[GIT PULL] TPM DEVICE DRIVER: tpmdd-next-6.15-rc1
From: Jarkko Sakkinen
Date: Thu Mar 27 2025 - 11:38:33 EST
The following changes since commit 1a9239bb4253f9076b5b4b2a1a4e8d7defd77a95:
Merge tag 'net-next-6.15' of git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net-next (2025-03-26 21:48:21 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/jarkko/linux-tpmdd.git tags/tpmdd-next-6.15-rc1
for you to fetch changes up to 980a573621ea4b5032123937df0115bdbec6b2de:
tpm: Make chip->{status,cancel,req_canceled} opt (2025-03-27 17:10:43 +0200)
----------------------------------------------------------------
Hi,
This PR contains a new driver: TPM FF-A driver. FF comes from Firmware
Framework, and A comes from Arm's A-profile [1]. FF-A is essentially
a standard mechanism to communicate with TrustZone apps such as TPM.
Other than that, the PR includes a pile of fixes and small improvments.
BR, Jarkko
----------------------------------------------------------------
Arnd Bergmann (1):
tpm: ftpm_tee: remove incorrect of_match_ptr annotation
Jarkko Sakkinen (1):
tpm: Make chip->{status,cancel,req_canceled} opt
Jonathan McDowell (5):
tpm: Lazily flush auth session when getting random data
tpm: Convert warn to dbg in tpm2_start_auth_session()
tpm, tpm_tis: Fix timeout handling when waiting for TPM status
tpm, tpm_tis: Workaround failed command reception on Infineon devices
tpm: End any active auth session before shutdown
Stefano Garzarella (1):
tpm/tpm_ftpm_tee: fix struct ftpm_tee_private documentation
Stuart Yoder (5):
tpm_crb: ffa_tpm: Implement driver compliant to CRB over FF-A
tpm_crb: Clean-up and refactor check for idle support
ACPICA: Add start method for ARM FF-A
tpm_crb: Add support for the ARM FF-A start method
Documentation: tpm: Add documentation for the CRB FF-A interface
Thadeu Lima de Souza Cascardo (1):
tpm: do not start chip while suspended
WangYuli (1):
MAINTAINERS: TPM DEVICE DRIVER: add missing includes
Documentation/security/tpm/index.rst | 1 +
Documentation/security/tpm/tpm_ffa_crb.rst | 65 ++++++
MAINTAINERS | 2 +
drivers/char/tpm/Kconfig | 9 +
drivers/char/tpm/Makefile | 1 +
drivers/char/tpm/tpm-chip.c | 6 +
drivers/char/tpm/tpm-interface.c | 37 ++-
drivers/char/tpm/tpm2-cmd.c | 1 -
drivers/char/tpm/tpm2-sessions.c | 2 +-
drivers/char/tpm/tpm_crb.c | 105 +++++++--
drivers/char/tpm/tpm_crb_ffa.c | 348 +++++++++++++++++++++++++++++
drivers/char/tpm/tpm_crb_ffa.h | 25 +++
drivers/char/tpm/tpm_ftpm_tee.c | 22 +-
drivers/char/tpm/tpm_ftpm_tee.h | 1 -
drivers/char/tpm/tpm_tis_core.c | 20 +-
drivers/char/tpm/tpm_tis_core.h | 1 +
include/acpi/actbl3.h | 1 +
include/linux/tpm.h | 1 +
18 files changed, 590 insertions(+), 58 deletions(-)
create mode 100644 Documentation/security/tpm/tpm_ffa_crb.rst
create mode 100644 drivers/char/tpm/tpm_crb_ffa.c
create mode 100644 drivers/char/tpm/tpm_crb_ffa.h