[PATCH v3] KEYS: trusted: allow trusted.ko to initialize w/o a TPM

Jarkko Sakkinen jarkko.sakkinen at linux.intel.com
Thu Mar 28 12:27:57 UTC 2019


On Wed, Mar 27, 2019 at 10:15:50AM -0700, Dan Williams wrote:
> On Tue, Mar 26, 2019 at 5:13 AM Jarkko Sakkinen
> <jarkko.sakkinen at linux.intel.com> wrote:
> >
> > Allow trusted.ko to initialize w/o a TPM. This commit adds checks to the
> > key type callbacks and exported functions to fail when a TPM is not
> > available.
> >
> > Cc: James Morris <jmorris at namei.org>
> > Reported-by: Dan Williams <dan.j.williams at intel.com>
> > Tested-by: Dan Williams <dan.j.williams at intel.com>
> > Fixes: 240730437deb ("KEYS: trusted: explicitly use tpm_chip structure...")
> > Signed-off-by: Jarkko Sakkinen <jarkko.sakkinen at linux.intel.com>
> > ---
> > v3:
> > - remove unnecessary check for chip in init_trusted()
> 
> v3 also tests ok here.

Thank you.

/Jarkko



More information about the Linux-security-module-archive mailing list