[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20190902143121.pjnykevzlajlcrh6@linux.intel.com>
Date: Mon, 2 Sep 2019 17:31:21 +0300
From: Jarkko Sakkinen <jarkko.sakkinen@...ux.intel.com>
To: torvalds@...ux-foundation.org
Cc: linux-kernel@...r.kernel.org, linux-integrity@...r.kernel.org,
jmorris@...ei.org
Subject: [GIT PULL] tpmdd updates for Linux v5.4
Hi
A new driver for fTPM living inside ARM TEE was added this round. In
addition to that, there is three bug fixes and one clean up.
/Jarkko
The following changes since commit 8fb8e9e46261e0117cb3cffb6dd8bb7e08f8649b:
Merge tag 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/rdma/rdma (2019-08-30 09:23:45 -0700)
are available in the Git repository at:
git://git.infradead.org/users/jjs/linux-tpmdd.git tags/tpmdd-next-20190902
for you to fetch changes up to e8bd417aab0c72bfb54465596b16085702ba0405:
tpm/tpm_ftpm_tee: Document fTPM TEE driver (2019-09-02 17:08:35 +0300)
----------------------------------------------------------------
tpmdd updates for Linux v5.4
----------------------------------------------------------------
Jarkko Sakkinen (1):
tpm: Remove a deprecated comments about implicit sysfs locking
Lukas Bulwahn (1):
MAINTAINERS: fix style in KEYS-TRUSTED entry
Sasha Levin (2):
tpm/tpm_ftpm_tee: A driver for firmware TPM running inside TEE
tpm/tpm_ftpm_tee: Document fTPM TEE driver
Stefan Berger (2):
tpm_tis_core: Turn on the TPM before probing IRQ's
tpm_tis_core: Set TPM_CHIP_FLAG_IRQ before probing for interrupts
.../devicetree/bindings/vendor-prefixes.yaml | 2 +
Documentation/security/tpm/index.rst | 1 +
Documentation/security/tpm/tpm_ftpm_tee.rst | 27 ++
MAINTAINERS | 2 +-
drivers/char/tpm/Kconfig | 5 +
drivers/char/tpm/Makefile | 1 +
drivers/char/tpm/tpm-chip.c | 7 +-
drivers/char/tpm/tpm-sysfs.c | 7 -
drivers/char/tpm/tpm_ftpm_tee.c | 350 +++++++++++++++++++++
drivers/char/tpm/tpm_ftpm_tee.h | 40 +++
drivers/char/tpm/tpm_tis_core.c | 3 +
11 files changed, 432 insertions(+), 13 deletions(-)
create mode 100644 Documentation/security/tpm/tpm_ftpm_tee.rst
create mode 100644 drivers/char/tpm/tpm_ftpm_tee.c
create mode 100644 drivers/char/tpm/tpm_ftpm_tee.h
Powered by blists - more mailing lists