2xi+NLHtQVDzDdaiwbyy0KO4mxL5s3Q5bFrC8kam6ZdShwQsnsz ZsEQW1hEzXpazb/XVJ2eRrCMwUY3iocTajiopJXv9kjsAki7KTHOeOpQIWe+JLRD+cw/ R7ymUQwqXOtIUUyHqvE7BxwPAM8zsUYihlCtpBjzqBewsv1FOZT5L1DmrQIOa6XdAt1v l1OQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:organization :content-disposition:mime-version:message-id:subject:cc:to:from:date; bh=ZSd3D7dDzQE8p574dwskszy2fFglOZON1wKP1nSLXdk=; b=H4BXhznpyWfe8SF3PpyMHh9FjmnWKip7tVGLU2pJ5LW5t4DNf07RgOR7orTwfut9WK 3IUH1JervoYRDWaKmvpwfokHFhDCgwVmMIlZYEgZua+eQuxys1AIpme3Vr/5VMkFmRwI Q0tAP1D83borxILF4jYojcrVyWY6x6yT8o5GSOjQZX8jR1xtJuvsYW46ufYP/PJW9Qe3 9TvXmJfI/Uobbb8E7O+kzAdVPTntP+FsEmXI1MfvzMknPBBj3KyAe/6twV0vv4edqvzm 18zNHrch1c4+i+8k5AFpDuBJDS+Fgw5E08RcWGID9gyNyku7P7TFXM6T9Wnttus2Zyfp pZug== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q20si10496656pgl.268.2018.12.17.05.22.07; Mon, 17 Dec 2018 05:22:22 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732906AbeLQNUi (ORCPT + 99 others); Mon, 17 Dec 2018 08:20:38 -0500 Received: from mga14.intel.com ([192.55.52.115]:9259 "EHLO mga14.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732878AbeLQNUh (ORCPT ); Mon, 17 Dec 2018 08:20:37 -0500 X-Amp-Result: UNKNOWN X-Amp-Original-Verdict: FILE UNKNOWN X-Amp-File-Uploaded: False Received: from orsmga001.jf.intel.com ([10.7.209.18]) by fmsmga103.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 17 Dec 2018 05:20:37 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.56,365,1539673200"; d="scan'208";a="119477509" Received: from zhangxi4-mobl5.ccr.corp.intel.com (HELO localhost) ([10.249.254.207]) by orsmga001.jf.intel.com with ESMTP; 17 Dec 2018 05:20:34 -0800 Date: Mon, 17 Dec 2018 15:20:33 +0200 From: Jarkko Sakkinen To: jmorris@namei.org Cc: linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org Subject: [GIT PULL] tpmdd updates for Linux v4.21 Message-ID: <20181217132033.GA31729@linux.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Organization: Intel Finland Oy - BIC 0357606-4 - Westendinkatu 7, 02160 Espoo User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi James, v4.21 updates: * Support for partial reads of /dev/tpm0. * Clean up for TPM 1.x code: move the commands to tpm1-cmd.c and make everything to use the same data structure for building TPM commands i.e. struct tpm_buf. /Jarkko The following changes since commit 26b76320a8a550472bbb8f42257df83fcb8d8df6: Merge tag 'v4.20-rc2' into next-general (2018-11-12 09:07:41 -0800) are available in the Git repository at: git://git.infradead.org/users/jjs/linux-tpmdd.git tags/tpmdd-next-20181217 for you to fetch changes up to 9488585b21bef0df1217e510c7134905d1d376a7: tpm: add support for partial reads (2018-12-17 13:45:10 +0200) ---------------------------------------------------------------- tpmdd updates for Linux v4.21 ---------------------------------------------------------------- Tadeusz Struk (1): tpm: add support for partial reads Tomas Winkler (24): tpm: tpm_i2c_nuvoton: use correct command duration for TPM 2.x tpm2: add new tpm2 commands according to TCG 1.36 tpm: sort objects in the Makefile tpm: factor out tpm 1.x duration calculation to tpm1-cmd.c tpm: add tpm_calc_ordinal_duration() wrapper tpm: factor out tpm_get_timeouts() tpm: move tpm1_pcr_extend to tpm1-cmd.c tpm: move tpm_getcap to tpm1-cmd.c tpm: factor out tpm1_get_random into tpm1-cmd.c tpm: move tpm 1.x selftest code from tpm-interface.c tpm1-cmd.c tpm: factor out tpm 1.x pm suspend flow into tpm1-cmd.c tpm: factor out tpm_startup function tpm: add tpm_auto_startup() into tpm-interface.c tpm: tpm-interface.c drop unused macros tpm: tpm-space.c remove unneeded semicolon tpm: tpm1: rewrite tpm1_get_random() using tpm_buf structure tpm1: implement tpm1_pcr_read_dev() using tpm_buf structure tpm1: rename tpm1_pcr_read_dev to tpm1_pcr_read() tpm1: reimplement SAVESTATE using tpm_buf tpm1: reimplement tpm1_continue_selftest() using tpm_buf tpm: use u32 instead of int for PCR index tpm: tpm_try_transmit() refactor error flow. tpm: fix kdoc for tpm2_flush_context_cmd() tpm: tpm_ibmvtpm: fix kdoc warnings drivers/char/tpm/Makefile | 16 +- drivers/char/tpm/st33zp24/st33zp24.c | 2 +- drivers/char/tpm/tpm-chip.c | 11 +- drivers/char/tpm/tpm-dev-common.c | 52 ++- drivers/char/tpm/tpm-dev.h | 5 +- drivers/char/tpm/tpm-interface.c | 832 +++-------------------------------- drivers/char/tpm/tpm-sysfs.c | 52 +-- drivers/char/tpm/tpm.h | 97 ++-- drivers/char/tpm/tpm1-cmd.c | 781 ++++++++++++++++++++++++++++++++ drivers/char/tpm/tpm2-cmd.c | 308 +++++++------ drivers/char/tpm/tpm2-space.c | 2 +- drivers/char/tpm/tpm_i2c_nuvoton.c | 11 +- drivers/char/tpm/tpm_ibmvtpm.c | 6 +- drivers/char/tpm/tpm_tis_core.c | 10 +- include/linux/tpm.h | 11 +- security/integrity/ima/ima_crypto.c | 5 +- 16 files changed, 1133 insertions(+), 1068 deletions(-) create mode 100644 drivers/char/tpm/tpm1-cmd.c