diff options
author | Alan Cox <alan@lxorguk.ukuu.org.uk> | 2007-11-04 22:05:49 -0500 |
---|---|---|
committer | Jeff Garzik <jeff@garzik.org> | 2008-01-23 05:24:09 -0500 |
commit | ae8d4ee7ff429136c8b482c3b38ed994c021d3fc (patch) | |
tree | bf45047ab8a4f5325c6b752be02313d3112eded0 /include/linux/selection.h | |
parent | ffe188dd83e84119516688c822388c8f30a54877 (diff) | |
download | kernel_samsung_espresso10-ae8d4ee7ff429136c8b482c3b38ed994c021d3fc.zip kernel_samsung_espresso10-ae8d4ee7ff429136c8b482c3b38ed994c021d3fc.tar.gz kernel_samsung_espresso10-ae8d4ee7ff429136c8b482c3b38ed994c021d3fc.tar.bz2 |
libata: Disable ATA8-ACS proposed Trusted Computing features by default
Historically word 48 in the identify data was used to mean 32bit I/O
was supported for VLB IDE etc. ATA8 reassigns this word to the Trusted
Computing Group, where it is used for TCG features. This means that
an ATA8 TCG drive is going to trigger 32bit I/O on some systems which
will be funny.
Anyway we need to sort this out ready for ATA8 so:
- Reorder the ata.h header a bit so the ata_version function occurs early
in it
- Make dword_io check the ATA version
- Add an ATA8 version checking TCG presence test
While we are at it the current drafts have a flaw where it may not be
possible to disable TCG features at boot (and opt out of the trusted
model) as TCG intends because it relies on presence of a different
optional feature (DCS). Handle this in software by refusing the TCG
commands if libata.allow_tpm is not set. (We must make it possible
as some environments such as proprietary VDR devices will doubtless
want to use it to lock up content)
Finally as with CPRM print a warning so that the user knows they may
not be able to full access and use the device.
Signed-off-by: Alan Cox <alan@redhat.com>
Diffstat (limited to 'include/linux/selection.h')
0 files changed, 0 insertions, 0 deletions