diff options
author | 2025-03-07 10:56:44 +0000 | |
---|---|---|
committer | 2025-03-27 15:34:05 +0200 | |
commit | 6359691b4fbcaf3ed86f53043a1f7c6cc54c09be (patch) | |
tree | 488248f4c697aa18d4aebd96e247b9abe1759cde | |
parent | tpm: Lazily flush auth session when getting random data (diff) | |
download | wireguard-linux-6359691b4fbcaf3ed86f53043a1f7c6cc54c09be.tar.xz wireguard-linux-6359691b4fbcaf3ed86f53043a1f7c6cc54c09be.zip |
tpm: Convert warn to dbg in tpm2_start_auth_session()
TPM2 sessions have been flushed lazily since commit df745e25098dc ("tpm:
Lazily flush the auth session"). If /dev/tpm{rm}0 is not accessed
in-between two in-kernel calls, it is possible that a TPM2 session is
re-started before the previous one has been completed.
This causes a spurios warning in a legit run-time condition, which is also
correctly addressed with a fast return path:
[ 2.944047] tpm tpm0: auth session is active
Address the issue by changing dev_warn_once() call to a dev_dbg_once()
call.
[jarkko: Rewrote the commit message, and instead of dropping converted
to a debug message.]
Signed-off-by: Jonathan McDowell <noodles@meta.com>
Signed-off-by: Jarkko Sakkinen <jarkko@kernel.org>
-rw-r--r-- | drivers/char/tpm/tpm2-sessions.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/drivers/char/tpm/tpm2-sessions.c b/drivers/char/tpm/tpm2-sessions.c index b70165b588ec..3f89635ba5e8 100644 --- a/drivers/char/tpm/tpm2-sessions.c +++ b/drivers/char/tpm/tpm2-sessions.c @@ -982,7 +982,7 @@ int tpm2_start_auth_session(struct tpm_chip *chip) int rc; if (chip->auth) { - dev_warn_once(&chip->dev, "auth session is active\n"); + dev_dbg_once(&chip->dev, "auth session is active\n"); return 0; } |