[PATCH] KEYS: trusted: allow trusted.ko to initialize w/o a TPM

Jarkko Sakkinen jarkko.sakkinen at linux.intel.com
Tue Mar 26 11:52:49 UTC 2019


On Mon, Mar 25, 2019 at 04:47:35PM +0200, Jarkko Sakkinen wrote:
> Allow trusted.ko to initialize w/o a TPM. This commit adds checks to the
> key type callbacks and exported functions to fail when a TPM is not
> available.
> 
> Cc: Dan Williams <dan.j.williams at intel.com>
> Cc: stable at vger.kernel.org
> Fixes: 240730437deb ("KEYS: trusted: explicitly use tpm_chip structure...")
> Signed-off-by: Jarkko Sakkinen <jarkko.sakkinen at linux.intel.com>

Will send a revised version: since now the key type is not registered,
none of the callbacks needs the check for the chip instance. Only the
exported functions should have it.

/Jarkko



More information about the Linux-security-module-archive mailing list