[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <c1cf6154-7140-66c9-dff9-dc7a788df518@infradead.org>
Date: Tue, 18 Jun 2019 08:25:58 -0700
From: Randy Dunlap <rdunlap@...radead.org>
To: Sasha Levin <sashal@...nel.org>, peterhuewe@....de,
jarkko.sakkinen@...ux.intel.com, jgg@...pe.ca
Cc: corbet@....net, linux-kernel@...r.kernel.org,
linux-doc@...r.kernel.org, linux-integrity@...r.kernel.org,
linux-kernel@...rosoft.com, thiruan@...rosoft.com,
bryankel@...rosoft.com, tee-dev@...ts.linaro.org
Subject: Re: [PATCH v4 2/2] fTPM: add documentation for ftpm driver
On 5/30/19 8:27 AM, Sasha Levin wrote:
> This patch adds basic documentation to describe the new fTPM driver.
>
> Signed-off-by: Sasha Levin <sashal@...nel.org>
> Signed-off-by: Sasha Levin (Microsoft) <sashal@...nel.org>
> ---
> Documentation/security/tpm/index.rst | 1 +
> Documentation/security/tpm/tpm_ftpm_tee.rst | 31 +++++++++++++++++++++
> 2 files changed, 32 insertions(+)
> create mode 100644 Documentation/security/tpm/tpm_ftpm_tee.rst
Hi,
Just some minor editing...
> diff --git a/Documentation/security/tpm/tpm_ftpm_tee.rst b/Documentation/security/tpm/tpm_ftpm_tee.rst
> new file mode 100644
> index 0000000000000..29c2f8b5ed100
> --- /dev/null
> +++ b/Documentation/security/tpm/tpm_ftpm_tee.rst
> @@ -0,0 +1,31 @@
> +=============================================
> +Firmware TPM Driver
> +=============================================
> +
> +| Authors:
> +| Thirupathaiah Annapureddy <thiruan@...rosoft.com>
> +| Sasha Levin <sashal@...nel.org>
> +
> +This document describes the firmware Trusted Platform Module (fTPM)
> +device driver.
> +
> +Introduction
> +============
> +
> +This driver is a shim for a firmware implemented in ARM's TrustZone
for firmware
> +environment. The driver allows programs to interact with the TPM in the same
> +way the would interact with a hardware TPM.
they
> +
> +Design
> +======
> +
> +The driver acts as a thin layer that passes commands to and from a TPM
> +implemented in firmware. The driver itself doesn't contain much logic and is
> +used more like a dumb pipe between firmware and kernel/userspace.
> +
> +The firmware itself is based on the following paper:
> +https://www.microsoft.com/en-us/research/wp-content/uploads/2017/06/ftpm1.pdf
> +
> +When the driver is loaded it will expose ``/dev/tpmX`` character devices to
> +userspace which will enable userspace to communicate with the firmware tpm
TPM
> +through this device.
>
--
~Randy
Powered by blists - more mailing lists