[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <aOKTFv1vh1cvvcLk@kernel.org>
Date: Sun, 5 Oct 2025 18:47:34 +0300
From: Jarkko Sakkinen <jarkko@...nel.org>
To: Linus Torvalds <torvalds@...ux-foundation.org>
Cc: Peter Huewe <peterhuewe@....de>, Jason Gunthorpe <jgg@...pe.ca>,
David Howells <dhowells@...hat.com>, keyrings@...r.kernel.org,
linux-integrity@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: [GIT PULL] TPM DEVICE DRIVER: tpmdd-next-v6.18
The following changes since commit 6093a688a07da07808f0122f9aa2a3eed250d853:
Merge tag 'char-misc-6.18-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/gregkh/char-misc (2025-10-04 16:26:32 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/jarkko/linux-tpmdd.git tags/tpmdd-next-v6.18
for you to fetch changes up to 642688ae78cf7c6ede28db7884b09c0d242496cb:
tpm: Require O_EXCL for exclusive /dev/tpm access (2025-10-05 18:36:48 +0300)
----------------------------------------------------------------
Hi,
and apologies for this late pull request. This pull request disables
TCG_TPM2_HMAC from the default configuration as it does not perform well
enough [1].
During the next release cycle I'll prepare gradual improvements to the
aforementioned feature. I delayed my PR because I wanted to consider
whether to include some of them already for 6.18. The end resolution
is that it is better to fully address the feature during the release
cycle and postpone improvements to 6.19.
BR, Jarkko
[1] https://lore.kernel.org/linux-integrity/20250825203223.629515-1-jarkko@kernel.org/
----------------------------------------------------------------
Denis Aleksandrov (1):
tpm: Prevent local DOS via tpm/tpm0/ppi/*operations
Eric Biggers (2):
tpm: Compare HMAC values in constant time
tpm: Use HMAC-SHA256 library instead of open-coded HMAC
Gunnar Kudrjavets (1):
tpm_tis: Fix incorrect arguments in tpm_tis_probe_irq_single
Jarkko Sakkinen (2):
tpm: Disable TPM2_TCG_HMAC by default
tpm: use a map for tpm2_calc_ordinal_duration()
Jonathan McDowell (4):
tpm: Ensure exclusive userspace access when using /dev/tpm<n>
tpm: Remove tpm_find_get_ops
tpm: Allow for exclusive TPM access when using /dev/tpm<n>
tpm: Require O_EXCL for exclusive /dev/tpm access
drivers/char/tpm/Kconfig | 3 +-
drivers/char/tpm/tpm-chip.c | 90 +++++++++++++--------------
drivers/char/tpm/tpm-dev-common.c | 8 +--
drivers/char/tpm/tpm-dev.c | 27 ++++++--
drivers/char/tpm/tpm-dev.h | 1 +
drivers/char/tpm/tpm-interface.c | 22 +++++--
drivers/char/tpm/tpm.h | 5 +-
drivers/char/tpm/tpm2-cmd.c | 127 ++++++++++----------------------------
drivers/char/tpm/tpm2-sessions.c | 104 +++++++++----------------------
drivers/char/tpm/tpm2-space.c | 5 +-
drivers/char/tpm/tpm_ppi.c | 89 +++++++++++++++++++-------
drivers/char/tpm/tpm_tis_core.c | 7 +--
drivers/char/tpm/tpmrm-dev.c | 20 +++++-
include/linux/tpm.h | 8 ++-
14 files changed, 249 insertions(+), 267 deletions(-)
Powered by blists - more mailing lists