[PATCH] KEYS: trusted: allow trusted.ko to initialize w/o a TPM

Jarkko Sakkinen jarkko.sakkinen at linux.intel.com
Tue Mar 26 11:52:49 UTC 2019

On Mon, Mar 25, 2019 at 04:47:35PM +0200, Jarkko Sakkinen wrote:
> Allow trusted.ko to initialize w/o a TPM. This commit adds checks to the
> key type callbacks and exported functions to fail when a TPM is not
> available.
> Cc: Dan Williams <dan.j.williams at intel.com>
> Cc: stable at vger.kernel.org
> Fixes: 240730437deb ("KEYS: trusted: explicitly use tpm_chip structure...")
> Signed-off-by: Jarkko Sakkinen <jarkko.sakkinen at linux.intel.com>

Will send a revised version: since now the key type is not registered,
none of the callbacks needs the check for the chip instance. Only the
exported functions should have it.


More information about the Linux-security-module-archive mailing list