lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Fri, 14 Jul 2023 11:58:03 +0000
From:   Jarkko Sakkinen <jarkko@...nel.org>
To:     Linus Torvalds <torvalds@...ux-foundation.org>
Cc:     Jarkko Sakkinen <jarkko@...nel.org>,
        Peter Huewe <peterhuewe@....de>,
        Jason Gunthorpe <jgg@...pe.ca>,
        Lino Sanfilippo <l.sanfilippo@...bus.com>,
        linux-integrity@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: [GIT PULL] tpmdd changes for v6.5-rc2

The following changes since commit 4b810bf037e524b54669acbe4e0df54b15d87ea1:

  Merge tag 'erofs-for-6.5-rc2-fixes' of git://git.kernel.org/pub/scm/linux/kernel/git/xiang/erofs (2023-07-13 14:35:02 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/jarkkojs/linux-tpmdd.git/ tpmdd-v6.5-rc2

for you to fetch changes up to 0ec1b5bea32bce719ebdab253462f9c9cb0aca3e:

  tpm,tpm_tis: Disable interrupts after 1000 unhandled IRQs (2023-07-14 06:38:04 +0000)

----------------------------------------------------------------
Hi Linus,

This comes late but it is really just a flush of bug fixes for the most
part. I've also hold for some tpm_tis IRQ fixes. And holiday season in
FI has caused some slow downs and conflicts between personal and work
life.

BR, Jarkko

----------------------------------------------------------------
Alexander Steffen (4):
      tpm_tis: Explicitly check for error code
      tpm_tis: Move CRC check to generic send routine
      tpm_tis: Use responseRetry to recover from data transfer errors
      tpm_tis: Resend command to recover from data transfer errors

Alexander Sverdlin (2):
      tpm: tis_i2c: Limit read bursts to I2C_SMBUS_BLOCK_MAX (32) bytes
      tpm: tis_i2c: Limit write bursts to I2C_SMBUS_BLOCK_MAX (32) bytes

Azeem Shaikh (1):
      KEYS: Replace all non-returning strlcpy with strscpy

Christian Göttsche (1):
      security: keys: perform capable check only on privileged operations

Christian Hesse (2):
      tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
      tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 13th gen

Colin Ian King (1):
      tpm: remove redundant variable len

Eric Snowberg (2):
      KEYS: DigitalSignature link restriction
      integrity: Enforce digitalSignature usage in the ima and evm keyrings

Florian Bezdeka (1):
      tpm/tpm_tis: Disable interrupts for Lenovo L590 devices

Ivan Orlov (1):
      tpm: make all 'class' structures const

Jarkko Sakkinen (1):
      tpm: tpm_vtpm_proxy: fix a race condition in /dev/vtpmx creation

Jerry Snitselaar (1):
      tpm: return false from tpm_amd_is_rng_defective on non-x86 platforms

Jiapeng Chong (1):
      security: keys: Modify mismatched function name

Krishna Yarlagadda (1):
      tpm_tis-spi: Add hardware wait polling

Lino Sanfilippo (1):
      tpm,tpm_tis: Disable interrupts after 1000 unhandled IRQs

Peijie Shao (1):
      tpm_tis_spi: Release chip select when flow control fails

Peter Ujfalusi (1):
      tpm: tpm_tis: Disable interrupts *only* for AEON UPX-i11

Petr Pavlu (1):
      keys: Fix linking a duplicate key to a keyring's assoc_array

Uwe Kleine-König (1):
      tpm: Switch i2c drivers back to use .probe()

Valentin David (1):
      tpm: Do not remap from ACPI resources again for Pluton TPM

 certs/system_keyring.c                    |  49 +++++++++
 crypto/asymmetric_keys/restrict.c         |  44 ++++++++
 drivers/char/tpm/eventlog/tpm1.c          |   3 +-
 drivers/char/tpm/st33zp24/i2c.c           |   2 +-
 drivers/char/tpm/tpm-chip.c               |  18 +++-
 drivers/char/tpm/tpm-interface.c          |  21 ++--
 drivers/char/tpm/tpm.h                    |   4 +-
 drivers/char/tpm/tpm2-space.c             |   2 +-
 drivers/char/tpm/tpm_crb.c                |  19 ++--
 drivers/char/tpm/tpm_i2c_atmel.c          |   2 +-
 drivers/char/tpm/tpm_i2c_infineon.c       |   2 +-
 drivers/char/tpm/tpm_i2c_nuvoton.c        |   2 +-
 drivers/char/tpm/tpm_tis.c                |  25 +++++
 drivers/char/tpm/tpm_tis_core.c           | 172 ++++++++++++++++++++++++------
 drivers/char/tpm/tpm_tis_core.h           |   5 +
 drivers/char/tpm/tpm_tis_i2c.c            |  61 +++++++----
 drivers/char/tpm/tpm_tis_i2c_cr50.c       |   2 +-
 drivers/char/tpm/tpm_tis_spi_main.c       |  99 ++++++++++++++++-
 drivers/char/tpm/tpm_vtpm_proxy.c         |  30 ++----
 include/crypto/public_key.h               |  11 ++
 include/keys/system_keyring.h             |  10 ++
 security/integrity/digsig.c               |   4 +-
 security/integrity/evm/Kconfig            |   3 +-
 security/integrity/ima/Kconfig            |   3 +-
 security/keys/keyctl.c                    |  11 +-
 security/keys/request_key.c               |  35 ++++--
 security/keys/request_key_auth.c          |   2 +-
 security/keys/trusted-keys/trusted_tpm2.c |   2 +-
 28 files changed, 509 insertions(+), 134 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ