Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp19085311ybl; Fri, 3 Jan 2020 15:30:57 -0800 (PST) X-Google-Smtp-Source: APXvYqxfvAxlFXLyhFMgSl+tSgHj//q8fLmQQrGdsaC4yrXvr2rMxfS6hNs4s19tFl1Cfb1apgIF X-Received: by 2002:a05:6830:3006:: with SMTP id a6mr1606030otn.264.1578094257621; Fri, 03 Jan 2020 15:30:57 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1578094257; cv=none; d=google.com; s=arc-20160816; b=BONQTNVQ9RNCebkEk/vvWBMEnL3K/vQQU0HCScCRTeLKrZQ6Vwcl4rUOCt76LIQ4O0 sKoMw2a205nTKDNQfWACY8X8aaUBnIfjGtwMCKbhBUye8nyyf4V0FR4kS2BUm5uDi9M/ WzbG5vxE+XsD+hLUeD3tUyIbkGCuJMKANo8gdUzw0aW5s+21DFxJu4eH7iUTfR8+mM8f CQ2HNl+WyndMriiXVEPnVQ/VNU0BdpREGw9mz9cx2ik1i9pvk4H3/3az+Xwn5N+sXH8/ j50iq8Qv1aVkugNO/PjTG010YJB5gP4bDBxqIgC0yiG59PnlGWJRvYdRkDc4lqUJhQDj qWBA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=Wevw2u7JHVwwQYYGB/bRVbxZM7axWuo2L/NwvMU3PfI=; b=MFONwTFDvM/frfyo8XgbVQQAefgDkhxWEYVxpn+o1jsyxv99ajRQfQolkSp0k6d9XF P2D4WagpE++ikhnBQurVPPJ2AdZbeMXraiviYrjOrCduD5GUInZulLcuj3Ws8ufZnOFa XK7+Q+NxG03oNX3zeY5IcrpJhi5uT7eWwIwiWKU63SVug+J7fRR6zKQVIe3X0vjB7fgL NS8THhmXft22IEwsokjwNxhEQO7IZpjki8kq3B7FKQVTRYtHcO3FPYcJXVbHVMyceLI6 HnHW3L6dhdGjW3BOXO0Auv02hwSfmAoGtaUXmLO24r+dIzPuVFJAxnNYGeBpzTYpcSvY wt6g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r2si18449329oif.83.2020.01.03.15.30.45; Fri, 03 Jan 2020 15:30:57 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726792AbgACX37 (ORCPT + 99 others); Fri, 3 Jan 2020 18:29:59 -0500 Received: from mga14.intel.com ([192.55.52.115]:62190 "EHLO mga14.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726118AbgACX37 (ORCPT ); Fri, 3 Jan 2020 18:29:59 -0500 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga008.fm.intel.com ([10.253.24.58]) by fmsmga103.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 03 Jan 2020 15:29:59 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.69,392,1571727600"; d="scan'208";a="216899773" Received: from hkarray-mobl.ger.corp.intel.com (HELO localhost) ([10.252.22.101]) by fmsmga008.fm.intel.com with ESMTP; 03 Jan 2020 15:29:53 -0800 From: Jarkko Sakkinen To: linux-integrity@vger.kernel.org Cc: Stefan Berger , stable@vger.kernel.org, Jerry Snitselaar , Dan Williams , Xiaoping Zhou , Jarkko Sakkinen , Peter Huewe , Jason Gunthorpe , Arnd Bergmann , Greg Kroah-Hartman , linux-kernel@vger.kernel.org (open list) Subject: [PATCH for-linus-v5.5-rc6 2/3] tpm: Revert "tpm_tis_core: Set TPM_CHIP_FLAG_IRQ before probing for interrupts" Date: Sat, 4 Jan 2020 01:29:33 +0200 Message-Id: <20200103232935.11314-3-jarkko.sakkinen@linux.intel.com> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20200103232935.11314-1-jarkko.sakkinen@linux.intel.com> References: <20200103232935.11314-1-jarkko.sakkinen@linux.intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Stefan Berger There has been a bunch of reports (one from kernel bugzilla linked) reporting that when this commit is applied it causes on some machines boot freezes. Unfortunately hardware where this commit causes a failure is not widely available (only one I'm aware is Lenovo T490), which means we cannot predict yet how long it will take to properly fix tpm_tis interrupt probing. Thus, the least worst short term action is to revert the code to the state before this commit. In long term we need fix the tpm_tis probing code to work on machines that Stefan's fix was supposed to fix. Link: https://bugzilla.kernel.org/show_bug.cgi?id=205935 Fixes: 1ea32c83c699 ("tpm_tis_core: Set TPM_CHIP_FLAG_IRQ before probing for interrupts") Cc: stable@vger.kernel.org Cc: Jerry Snitselaar Cc: Dan Williams Tested-by: Dan Williams Tested-by: Xiaoping Zhou Signed-off-by: Stefan Berger Reported-by: Jerry Snitselaar Signed-off-by: Jarkko Sakkinen --- drivers/char/tpm/tpm_tis_core.c | 1 - 1 file changed, 1 deletion(-) diff --git a/drivers/char/tpm/tpm_tis_core.c b/drivers/char/tpm/tpm_tis_core.c index 8af2cee1a762..5dc52c4e2292 100644 --- a/drivers/char/tpm/tpm_tis_core.c +++ b/drivers/char/tpm/tpm_tis_core.c @@ -1060,7 +1060,6 @@ int tpm_tis_core_init(struct device *dev, struct tpm_tis_data *priv, int irq, } tpm_chip_start(chip); - chip->flags |= TPM_CHIP_FLAG_IRQ; if (irq) { tpm_tis_probe_irq_single(chip, intmask, IRQF_SHARED, irq); -- 2.20.1