summaryrefslogtreecommitdiff
path: root/include/linux/pci-epc.h
diff options
context:
space:
mode:
authorLinus Torvalds <torvalds@linux-foundation.org>2024-05-21 10:04:02 -0700
committerLinus Torvalds <torvalds@linux-foundation.org>2024-05-21 10:04:02 -0700
commitfa8151cabfaa4166feeb6e8a4df428d7c3d9fecd (patch)
tree24703a13d6e95e89bfbe43aa6f227ab5239013ef /include/linux/pci-epc.h
parent38da32ee70b876f5b8bea7c4135eff46339c18f2 (diff)
parent050bf3c793a07f96bd1e2fd62e1447f731ed733b (diff)
Merge tag 'keys-trusted-next-6.10-rc1-part2' of git://git.kernel.org/pub/scm/linux/kernel/git/jarkko/linux-tpmdd
Pull trusted keys fixes from Jarkko Sakkinen: "These are two bugs I found from trusted keys while working on a new RSA key type for TPM2. Both originate form v5.13. The memory leak is more crucial but I don't think it is either good idea if kernel throws WARN when ASN.1 parser fails, even if it is related to programming error, as it is not that mature code yet. There's at least two WARN's in that code but I picked just the one more likely to trigger. Planning to fix the other one too over time" * tag 'keys-trusted-next-6.10-rc1-part2' of git://git.kernel.org/pub/scm/linux/kernel/git/jarkko/linux-tpmdd: KEYS: trusted: Do not use WARN when encode fails KEYS: trusted: Fix memory leak in tpm2_key_encode()
Diffstat (limited to 'include/linux/pci-epc.h')
0 files changed, 0 insertions, 0 deletions