lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20200227162339.GF5140@linux.intel.com>
Date:   Thu, 27 Feb 2020 18:23:39 +0200
From:   Jarkko Sakkinen <jarkko.sakkinen@...ux.intel.com>
To:     George Wilson <gcwilson@...ux.ibm.com>
Cc:     linux-integrity@...r.kernel.org,
        Alexey Kardashevskiy <aik@...abs.ru>,
        Stefan Berger <stefanb@...ux.ibm.com>,
        Nayna Jain <nayna@...ux.vnet.ibm.com>,
        Jason Gunthorpe <jgg@...pe.ca>, linux-kernel@...r.kernel.org,
        Linh Pham <phaml@...ibm.com>
Subject: Re: [PATCH] tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send()

On Thu, Feb 27, 2020 at 10:50:03AM -0500, George Wilson wrote:
> tpm_ibmvtpm_send() can fail during LPM resume with an H_CLOSED return
> from ibmvtpm_send_crq().  The PAPR says, 'The “partner partition
> suspended” transport event disables the associated CRQ such that any
> H_SEND_CRQ hcall() to the associated CRQ returns H_Closed until the CRQ
> has been explicitly enabled using the H_ENABLE_CRQ hcall.' This patch
> adds a check in tpm_ibmvtpm_send() for an H_CLOSED return from
> ibmvtpm_send_crq() and in that case calls tpm_ibmvtpm_resume() and
> retries the ibmvtpm_send_crq() once.
> 
> Reported-by: Linh Pham <phaml@...ibm.com>
> Reviewed-by: Stefan Berger <stefanb@...ux.ibm.com>
> Signed-off-by: George Wilson <gcwilson@...ux.ibm.com>

What is LPM anyway?

/Jarkko

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ