[GIT PULL] TPM DEVICE DRIVER: tpmdd-next-6.15-rc1

From: Jarkko Sakkinen
Date: Thu Mar 27 2025 - 11:38:33 EST


The following changes since commit 1a9239bb4253f9076b5b4b2a1a4e8d7defd77a95:

Merge tag 'net-next-6.15' of git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net-next (2025-03-26 21:48:21 -0700)

are available in the Git repository at:

git://git.kernel.org/pub/scm/linux/kernel/git/jarkko/linux-tpmdd.git tags/tpmdd-next-6.15-rc1

for you to fetch changes up to 980a573621ea4b5032123937df0115bdbec6b2de:

tpm: Make chip->{status,cancel,req_canceled} opt (2025-03-27 17:10:43 +0200)

----------------------------------------------------------------
Hi,

This PR contains a new driver: TPM FF-A driver. FF comes from Firmware
Framework, and A comes from Arm's A-profile [1]. FF-A is essentially
a standard mechanism to communicate with TrustZone apps such as TPM.

Other than that, the PR includes a pile of fixes and small improvments.

BR, Jarkko

----------------------------------------------------------------
Arnd Bergmann (1):
tpm: ftpm_tee: remove incorrect of_match_ptr annotation

Jarkko Sakkinen (1):
tpm: Make chip->{status,cancel,req_canceled} opt

Jonathan McDowell (5):
tpm: Lazily flush auth session when getting random data
tpm: Convert warn to dbg in tpm2_start_auth_session()
tpm, tpm_tis: Fix timeout handling when waiting for TPM status
tpm, tpm_tis: Workaround failed command reception on Infineon devices
tpm: End any active auth session before shutdown

Stefano Garzarella (1):
tpm/tpm_ftpm_tee: fix struct ftpm_tee_private documentation

Stuart Yoder (5):
tpm_crb: ffa_tpm: Implement driver compliant to CRB over FF-A
tpm_crb: Clean-up and refactor check for idle support
ACPICA: Add start method for ARM FF-A
tpm_crb: Add support for the ARM FF-A start method
Documentation: tpm: Add documentation for the CRB FF-A interface

Thadeu Lima de Souza Cascardo (1):
tpm: do not start chip while suspended

WangYuli (1):
MAINTAINERS: TPM DEVICE DRIVER: add missing includes

Documentation/security/tpm/index.rst | 1 +
Documentation/security/tpm/tpm_ffa_crb.rst | 65 ++++++
MAINTAINERS | 2 +
drivers/char/tpm/Kconfig | 9 +
drivers/char/tpm/Makefile | 1 +
drivers/char/tpm/tpm-chip.c | 6 +
drivers/char/tpm/tpm-interface.c | 37 ++-
drivers/char/tpm/tpm2-cmd.c | 1 -
drivers/char/tpm/tpm2-sessions.c | 2 +-
drivers/char/tpm/tpm_crb.c | 105 +++++++--
drivers/char/tpm/tpm_crb_ffa.c | 348 +++++++++++++++++++++++++++++
drivers/char/tpm/tpm_crb_ffa.h | 25 +++
drivers/char/tpm/tpm_ftpm_tee.c | 22 +-
drivers/char/tpm/tpm_ftpm_tee.h | 1 -
drivers/char/tpm/tpm_tis_core.c | 20 +-
drivers/char/tpm/tpm_tis_core.h | 1 +
include/acpi/actbl3.h | 1 +
include/linux/tpm.h | 1 +
18 files changed, 590 insertions(+), 58 deletions(-)
create mode 100644 Documentation/security/tpm/tpm_ffa_crb.rst
create mode 100644 drivers/char/tpm/tpm_crb_ffa.c
create mode 100644 drivers/char/tpm/tpm_crb_ffa.h