lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <f8d59c32452604d642146bbeb20cb5b2@molgen.mpg.de>
Date:   Thu, 13 Apr 2017 09:19:28 +0200
From:   Paul Menzel <pmenzel@...gen.mpg.de>
To:     Robert Moore <robert.moore@...el.com>
Cc:     Jarkko Sakkinen <jarkko.sakkinen@...ux.intel.com>,
        "Maciej S. Szmigiero" <mail@...iej.szmigiero.name>,
        linux-kernel@...r.kernel.org, Arthur Heymans <arthur@...ymans.xyz>,
        tpmdd-devel@...ts.sourceforge.net, GNUtoo@...log.org,
        "Zheng, Lv" <lv.zheng@...el.com>,
        "Wysocki, Rafael J" <rafael.j.wysocki@...el.com>,
        linux-acpi@...r.kernel.org
Subject: RE: [Regression Linux 4.11] TPM module not loaded anymore

Dear Robert,


Thank you for your reply.


On 2017-04-12 23:49, Moore, Robert wrote:

>> On 2017-04-12 17:54, Moore, Robert wrote:
>> > And probably the dmesg if error messages appear in there.
>> 
>> Linux doesn’t log any messages, as the `tpm` module doesn’t load. 
>> Please
>> find the output of `sudo acpidump` attached.
>> 
>> […]
> 
> Do you have any idea what control method(s) are executing? The DSDT
> and SSDT in the acpidump load fine here, and all predefined control
> methods in these tables execute OK.

Sorry, I don’t know what’s done.

> We need to root-cause this problem, as a simple revert will break the
> customers that the fix was intended for in the first place.

I know, but I have no idea how to root-cause this. If nothing can be 
found, a revert is required by Linux’ no-regression-policy.


Kind regards,

Paul

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ