[PR #6724] [MERGED] modif: keep tcm/tcmrm devices if keep-dev-tpm is used #6141

Closed
opened 2026-05-05 10:51:29 -06:00 by gitea-mirror · 0 comments
Owner

📋 Pull Request Information

Original PR: https://github.com/netblue30/firejail/pull/6724
Author: @kmk3
Created: 4/29/2025
Status: Merged
Merged: 4/30/2025
Merged by: @netblue30

Base: masterHead: modif-keep-tcm


📝 Commits (1)

  • b54981b modif: keep tcm/tcmrm devices if keep-dev-tpm is used

📊 Changes

3 files changed (+16 additions, -2 deletions)

View changed files

📝 src/firejail/fs_dev.c (+2 -0)
📝 src/man/firejail-profile.5.in (+1 -1)
📝 src/man/firejail.1.in (+13 -1)

📄 Description

Paths:

  • /dev/tcm[0-9]*
  • /dev/tcmrm[0-9]*

Apparently Trusted Cryptography Module (TCM) is a standard from China
that is an alternative to the TCG Trusted Compute Module (TPM)
standard[1].

udev rules from tpm2-tss master[2]:

# tpm devices can only be accessed by the tss user but the tss
# group members can access tpmrm devices
KERNEL=="tpm[0-9]*", TAG+="systemd", MODE="0660", OWNER="tss"
KERNEL=="tpmrm[0-9]*", TAG+="systemd", MODE="0660", GROUP="tss"
KERNEL=="tcm[0-9]*", TAG+="systemd", MODE="0660", OWNER="tss"
KERNEL=="tcmrm[0-9]*", TAG+="systemd", MODE="0660", GROUP="tss"

This is a follow-up to #6719.

Relates to #6390.

Misc: This was noticed on #6700.


🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.

## 📋 Pull Request Information **Original PR:** https://github.com/netblue30/firejail/pull/6724 **Author:** [@kmk3](https://github.com/kmk3) **Created:** 4/29/2025 **Status:** ✅ Merged **Merged:** 4/30/2025 **Merged by:** [@netblue30](https://github.com/netblue30) **Base:** `master` ← **Head:** `modif-keep-tcm` --- ### 📝 Commits (1) - [`b54981b`](https://github.com/netblue30/firejail/commit/b54981bad8ab4c4f5d1b1ee5fea8d81df58435f3) modif: keep tcm/tcmrm devices if keep-dev-tpm is used ### 📊 Changes **3 files changed** (+16 additions, -2 deletions) <details> <summary>View changed files</summary> 📝 `src/firejail/fs_dev.c` (+2 -0) 📝 `src/man/firejail-profile.5.in` (+1 -1) 📝 `src/man/firejail.1.in` (+13 -1) </details> ### 📄 Description Paths: * `/dev/tcm[0-9]*` * `/dev/tcmrm[0-9]*` Apparently Trusted Cryptography Module (TCM) is a standard from China that is an alternative to the TCG Trusted Compute Module (TPM) standard[1]. udev rules from tpm2-tss master[2]: # tpm devices can only be accessed by the tss user but the tss # group members can access tpmrm devices KERNEL=="tpm[0-9]*", TAG+="systemd", MODE="0660", OWNER="tss" KERNEL=="tpmrm[0-9]*", TAG+="systemd", MODE="0660", GROUP="tss" KERNEL=="tcm[0-9]*", TAG+="systemd", MODE="0660", OWNER="tss" KERNEL=="tcmrm[0-9]*", TAG+="systemd", MODE="0660", GROUP="tss" This is a follow-up to #6719. Relates to #6390. Misc: This was noticed on #6700. --- <sub>🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.</sub>
gitea-mirror 2026-05-05 10:51:29 -06:00
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: github-starred/firejail#6141
No description provided.