Cc: David Howells <[email protected]> 
Cc: James Bottomley <[email protected]>
Cc: Mimi Zohar <[email protected]>
Cc: Roberto Sassu <[email protected]>
Cc: Stefan Berger <[email protected]>
Cc: [email protected]
Cc: [email protected]
Closes: https://bugzilla.kernel.org/show_bug.cgi?id=219229

v6:
https://lore.kernel.org/linux-integrity/[email protected]/T/#t
v5:
https://lore.kernel.org/linux-integrity/[email protected]/T/#m527d0466a02abaa448720999ff055de0540e7bb7
v4:
https://lore.kernel.org/linux-integrity/[email protected]/
v3:
https://lore.kernel.org/linux-integrity/[email protected]/
v2:
https://lore.kernel.org/linux-integrity/[email protected]/
v1:
https://lore.kernel.org/linux-integrity/[email protected]/

Jarkko Sakkinen (5):
  tpm: Return on tpm2_create_null_primary() failure
  tpm: Implement tpm2_load_null() rollback
  tpm: flush the null key only when /dev/tpm0 is accessed
  tpm: Allocate chip->auth in tpm2_start_auth_session()
  tpm: flush the auth session only when /dev/tpm0 is open

 drivers/char/tpm/tpm-chip.c       |  14 ++++
 drivers/char/tpm/tpm-dev-common.c |   8 +++
 drivers/char/tpm/tpm-interface.c  |  10 ++-
 drivers/char/tpm/tpm2-cmd.c       |   3 +
 drivers/char/tpm/tpm2-sessions.c  | 115 +++++++++++++++++++-----------
 include/linux/tpm.h               |   2 +
 6 files changed, 108 insertions(+), 44 deletions(-)

-- 
2.47.0


Reply via email to