lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <D8R5SUN9YYXG.1RL5OEAJPN0GO@jarkko-kan-01>
Date: Thu, 27 Mar 2025 17:38:22 +0200
From: "Jarkko Sakkinen" <jarkko@...nel.org>
To: "Linus Torvalds" <torvalds@...ux-foundation.org>
Cc: "Peter Huewe" <peterhuewe@....de>, "Jason Gunthorpe" <jgg@...pe.ca>,
 "David Howells" <dhowells@...hat.com>, <keyrings@...r.kernel.org>,
 <linux-integrity@...r.kernel.org>, <linux-kernel@...r.kernel.org>
Subject: [GIT PULL] TPM DEVICE DRIVER: tpmdd-next-6.15-rc1

The following changes since commit 1a9239bb4253f9076b5b4b2a1a4e8d7defd77a95:

  Merge tag 'net-next-6.15' of git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net-next (2025-03-26 21:48:21 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/jarkko/linux-tpmdd.git tags/tpmdd-next-6.15-rc1

for you to fetch changes up to 980a573621ea4b5032123937df0115bdbec6b2de:

  tpm: Make chip->{status,cancel,req_canceled} opt (2025-03-27 17:10:43 +0200)

----------------------------------------------------------------
Hi,

This PR contains a new driver: TPM FF-A driver. FF comes from Firmware
Framework, and A comes from Arm's A-profile [1]. FF-A is essentially
a standard mechanism to communicate with TrustZone apps such as TPM.

Other than that, the PR includes a pile of fixes and small improvments.

BR, Jarkko

----------------------------------------------------------------
Arnd Bergmann (1):
      tpm: ftpm_tee: remove incorrect of_match_ptr annotation

Jarkko Sakkinen (1):
      tpm: Make chip->{status,cancel,req_canceled} opt

Jonathan McDowell (5):
      tpm: Lazily flush auth session when getting random data
      tpm: Convert warn to dbg in tpm2_start_auth_session()
      tpm, tpm_tis: Fix timeout handling when waiting for TPM status
      tpm, tpm_tis: Workaround failed command reception on Infineon devices
      tpm: End any active auth session before shutdown

Stefano Garzarella (1):
      tpm/tpm_ftpm_tee: fix struct ftpm_tee_private documentation

Stuart Yoder (5):
      tpm_crb: ffa_tpm: Implement driver compliant to CRB over FF-A
      tpm_crb: Clean-up and refactor check for idle support
      ACPICA: Add start method for ARM FF-A
      tpm_crb: Add support for the ARM FF-A start method
      Documentation: tpm: Add documentation for the CRB FF-A interface

Thadeu Lima de Souza Cascardo (1):
      tpm: do not start chip while suspended

WangYuli (1):
      MAINTAINERS: TPM DEVICE DRIVER: add missing includes

 Documentation/security/tpm/index.rst       |   1 +
 Documentation/security/tpm/tpm_ffa_crb.rst |  65 ++++++
 MAINTAINERS                                |   2 +
 drivers/char/tpm/Kconfig                   |   9 +
 drivers/char/tpm/Makefile                  |   1 +
 drivers/char/tpm/tpm-chip.c                |   6 +
 drivers/char/tpm/tpm-interface.c           |  37 ++-
 drivers/char/tpm/tpm2-cmd.c                |   1 -
 drivers/char/tpm/tpm2-sessions.c           |   2 +-
 drivers/char/tpm/tpm_crb.c                 | 105 +++++++--
 drivers/char/tpm/tpm_crb_ffa.c             | 348 +++++++++++++++++++++++++++++
 drivers/char/tpm/tpm_crb_ffa.h             |  25 +++
 drivers/char/tpm/tpm_ftpm_tee.c            |  22 +-
 drivers/char/tpm/tpm_ftpm_tee.h            |   1 -
 drivers/char/tpm/tpm_tis_core.c            |  20 +-
 drivers/char/tpm/tpm_tis_core.h            |   1 +
 include/acpi/actbl3.h                      |   1 +
 include/linux/tpm.h                        |   1 +
 18 files changed, 590 insertions(+), 58 deletions(-)
 create mode 100644 Documentation/security/tpm/tpm_ffa_crb.rst
 create mode 100644 drivers/char/tpm/tpm_crb_ffa.c
 create mode 100644 drivers/char/tpm/tpm_crb_ffa.h

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ