* [GIT PULL] tpmdd: changes for v6.4-rc1
@ 2023-04-24 14:41 Jarkko Sakkinen
2023-04-24 18:47 ` pr-tracker-bot
0 siblings, 1 reply; 2+ messages in thread
From: Jarkko Sakkinen @ 2023-04-24 14:41 UTC (permalink / raw)
To: Linus Torvalds
Cc: Jarkko Sakkinen, David Howells, Mimi Zohar, Eric Snowberg,
Lino Sanfilippo, Martin Dimov, linux-integrity, linux-kernel
[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #1: Type: text/plain; charset=y, Size: 4521 bytes --]
The following changes since commit 457391b0380335d5e9a5babdec90ac53928b23b4:
Linux 6.3 (2023-04-23 12:02:52 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/jarkko/linux-tpmdd.git/ tags/tpmdd-v6.4-rc1
for you to fetch changes up to bd8621ca1510e6e802df9855bdc35a04a3cfa932:
tpm: Add !tpm_amd_is_rng_defective() to the hwrng_unregister() call site (2023-04-24 16:15:53 +0300)
----------------------------------------------------------------
Two major features are included into this pull request. The links for
the landed patch sets are below.
The .machine keyring, used for Machine Owner Keys (MOK), acquired the
ability to store only CA enforced keys, and put rest to the .platform
keyring, thus separating the code signing keys from the keys that are
used to sign certificates. This essentially unlocks the use of the
.machine keyring as a trust anchor for IMA. It is an opt-in feature,
meaning that the additional contraints won't brick anyone who does not
care about them.
The 2nd feature is the enablement of interrupt based transactions with
discrete TPM chips (tpm_tis). There was code for this existing but it
never really worked so I consider this a new feature rather than a bug
fix. Before the driver just falled back to the polling mode.
Link: https://lore.kernel.org/linux-integrity/a93b6222-edda-d43c-f010-a59701f2aeef@gmx.de/
Link: https://lore.kernel.org/linux-integrity/20230302164652.83571-1-eric.snowberg@oracle.com/
----------------------------------------------------------------
Eric Snowberg (6):
KEYS: Create static version of public_key_verify_signature
KEYS: Add missing function documentation
KEYS: X.509: Parse Basic Constraints for CA
KEYS: X.509: Parse Key Usage
KEYS: CA link restriction
integrity: machine keyring CA configuration
Haris Okanovic (1):
tpm_tis: fix stall after iowrite*()s
Jarkko Sakkinen (1):
tpm: Add !tpm_amd_is_rng_defective() to the hwrng_unregister() call site
Krzysztof Kozlowski (2):
tpm: st33zp24: Mark ACPI and OF related data as maybe unused
tpm: tpm_tis_spi: Mark ACPI and OF related data as maybe unused
Lino Sanfilippo (14):
tpm, tpm_tis: Avoid cache incoherency in test for interrupts
tpm, tpm_tis: Claim locality before writing TPM_INT_ENABLE register
tpm, tpm_tis: Disable interrupts if tpm_tis_probe_irq() failed
tpm, tpm_tis: Do not skip reset of original interrupt vector
tpm, tpm_tis: Claim locality before writing interrupt registers
tpm, tpm_tis: Only handle supported interrupts
tpm, tpm_tis: Move interrupt mask checks into own function
tpm, tpm_tis: do not check for the active locality in interrupt handler
tpm, tpm: Implement usage counter for locality
tpm, tpm_tis: Request threaded interrupt handler
tpm, tpm_tis: Claim locality in interrupt handler
tpm, tpm_tis: Claim locality when interrupts are reenabled on resume
tpm, tpm_tis: startup chip before testing for interrupts
tpm, tpm_tis: Enable interrupt test
Mark Hasemeyer (1):
tpm: cr50: i2c: use jiffies to wait for tpm ready irq
Uwe Kleine-König (3):
tpm/tpm_ftpm_tee: Convert to platform remove callback returning void
tpm/tpm_tis: Convert to platform remove callback returning void
tpm/tpm_tis_synquacer: Convert to platform remove callback returning void
Yu Zhe (1):
tpm: remove unnecessary (void*) conversions
certs/system_keyring.c | 14 +-
crypto/asymmetric_keys/restrict.c | 40 ++++
crypto/asymmetric_keys/x509_cert_parser.c | 50 +++++
drivers/char/tpm/eventlog/common.c | 6 +-
drivers/char/tpm/st33zp24/i2c.c | 4 +-
drivers/char/tpm/st33zp24/spi.c | 4 +-
drivers/char/tpm/tpm-chip.c | 41 ++--
drivers/char/tpm/tpm.h | 1 +
drivers/char/tpm/tpm_ftpm_tee.c | 6 +-
drivers/char/tpm/tpm_tis.c | 51 ++++-
drivers/char/tpm/tpm_tis_core.c | 299 ++++++++++++++++++------------
drivers/char/tpm/tpm_tis_core.h | 5 +-
drivers/char/tpm/tpm_tis_i2c_cr50.c | 3 +-
drivers/char/tpm/tpm_tis_spi_main.c | 4 +-
drivers/char/tpm/tpm_tis_synquacer.c | 6 +-
include/crypto/public_key.h | 28 +++
security/integrity/Kconfig | 23 ++-
security/integrity/digsig.c | 8 +-
18 files changed, 431 insertions(+), 162 deletions(-)
^ permalink raw reply [flat|nested] 2+ messages in thread
* Re: [GIT PULL] tpmdd: changes for v6.4-rc1
2023-04-24 14:41 [GIT PULL] tpmdd: changes for v6.4-rc1 Jarkko Sakkinen
@ 2023-04-24 18:47 ` pr-tracker-bot
0 siblings, 0 replies; 2+ messages in thread
From: pr-tracker-bot @ 2023-04-24 18:47 UTC (permalink / raw)
To: Jarkko Sakkinen
Cc: Linus Torvalds, Jarkko Sakkinen, David Howells, Mimi Zohar,
Eric Snowberg, Lino Sanfilippo, Martin Dimov, linux-integrity,
linux-kernel
The pull request you sent on Mon, 24 Apr 2023 17:41:30 +0300:
> git://git.kernel.org/pub/scm/linux/kernel/git/jarkko/linux-tpmdd.git/ tags/tpmdd-v6.4-rc1
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/1a0beef98b582b69a2ba44e468f7dfecbcfab48e
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2023-04-24 18:50 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2023-04-24 14:41 [GIT PULL] tpmdd: changes for v6.4-rc1 Jarkko Sakkinen
2023-04-24 18:47 ` pr-tracker-bot
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox