lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <YhLKTjuGnIIA8FAd@iki.fi> Date: Mon, 21 Feb 2022 00:10:06 +0100 From: Jarkko Sakkinen <jarkko@...nel.org> To: Ahmad Fatoum <a.fatoum@...gutronix.de> Cc: Tong Zhang <ztong0001@...il.com>, James Bottomley <jejb@...ux.ibm.com>, Mimi Zohar <zohar@...ux.ibm.com>, David Howells <dhowells@...hat.com>, James Morris <jmorris@...ei.org>, "Serge E. Hallyn" <serge@...lyn.com>, Sumit Garg <sumit.garg@...aro.org>, linux-integrity@...r.kernel.org, keyrings@...r.kernel.org, linux-security-module@...r.kernel.org, linux-kernel@...r.kernel.org, Andreas Rammhold <andreas@...mhold.de> Subject: Re: [PATCH] KEYS: trusted: fix crash when TPM/TEE are built as module On Sun, Feb 06, 2022 at 11:36:48AM +0100, Ahmad Fatoum wrote: > Hello Tong, > > On 04.02.22 21:03, Tong Zhang wrote: > > when TCG_TPM and TEE are built as module, trusted_key_sources will be an > > empty array, loading it won't do what it is supposed to do and unloading > > it will cause kernel crash. > > Jarkko reported picking up an equivalent fix two months ago: > https://lkml.kernel.org/keyrings/YadRAWbl2aiapf8l@iki.fi/ > > But it seems to have never made it to Linus. Sorry, was not done purposely. I pushed the original fix. BR, Jarkko
Powered by blists - more mailing lists