lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <1298404199.25819.15.camel@d941e-10>
Date:	Tue, 22 Feb 2011 14:49:59 -0500
From:	Stefan Berger <stefanb@...ux.vnet.ibm.com>
To:	Jiri Slaby <jirislaby@...il.com>, preining@...ic.at,
	Linux kernel mailing list <linux-kernel@...r.kernel.org>,
	Rajiv Andrade <srajiv@...ux.vnet.ibm.com>,
	"debora@...ux.vnet.ibm.com" <debora@...ux.vnet.ibm.com>
Subject: [PATCH] tpm_tis: Re-enable interrupts upon resume

Below patch applies to the tip of the git tree.

This patch makes sure that if the TPM TIS interface is run in interrupt
mode (rather than polling mode) that the interrupts are enabled in the
TPM's interrupt enable register which may either have been cleared by
the TPM's TIS loosing its state during device sleep in ACPI S3 (suspend)
or by the BIOS, which upon resume sends a TPM_Startup() command to the
TPM, and may run the TPM in polling mode and leave the TIS interrupts
disabled once it transfers control to the OS again.

Problem is, I don't currently have a machine running the TPM in
interrupt mode. I found this through a self-built TPM device model for
Qemu and SeaBIOS patches, where this does resolve a problem upon resume.

You may want to check if your TPM runs with interrupts by doing

cat /proc/interrupts | grep -i tpm

and see whether there is an entry.


Signed-off-by: Stefan Berger <stefanb@...ibm.com>


Index: linux-2.6/drivers/char/tpm/tpm_tis.c
===================================================================
--- linux-2.6.orig/drivers/char/tpm/tpm_tis.c
+++ linux-2.6/drivers/char/tpm/tpm_tis.c
@@ -651,6 +651,23 @@ static int tpm_tis_pnp_resume(struct pnp
 {
 	struct tpm_chip *chip = pnp_get_drvdata(dev);
 	int ret;
+	u32 intmask;
+
+	if (chip->vendor.irq) {
+		/* reenable interrupts that device may have lost or
+		   BIOS/firmware may have disabled */
+		intmask =
+		    ioread32(chip->vendor.iobase +
+			     TPM_INT_ENABLE(chip->vendor.locality));
+
+		intmask |= TPM_INTF_CMD_READY_INT
+		    | TPM_INTF_LOCALITY_CHANGE_INT | TPM_INTF_DATA_AVAIL_INT
+		    | TPM_INTF_STS_VALID_INT | TPM_GLOBAL_INT_ENABLE;
+
+		iowrite32(intmask,
+			  chip->vendor.iobase +
+			  TPM_INT_ENABLE(chip->vendor.locality));
+	}
 
 	ret = tpm_pm_resume(&dev->dev);
 	if (!ret)

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ