https://bugzilla.kernel.org/show_bug.cgi?id=217804#c41
From 6.4.9 onwards, TPM is broken as is LTS 6.1.46. A step downgrade from these versions restores TPM.
Good. TPM firmware is a high-value attack surface that, if penetrated, gives the attacker complete and irreversible control over the entire machine. It’s also proprietary code and only receives security updates for a small fraction of its service life, so it’s most likely riddled with vulnerabilities. It should be disabled, as much as possible, if you at all value the security of your system.
This shit again… I moved to LTS kernel exactly because of this bug and now it reached LTS kernel as well…
What’s a good usecase for TPM in Linux?
You can’t trust any full disk encryption without it because only a TPM can verify that your bootloader and initrd are not compromised.