[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20160214032712.GA3586@intel.com>
Date: Sun, 14 Feb 2016 05:27:12 +0200
From: Jarkko Sakkinen <jarkko.sakkinen@...ux.intel.com>
To: Jason Gunthorpe <jgunthorpe@...idianresearch.com>
Cc: David Howells <dhowells@...hat.com>,
Peter Huewe <peterhuewe@....de>,
tpmdd-devel@...ts.sourceforge.net,
Marcel Selhorst <tpmdd@...horst.net>,
linux-kernel@...r.kernel.org, jmorris@...ei.org
Subject: Re: [PATCH v2 0/4] tpm: last minute critical fixes for Linux 4.5
On Sat, Feb 13, 2016 at 02:55:56PM -0700, Jason Gunthorpe wrote:
> Hi Peter,
>
> Please don't grab my patch in this pull, it is broken.
Please send an updated fix. I'll check it through and include it to the
final pull request.
> Thanks
> Jason
/Jarkko
>
> On Feb 13, 2016 6:47 AM, Jarkko Sakkinen <jarkko.sakkinen@...ux.intel.com> wrote:
> >
> > These are critical to get to Linux 4.5 in order to get the chip refcount
> > management stabilized and API/ABI for policy based sealing correct.
> >
> > Harald Hoyer (1):
> > tpm_eventlog.c: fix binary_bios_measurements
> >
> > Jarkko Sakkinen (2):
> > tpm: fix: keep auth session intact after unseal operation
> > tpm: fix: rollback when devm_add_action() fails
> >
> > Jason Gunthorpe (1):
> > tpm: Hold the kref during tpm_chip_find_get
> >
> > drivers/char/tpm/tpm-chip.c | 9 ++++++++-
> > drivers/char/tpm/tpm.h | 1 +
> > drivers/char/tpm/tpm2-cmd.c | 10 +++++++---
> > drivers/char/tpm/tpm_eventlog.c | 10 ++++++++--
> > 4 files changed, 24 insertions(+), 6 deletions(-)
> >
> > --
> > 2.7.0
> >
Powered by blists - more mailing lists