[PATCH v3] tpm: Enable CLKRUN protocol for Braswell systems
Shaikh, Azhar
azhar.shaikh at intel.com
Thu Jun 8 19:02:54 UTC 2017
> -----Original Message-----
> From: Alan Cox [mailto:gnomes at lxorguk.ukuu.org.uk]
> Sent: Thursday, June 8, 2017 11:23 AM
> To: Shaikh, Azhar <azhar.shaikh at intel.com>
> Cc: jarkko.sakkinen at linux.intel.com; jgunthorpe at obsidianresearch.com;
> tpmdd-devel at lists.sourceforge.net; linux-kernel at vger.kernel.org; linux-
> security-module at vger.kernel.org
> Subject: Re: [PATCH v3] tpm: Enable CLKRUN protocol for Braswell systems
>
> > > > + outb(0x80, 0xCC);
> > > > +
> > > > + /* Make sure the above write is completed */
> > > > + wmb();
> > >
> > > Why the wmb(). It doesn't do what the comment says! Also this code
> > > is x86 specific
> > >
> > >
> >
> > Memory barrier to enforce the order so that the outb() is completed,
> which ensures that the LPC clocks are running before sending any TPM
> command.
>
> wmb() doesn't do that. It merely ensures that the write has been posted to
> the fabric. If as I suspect your LPC bus implements outb() as a non-posted
> write you don't need the wmb(). If it doesn't then you need to issue
> whatever access is needed to the fabric to ensure the post completed (eg for
> PCI if you do an MMIO write you must do an MMIO read from the same
> devfn).
>
> Secondly outb(0x80, 0xCC) doesn't write 0xCC to port 0x80. It writes 0x80 to
> port 0xCC !
>
Oops my bad! I got that reversed. Will change it.
> Alan
--
To unsubscribe from this list: send the line "unsubscribe linux-security-module" in
the body of a message to majordomo at vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
More information about the Linux-security-module-archive
mailing list