linux-kernel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Jarkko Sakkinen <jarkko@kernel.org>
To: Linus Torvalds <torvalds@linux-foundation.org>
Cc: linux-kernel@vger.kernel.org, linux-integrity@vger.kernel.org,
	jmorris@namei.org, dhowells@redhat.com, peterhuewe@gmx.de
Subject: [GIT PULL] TPM DEVICE DRIVER updates for v5.13
Date: Wed, 14 Apr 2021 16:58:00 +0300	[thread overview]
Message-ID: <YHb06P4IOGV7eoiJ@kernel.org> (raw)

Hi,

New features:

1. ARM TEE backend for kernel trusted keys to complete the existing TPM
   backend.
2. ASN.1 format for TPM2 trusted keys to make them interact with the
   user space stack, such as OpenConnect VPN.

Other than that, contains bunch of bug fixes.

/Jarkko

The following changes since commit 50987beca096a7ed4f453a6da245fd6a2fadedeb:

  Merge tag 'trace-v5.12-rc7' of git://git.kernel.org/pub/scm/linux/kernel/git/rostedt/linux-trace (2021-04-13 18:40:00 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/jarkko/linux-tpmdd.git/ tags/tpmdd-next-v5.13

for you to fetch changes up to aec00aa04b1131e17e6744681b380779f89d77b3:

  KEYS: trusted: Fix missing null return from kzalloc call (2021-04-14 16:30:31 +0300)

----------------------------------------------------------------
tpmdd updates for Linux v5.13

----------------------------------------------------------------
Colin Ian King (1):
      KEYS: trusted: Fix missing null return from kzalloc call

James Bottomley (5):
      lib: Add ASN.1 encoder
      oid_registry: Add TCG defined OIDS for TPM keys
      security: keys: trusted: fix TPM2 authorizations
      security: keys: trusted: use ASN.1 TPM2 key format for the blobs
      security: keys: trusted: Make sealed key properly interoperable

Stefan Berger (3):
      tpm: efi: Use local variable for calculating final log size
      tpm: acpi: Check eventlog signature before using it
      tpm: vtpm_proxy: Avoid reading host log when using a virtual device

Sumit Garg (4):
      KEYS: trusted: Add generic trusted keys framework
      KEYS: trusted: Introduce TEE based Trusted Keys
      doc: trusted-encrypted: updates with TEE as a new trust source
      MAINTAINERS: Add entry for TEE based Trusted Keys

Zhihao Cheng (1):
      char: tpm: fix error return code in tpm_cr50_i2c_tis_recv()

 Documentation/admin-guide/kernel-parameters.txt   |  12 +
 Documentation/security/keys/trusted-encrypted.rst | 229 +++++++++--
 MAINTAINERS                                       |   8 +
 drivers/char/tpm/eventlog/acpi.c                  |  33 +-
 drivers/char/tpm/eventlog/common.c                |   3 +
 drivers/char/tpm/eventlog/efi.c                   |  29 +-
 drivers/char/tpm/tpm_tis_i2c_cr50.c               |   1 +
 include/keys/trusted-type.h                       |  55 +++
 include/keys/trusted_tee.h                        |  16 +
 include/keys/trusted_tpm.h                        |  29 +-
 include/linux/asn1_encoder.h                      |  32 ++
 include/linux/oid_registry.h                      |   5 +
 include/linux/tpm.h                               |   2 +
 lib/Kconfig                                       |   3 +
 lib/Makefile                                      |   1 +
 lib/asn1_encoder.c                                | 454 ++++++++++++++++++++++
 security/keys/Kconfig                             |   3 +
 security/keys/trusted-keys/Makefile               |   6 +
 security/keys/trusted-keys/tpm2key.asn1           |  11 +
 security/keys/trusted-keys/trusted_core.c         | 360 +++++++++++++++++
 security/keys/trusted-keys/trusted_tee.c          | 318 +++++++++++++++
 security/keys/trusted-keys/trusted_tpm1.c         | 398 +++++--------------
 security/keys/trusted-keys/trusted_tpm2.c         | 269 +++++++++++--
 23 files changed, 1887 insertions(+), 390 deletions(-)
 create mode 100644 include/keys/trusted_tee.h
 create mode 100644 include/linux/asn1_encoder.h
 create mode 100644 lib/asn1_encoder.c
 create mode 100644 security/keys/trusted-keys/tpm2key.asn1
 create mode 100644 security/keys/trusted-keys/trusted_core.c
 create mode 100644 security/keys/trusted-keys/trusted_tee.c

             reply	other threads:[~2021-04-14 13:58 UTC|newest]

Thread overview: 2+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2021-04-14 13:58 Jarkko Sakkinen [this message]
2021-04-26 15:59 ` [GIT PULL] TPM DEVICE DRIVER updates for v5.13 pr-tracker-bot

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=YHb06P4IOGV7eoiJ@kernel.org \
    --to=jarkko@kernel.org \
    --cc=dhowells@redhat.com \
    --cc=jmorris@namei.org \
    --cc=linux-integrity@vger.kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=peterhuewe@gmx.de \
    --cc=torvalds@linux-foundation.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).