From mboxrd@z Thu Jan 1 00:00:00 1970 From: jarkko.sakkinen@linux.intel.com (Jarkko Sakkinen) Date: Tue, 29 Aug 2017 15:55:09 +0300 Subject: [PATCH RESEND 3/3] tpm-chip: Export TPM device to user space even when startup failed In-Reply-To: References: <20170824083714.10016-1-Alexander.Steffen@infineon.com> <20170824083714.10016-4-Alexander.Steffen@infineon.com> <20170825172021.lw3ycxqw63ubrcm2@linux.intel.com> Message-ID: <20170829125509.55aylht3ikes3bpy@linux.intel.com> To: linux-security-module@vger.kernel.org List-Id: linux-security-module.vger.kernel.org On Mon, Aug 28, 2017 at 05:15:58PM +0000, Alexander.Steffen at infineon.com wrote: > But is that just because nobody bothered to implement the necessary > logic or for some other reason? We do not want user space to access broken hardware. It's a huge risk for system stability and potentially could be used for evil purposes. This is not going to mainline as it is not suitable for general consumption. You must use a patched kernel if you want this. /Jarkko -- To unsubscribe from this list: send the line "unsubscribe linux-security-module" in the body of a message to majordomo at vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html