.
Fixes: a74f8b36352e (tpm: introduce tpm_buf)
Signed-off-by: James Bottomley
---
Reviewed-by: Jerry Snitselaar
&chip->dev, 4, nr_commands,
GFP_KERNEL);
+ if (!chip->cc_attrs_tbl) {
+ rc = -ENOMEM;
+ goto out;
+ }
rc = tpm_buf_init(&buf, TPM2_ST_NO_SESSIONS, TPM2_CC_GET_CAPABILITY);
if (rc)
Reviewed-by: Jerry Snitselaar
files changed, 31 insertions(+), 36 deletions(-)
--
2.23.0.581.g78d2f28ef7-goog
___
iommu mailing list
io...@lists.linux-foundation.org
https://lists.linuxfoundation.org/mailman/listinfo/iommu
Reviewed-by: Jerry Snitselaar
On Fri Oct 04 19, James Bottomley wrote:
On Fri, 2019-10-04 at 13:37 -0400, Mimi Zohar wrote:
On Fri, 2019-10-04 at 09:37 -0700, James Bottomley wrote:
> On Thu, 2019-10-03 at 21:51 +0300, Jarkko Sakkinen wrote:
> > As has been seen recently, binding the buffer allocation and
> > tpm_buf
> > tog
On Fri Oct 04 19, Jerry Snitselaar wrote:
On Fri Oct 04 19, James Bottomley wrote:
On Fri, 2019-10-04 at 11:33 -0700, Jerry Snitselaar wrote:
On Fri Oct 04 19, James Bottomley wrote:
On Fri, 2019-10-04 at 21:22 +0300, Jarkko Sakkinen wrote:
> On Thu, Oct 03, 2019 at 04:59:37PM -0700, Ja
On Wed Apr 29 20, Arnd Bergmann wrote:
Building with gcc-10 causes a harmless warning about a section mismatch:
WARNING: modpost: vmlinux.o(.text.unlikely+0x5e191): Section mismatch in
reference from the function tpm2_calc_event_log_size() to the function
.init.text:early_memunmap()
The functi
On Thu Apr 30 20, Ard Biesheuvel wrote:
On Thu, 30 Apr 2020 at 23:21, Arnd Bergmann wrote:
On Thu, Apr 30, 2020 at 11:15 PM Jerry Snitselaar wrote:
>
> On Wed Apr 29 20, Arnd Bergmann wrote:
> >Building with gcc-10 causes a harmless warning about a section mismatch:
> >
&
On Fri Oct 11 19, Jarkko Sakkinen wrote:
On Mon, Oct 07, 2019 at 10:55:31AM +0530, Sumit Garg wrote:
This patch-set does restructuring of trusted keys code to create and
consolidate trusted keys subsystem.
Also, patch #2 replaces tpm1_buf code used in security/keys/trusted.c and
crypto/asymmert
On Wed Oct 16 19, Qian Cai wrote:
After the commit 754265bcab78 ("iommu/amd: Fix race in
increase_address_space()"), it could still possible trigger a race
condition under some heavy memory pressure below. The race to trigger a
warning is,
CPU0: CPU1:
in alloc_pte():
On Fri Oct 18 19, Joerg Roedel wrote:
On Thu, Oct 17, 2019 at 07:36:51AM -0400, Qian Cai wrote:
> On Oct 16, 2019, at 6:59 PM, Jerry Snitselaar wrote:
>
> I guess the mode level 6 check is really for other potential callers
> increase_address_space, none exist at the mom
I've seen requests to add linux-security-module to tpm patch
submissions a couple of times recently, so just add the list
to MAINTAINERS so get_maintainers.pl will mention it.
Cc: Peter Huewe
Cc: Jarkko Sakkinen
Cc: Jason Gunthorpe
Signed-off-by: Jerry Snitselaar
---
MAINTAINERS | 1
On Wed Feb 20 19, Jarkko Sakkinen wrote:
On Tue, Feb 19, 2019 at 08:58:46PM -0700, Jerry Snitselaar wrote:
I've seen requests to add linux-security-module to tpm patch
submissions a couple of times recently, so just add the list
to MAINTAINERS so get_maintainers.pl will mention it.
Cc:
On Thu Feb 21 19, James Morris wrote:
On Wed, 20 Feb 2019, Jarkko Sakkinen wrote:
> being cc'd to linux-security-module? Looking back at
> recent patches, it looked like it was a general request.
> If it is, I'll be more likely to remember if get_maintainers.pl
> brings it up. :)
I'm all open
On Thu Feb 07 19, Sasha Levin wrote:
Hi,
[This is an automated email]
This commit has been processed because it contains a "Fixes:" tag,
fixing commit: 30fc8d138e91 tpm: TPM 2.0 CRB Interface.
The bot has tested the following trees: v4.20.6, v4.19.19, v4.14.97, v4.9.154,
v4.4.172.
v4.20.6: B
tpm_vtpm_proxy a locality change requires a virtual
TPM command (a command made up just for that driver).
The consequence of this is that this commit removes the remaining nested
calls.
Signed-off-by: Jarkko Sakkinen
Reviewed-by: Stefan Berger
Tested-by: Stefan Berger
Reviewed-by: Jerry
On Fri Feb 08 19, Jarkko Sakkinen wrote:
The send() callback should never return length as it does not in every
driver except tpm_crb in the success case. The reason is that the main
transmit functionality only cares about whether the transmit was
successful or not and ignores the count completel
On Sat, Feb 9, 2019 at 11:20 AM Jerry Snitselaar wrote:
>
> On Fri Feb 08 19, Jarkko Sakkinen wrote:
> >The send() callback should never return length as it does not in every
> >driver except tpm_crb in the success case. The reason is that the main
> >transmit functi
+-
drivers/char/tpm/tpm_nsc.c | 2 +-
drivers/char/tpm/tpm_tis_core.c | 2 +-
drivers/char/tpm/tpm_vtpm_proxy.c| 3 +--
drivers/char/tpm/xen-tpmfront.c | 2 +-
11 files changed, 22 insertions(+), 15 deletions(-)
--
2.19.1
Reviewed-by: Jerry Snitselaar
Since there are multiple possible failures in iommu_map_page
it would be useful to know which case is being hit when the
error message is printed in map_sg. While here, fix up checkpatch
complaint about using function name in a string instead of
__func__.
Cc: Joerg Roedel
Signed-off-by: Jerry
TPM2_RC_TESTING is the return code.
Cc: Peter Huewe
Cc: Jarkko Sakkinen
Cc: Jason Gunthorpe
Signed-off-by: Jerry Snitselaar
---
drivers/char/tpm/tpm-interface.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/drivers/char/tpm/tpm-interface.c b/drivers/char/tpm/tpm-interface.c
index
In the error path of map_sg, free_iova_fast is being called with
address instead of the pfn. This results in a bad value getting into
the rcache, and can result in hitting a BUG_ON when
iova_magazine_free_pfns is called.
Cc: Joerg Roedel
Cc: Suravee Suthikulpanit
Signed-off-by: Jerry Snitselaar
out_unmap:
pr_err("%s: IOMMU mapping error in map_sg (io-pages: %d)\n",
dev_name(dev), npages);
for_each_sg(sglist, s, nelems, i) {
int j, pages = iommu_num_pages(sg_phys(s), s->length,
PAGE_SIZE);
for (j = 0; j < pages; ++
On Thu Jan 17 19, Jerry Snitselaar wrote:
In the error path of map_sg, free_iova_fast is being called with
address instead of the pfn. This results in a bad value getting into
the rcache, and can result in hitting a BUG_ON when
iova_magazine_free_pfns is called.
Cc: Joerg Roedel
Cc: Suravee
page.
Fix the condition, so it breaks out of the loop only after
all the mapped pages have been unmapped.
Fixes: 80187fd39dcb ("iommu/amd: Optimize map_sg and unmap_sg")
Cc: Joerg Roedel
Signed-off-by: Jerry Snitselaar
---
drivers/iommu/amd_iommu.c | 2 +-
1 file changed, 1 insertion(+),
.
Cc: sta...@vger.kernel.org
Cc: Linus Torvalds
Cc: James Morris
Cc: Tomas Winkler
Cc: Jerry Snitselaar
Fixes: 30fc8d138e91 ("tpm: TPM 2.0 CRB Interface")
Signed-off-by: Jarkko Sakkinen
---
drivers/char/tpm/tpm_crb.c | 8
1 file changed, 4 insertions(+), 4 deletions(-)
diff --git a/driver
Sakkinen
Cc: Peter Huewe
Cc: Jason Gunthorpe
Reported-by: Laurent Bigonville
Signed-off-by: Jerry Snitselaar
---
drivers/char/tpm/tpm_tis_core.c | 47 -
1 file changed, 46 insertions(+), 1 deletion(-)
diff --git a/drivers/char/tpm/tpm_tis_core.c b/drivers
On Sat May 05 18, Jerry Snitselaar wrote:
For certain tpm chips releasing locality can take long enough that a
subsequent call to request_locality will see the locality as being
active when the access register is read in check_locality. So check
that the locality has been released before
On Mon Apr 16 18, Jacob Pan wrote:
From: "Liu, Yi L"
When an SVM capable device is assigned to a guest, the first level page
tables are owned by the guest and the guest PASID table pointer is
linked to the device context entry of the physical IOMMU.
Host IOMMU driver has no knowledge of cachin
Should the ima Kconfig have a select line for tpm_crb similar to the tpm_tis
and tpm_ibmvtpm bits?
Jarkko Sakkinen @ 2017-03-16 11:55 GMT:
> On Wed, Mar 15, 2017 at 08:27:54PM -0700, Jerry Snitselaar wrote:
>>
>> Jerry Snitselaar @ 2017-03-16 02:38 GMT:
>>
>> > Jarkko Sakkinen @ 2017-03-15 05:57 GMT:
>> >
>> >> From: Jarkko Sakkinen
>
Since check_locality is checking to see if a certain
locality is active, return true if active otherwise
return false.
Cc: Christophe Ricard
Cc: Jason Gunthorpe
Cc: Marcel Selhorst
Cc: Jarkko Sakkinen
Cc: Peter Huewe
Signed-off-by: Jerry Snitselaar
---
Tested tpm_tis, but don't hav
sure that the driver
> will work properly with Intel TXT that uses locality 2. There's no
> explicit guarantee that it would relinquish this locality. In more
> general sense this commit enables tpm_crb to be a well behaving
> citizen in a multi locality environment.
>
> Signe
Jarkko Sakkinen @ 2017-03-24 10:19 GMT:
> On Fri, Mar 24, 2017 at 12:10:30PM +0200, Jarkko Sakkinen wrote:
>> This commit adds support for requesting and relinquishing locality 0 in
>> tpm_crb for the course of command transmission.
>>
>> In order to achieve this, two new callbacks are added to
request_locality prior to tpm_tis_send_data
calls. Also drop release_locality call in middleof probe_itpm, and
keep locality until release_locality called at end of probe_itpm.
Cc: Peter Huewe
Cc: Jarkko Sakkinen
Cc: Jason Gunthorpe
Cc: Marcel Selhorst
Signed-off-by: Jerry Snitselaar
This is an attempt to convert tpm_tis over to using the locality
callbacks added by Jarkko's tpm_crb patch. Requires the patch
currently on tpmdd/locality which has moved the need_locality
assignment inside the mutex in tpm_transmit.
This is pretty much the same as Jarkko's earlier patch (I think)
- Original Message -
> From: "Jarkko Sakkinen"
> To: "Jerry Snitselaar" , "gang wei"
> Cc: "Jarkko Sakkinen" ,
> tpmdd-de...@lists.sourceforge.net,
> linux-security-mod...@vger.kernel.org, "Peter Huewe" ,
> &quo
- Original Message -
> From: "Jason Gunthorpe"
> To: "Jerry Snitselaar"
> Cc: tpmdd-de...@lists.sourceforge.net, linux-kernel@vger.kernel.org, "Peter
> Huewe" , "Jarkko
> Sakkinen" , "Marcel Selhorst"
>
> Sent: S
Jarkko Sakkinen @ 2017-03-26 19:51 GMT:
> WTF, I applied old patch version by mistake. Sorry about that and
> thanks for spotting that out. Better?
>
> /Jarkko
Looks good now.
request_locality prior to tpm_tis_send_data
calls. Also drop release_locality call in middleof probe_itpm, and
keep locality until release_locality called at end of probe_itpm.
Cc: Peter Huewe
Cc: Jarkko Sakkinen
Cc: Jason Gunthorpe
Cc: Marcel Selhorst
Signed-off-by: Jerry Snitselaar
---
v2
Jarkko Sakkinen @ 2017-03-15 05:57 GMT:
> From: Jarkko Sakkinen
>
> This commit adds support for requesting and relinquishing locality 0 in
> tpm_crb for the course of command transmission.
>
> In order to achieve this, two new callbacks are added to struct
> tpm_class_ops:
>
> - request_localit
Jerry Snitselaar @ 2017-03-16 02:38 GMT:
> Jarkko Sakkinen @ 2017-03-15 05:57 GMT:
>
>> From: Jarkko Sakkinen
>>
>> This commit adds support for requesting and relinquishing locality 0 in
>> tpm_crb for the course of command transmission.
>>
>> In or
Make sure size of response buffer is at least 6 bytes, or
we will underflow and pass large size_t to memcpy_fromio().
This was encountered while testing earlier version of
locality patchset.
Fixes: 30fc8d138e912 ("tpm: TPM 2.0 CRB Interface")
Signed-off-by: Jerry Snitselaar
---
driver
Jarkko Sakkinen @ 2017-03-11 13:02 GMT:
> Added two new callbacks to struct tpm_class_ops:
>
> - request_locality
> - relinquish_locality
>
> These are called before sending and receiving data from the TPM. We
> update also tpm_tis_core to use these callbacks. Small modification to
> request_loc
+
> 1 file changed, 137 insertions(+), 48 deletions(-)
Reviewed-by: Jerry Snitselaar
On Sun Jun 12 16, Sudip Mukherjee wrote:
m32r allmodconfig is failng with errors like:
ERROR: "bad_dma_ops" [sound/soc/bcm/snd-soc-cygnus.ko] undefined!
On checking the code it turns out that struct bad_dma_ops has been
declared as extern but no one has actually defined struct bad_dma_ops.
Lets
Jarkko Sakkinen
Reviewed-by: Jerry Snitselaar
---
v2: Also use the new buffer size for chip->work_buffer (reported by stefanb)
drivers/char/tpm/tpm-chip.c | 9 ++---
drivers/char/tpm/tpm.h| 5 -
drivers/char/tpm/tpm2-space.c | 26 --
drivers/char/tpm
IS driver by
mistake.
Fixes: 93e1b7d42e1e ("[PATCH] tpm: add HID module parameter")
Link: https://bugzilla.kernel.org/show_bug.cgi?id=203877
Cc: Kylene Jo Hall
Reported-by: Ferry Toth:
Signed-off-by: Jarkko Sakkinen
Reviewed-by: Jerry Snitselaar
On Fri Jun 26 20, Jarkko Sakkinen wrote:
On Wed, Jun 24, 2020 at 11:21:50PM -0700, Jerry Snitselaar wrote:
On Thu Jun 25 20, Jarkko Sakkinen wrote:
> Acer C720 running Linux v5.3 reports this in klog:
>
> tpm_tis: 1.2 TPM (device-id 0xB, rev-id 16)
> tpm tpm0: tpm_try_transmit: send
On Thu Jun 25 20, Jarkko Sakkinen wrote:
Re-allocate context and session buffers when needed. Scale them in page
increments so that the reallocation is only seldomly required, and thus
causes minimal stress to the system. Add a static maximum limit of four
pages for buffer sizes.
Cc: James Botto
/s5p-mfc/s5p_mfc_iommu.h| 4 +++-
17 files changed, 64 insertions(+), 71 deletions(-)
--
2.27.0
Reviewed-by: Jerry Snitselaar
d-by: Alex Williamson
Signed-off-by: Lu Baolu
Reviewed-by: Jerry Snitselaar
lization, which will ensure the buffer
is allocated.
Fixes: 18b3670d79ae9 ("tpm: ibmvtpm: Add support for TPM2")
Signed-off-by: David Gibson
---
Reviewed-by: Jerry Snitselaar
Changes from v1:
* Fixed a formatting error in the commit message
* Added some more detail to the commit
Move AMD Kconfig and Makefile bits down into the amd directory
with the rest of the AMD specific files.
Cc: Joerg Roedel
Cc: Suravee Suthikulpanit
Signed-off-by: Jerry Snitselaar
---
drivers/iommu/Kconfig | 45 +-
drivers/iommu/Makefile | 5
Move Intel Kconfig and Makefile bits down into intel directory
with the rest of the Intel specific files.
Cc: Joerg Roedel
Cc: Lu Baolu
Signed-off-by: Jerry Snitselaar
---
drivers/iommu/Kconfig| 86 +---
drivers/iommu/Makefile | 8 +---
drivers
This patchset imeplements the suggestion from Linus to move the Kconfig
and Makefile bits for AMD and Intel into their respective directories.
It also cleans up a couple Kconfig entries to use the newer help
attribute instead of ---help--- (complaint from checkpatch).
Jerry Snitselaar (2
On Tue Apr 14 20, Joerg Roedel wrote:
Hi,
here is the second version of this patch-set. The first version with
some more introductory text can be found here:
https://lore.kernel.org/lkml/20200407183742.4344-1-j...@8bytes.org/
Changes v1->v2:
* Rebased to v5.7-rc1
* Re
On Tue Jun 02 20, Joerg Roedel wrote:
Hi Jerry,
On Mon, Jun 01, 2020 at 05:02:36PM -0700, Jerry Snitselaar wrote:
Yeah, that will solve the panic.
If you still see the kdump faults, can you please try with the attached
diff? I was not able to reproduce them in my setup.
Regards
On Tue Jun 02 20, Jerry Snitselaar wrote:
On Tue Jun 02 20, Joerg Roedel wrote:
Hi Jerry,
On Mon, Jun 01, 2020 at 05:02:36PM -0700, Jerry Snitselaar wrote:
Yeah, that will solve the panic.
If you still see the kdump faults, can you please try with the attached
diff? I was not able to
el-pasid.c => intel/pasid.c} (100%)
rename drivers/iommu/{intel-svm.c => intel/svm.c} (100%)
rename drivers/iommu/{intel-trace.c => intel/trace.c} (100%)
--
2.17.1
Reviewed-by: Jerry Snitselaar
On Thu Jun 04 20, Lu Baolu wrote:
Hi Joerg,
On 6/2/20 5:26 PM, Joerg Roedel wrote:
Hi,
two small patches to move the Intel and AMD IOMMU drivers into their own
subdirectory under drivers/iommu/ to make the file structure a bit less
cluttered.
Does the MAINTAINERS file need to update?
Best
Attaching a deferred device should be delayed until dma api is called.
Cc: io...@lists.linux-foundation.org
Suggested-by: Joerg Roedel
Signed-off-by: Jerry Snitselaar
---
If you already have thrown a patch together, then ignore this. Also
feel free to swap out the signed-off-by with your
When include/uapi/linux/iommu.h was created it was never
added to the file list in MAINTAINERS.
Cc: Joerg Roedel
Signed-off-by: Jerry Snitselaar
---
MAINTAINERS | 1 +
1 file changed, 1 insertion(+)
diff --git a/MAINTAINERS b/MAINTAINERS
index e1897ed32930..061648b6e393 100644
--- a
We've seen kdump failures with recent kernels (5.5, 5.6, 5.7-rc1) on
amd systems when iommu is enabled in translation mode. In the cases so
far there has been mpt3sas involved, but I'm also seeing io page
faults for ahci right before mpt3sas has an io page fault:
[ 15.156620] ahci :63:00.0:
ach_deferred(domain, dev))
+ __iommu_attach_device_no_defer(domain, dev);
+
+ return domain;
}
/*
___
iommu mailing list
io...@lists.linux-foundation.org
https://lists.linuxfoundation.org/mailman/listinfo/iommu
Yes, that works.
Tested-by: Jerry Snitselaar
t;ima: Call ima_calc_boot_aggregate() in
ima_eventdigest_init()")
Reported-by: Linus Torvalds
Signed-off-by: Roberto Sassu
Reviewed-by: Jerry Snitselaar
---
security/integrity/ima/ima_crypto.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/security/integrity/im
omley
Signed-off-by: Jerry Snitselaar
---
drivers/char/tpm/tpm_tis.c | 29 +++--
1 file changed, 27 insertions(+), 2 deletions(-)
diff --git a/drivers/char/tpm/tpm_tis.c b/drivers/char/tpm/tpm_tis.c
index 0b214963539d..4ed6e660273a 100644
--- a/drivers/char/tpm/tpm_tis.c
James should this get tacked on the end of your patchset?
Regards,
Jerry
Jerry Snitselaar @ 2020-06-30 13:06 MST:
> This patchset imeplements the suggestion from Linus to move the
> Kconfig and Makefile bits for AMD and Intel into their respective
> directories.
>
> v2: Rebase against v5.8-rc3. Dropped ---help--- changes from Kconfig as that
> wa
eter").
>
> Fixes: e918e570415c ("tpm_tis: Remove the HID IFX0102")
> Reported-by: Peter Huewe
> Signed-off-by: Jarkko Sakkinen
Reviewed-by: Jerry Snitselaar
> ---
> drivers/char/tpm/tpm_tis.c | 8
> 1 file changed, 8 insertions(+)
>
> diff --gi
sion 1.2, Revision 8
>
> https://trustedcomputinggroup.org/wp-content/uploads/TCG_ACPIGeneralSpecification_v1.20_r8.pdf
>
> Signed-off-by: Stefan Berger
> Cc: linux-a...@vger.kernel.org
> Acked-by: Rafael J. Wysocki
> Reviewed-by: Jarkko Sakkinen
Reviewed-by: Jerry Snits
s SeaBIOS, to pass an event log when using a TPM2.
>
> Signed-off-by: Stefan Berger
Reviewed-by: Jerry Snitselaar
> ---
> drivers/char/tpm/eventlog/acpi.c | 63 +---
> 1 file changed, 42 insertions(+), 21 deletions(-)
>
> diff --git a/drivers/cha
Jarkko Sakkinen @ 2020-07-06 16:09 MST:
> On Mon, Jul 06, 2020 at 02:19:53PM -0400, Stefan Berger wrote:
>> From: Stefan Berger
>>
>> In case a TPM2 is attached, search for a TPM2 ACPI table when trying
>> to get the event log from ACPI. If one is found, use it to get the
>> start and length o
Hello Joerg,
We are seeing a kdump kernel boot failure in test on an HP DL325 Gen10
and it was tracked down to 387caf0b759a ("iommu/amd: Treat per-device
exclusion ranges as r/w unity-mapped regions"). Reproduced on 5.9-rc5
and goes away with revert of the commit. There is a follow on commit
tha
On Fri Jun 26 20, Jarkko Sakkinen wrote:
On Thu, Jun 25, 2020 at 02:19:23PM -0700, Jerry Snitselaar wrote:
On Fri Jun 26 20, Jarkko Sakkinen wrote:
> On Wed, Jun 24, 2020 at 11:21:50PM -0700, Jerry Snitselaar wrote:
> > On Thu Jun 25 20, Jarkko Sakkinen wrote:
> > > Acer C720
Move AMD Kconfig and Makefile bits down into the amd directory
with the rest of the AMD specific files.
Cc: Joerg Roedel
Cc: Suravee Suthikulpanit
Signed-off-by: Jerry Snitselaar
---
drivers/iommu/Kconfig | 45 +-
drivers/iommu/Makefile | 5
Move Intel Kconfig and Makefile bits down into intel directory
with the rest of the Intel specific files.
Cc: Joerg Roedel
Cc: Lu Baolu
Signed-off-by: Jerry Snitselaar
---
drivers/iommu/Kconfig| 86 +---
drivers/iommu/Makefile | 8 +---
drivers
This patchset imeplements the suggestion from Linus to move the
Kconfig and Makefile bits for AMD and Intel into their respective
directories.
v2: Rebase against v5.8-rc3. Dropped ---help--- changes from Kconfig as that was
dealt with in systemwide cleanup.
Jerry Snitselaar (2):
iommu
TPM2_RC_TESTING is the return code.
Reviewed-by: Jarkko Sakkinen
Signed-off-by: Jerry Snitselaar
---
drivers/char/tpm/tpm-interface.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/drivers/char/tpm/tpm-interface.c b/drivers/char/tpm/tpm-interface.c
index d9439f9abe78..6339a2e289ae
Set tpm_chip->timeouts_adjusted directly in the update_timeouts
code instead of returning bool. In case of tpm read failing
print warning that the read failed and continue on.
Reviewed-by: Jarkko Sakkinen
Signed-off-by: Jerry Snitselaar
---
drivers/char/tpm/tpm1-cmd.c | 3 +--
driv
TPM2_RC_TESTING is the return code.
Reviewed-by: Jarkko Sakkinen
Signed-off-by: Jerry Snitselaar
---
drivers/char/tpm/tpm-interface.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/drivers/char/tpm/tpm-interface.c b/drivers/char/tpm/tpm-interface.c
index d9439f9abe78..6339a2e289ae
Set tpm_chip->timeouts_adjusted directly in the update_timeouts
code instead of returning bool. In case of tpm read failing
print warning that the read failed and continue on.
Reviewed-by: Jarkko Sakkinen
Signed-off-by: Jerry Snitselaar
---
drivers/char/tpm/tpm1-cmd.c | 3 +--
driv
On Thu Jan 31 19, Linus Torvalds wrote:
On Thu, Jan 31, 2019 at 12:47 PM Jarkko Sakkinen
wrote:
I'll try it first thing when I wake up tomorrow (11PM in Finland ATM).
Thanks.
Appreciate for taking time on this.
Hey, it was my commit that broke it for you. Even if it happened to
work befo
ierarchy to use DMA domain
iommu/vt-d: Apply per-device dma_ops
drivers/iommu/intel-iommu.c | 396 +++-
1 file changed, 26 insertions(+), 370 deletions(-)
--
2.17.1
Reviewed-by: Jerry Snitselaar
rieve digest size of unknown algorithms with PCR
read")
Reported-by: Jerry Snitselaar
Suggested-by: James Bottomley
Signed-off-by: Roberto Sassu
Thank you! This patch set is now queued in next-integrity-testing
during the open window. Jerry, I assume this works for you. Could we
get your ta
For easier decoding, output the error code returned
from the tpm device in hex when the device is TPM2.0.
Cc: Jarkko Sakkinen
Cc: Peter Huewe
Cc: Marcel Selhorst
Cc: Jason Gunthorpe
Reported-by: Ken Goldman
Signed-off-by: Jerry Snitselaar
---
drivers/char/tpm/tpm-interface.c | 11
Should this skip warning that the rebind failed if device_attach
is returning -EPROBE_DEFER? If I do something like 'rtcwake -m mem -s 30'
on a laptop I have here I will see a couple "rebind failed: -517" messages
as it comes back out of suspend. Since the device probe eventually happens
once prob
e.
Device probe will eventually take place later.
[one-liner by Jerry Snitselaar posted in a mailing list question -Mathias]
Suggested-by: Jerry Snitselaar
Signed-off-by: Mathias Nyman
---
drivers/usb/core/driver.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/drivers/usb/
On Fri Apr 28 17, Jarkko Sakkinen wrote:
On Wed, Apr 26, 2017 at 03:39:54PM -0700, Jerry Snitselaar wrote:
For easier decoding, output the error code returned
from the tpm device in hex when the device is TPM2.0.
Cc: Jarkko Sakkinen
Cc: Peter Huewe
Cc: Marcel Selhorst
Cc: Jason Gunthorpe
Only try to clean up the svm page request irq if one has
been assigned. Also clear pr_irq in the error path if irq request
fails.
Signed-off-by: Jerry Snitselaar
---
drivers/iommu/intel-svm.c | 9 ++---
1 file changed, 6 insertions(+), 3 deletions(-)
diff --git a/drivers/iommu/intel-svm.c
78 67 a7 81 31 c0 e8 4c 37 fa ff <0f> ff
48 8b 34 24 4c 89 ef e
8 0e 4c 68 00 49 8b 46 40 48 8b 80
[0.669688] ---[ end trace 58a470248700f2fc ]---
Cc: Alex Williamson
Cc: Joerg Roedel
Cc: Ashok Raj
Signed-off-by: Jerry Snitselaar
---
drivers/iommu/intel-svm.c | 9 ++---
1 fil
The following commit has been merged into the efi/urgent branch of tip:
Commit-ID: e658c82be5561412c5e83b5e74e9da4830593f3e
Gitweb:
https://git.kernel.org/tip/e658c82be5561412c5e83b5e74e9da4830593f3e
Author:Jerry Snitselaar
AuthorDate:Wed, 02 Oct 2019 18:59:02 +02:00
101 - 191 of 191 matches
Mail list logo