Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp2371072imm; Thu, 21 Jun 2018 11:21:35 -0700 (PDT) X-Google-Smtp-Source: ADUXVKKaijP59MnRjOW7KMhGmMZXYT/SXiyLkrcYSXu1t+TWxAKqZ87JUniK0uUD1ql1PzaWT1ih X-Received: by 2002:a65:5c02:: with SMTP id u2-v6mr23394628pgr.304.1529605295178; Thu, 21 Jun 2018 11:21:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1529605295; cv=none; d=google.com; s=arc-20160816; b=Lmw5jSteOnA5xJpmSbLojq5u6drPxirFMW5oGJRtX7vyZonr1QnmvBEr5IpgiaZVeL 4FGz3LCT2w1rvAlOpqcWlnZfwsUGaY2MnPRxG+ooOHhfgpksk6MVHOxdKSJ1AGp9YwSj my2GzOTNECv4LEDxSwCTCYgTRbiS26lvYIZWR0kNOBYVm0phHa7jVGyyzs/fXjiMSmYd w5eBoNWrjjZlrhmtX4p7lQ7DqXyiAXUrnlnIkrxGyOVE/sqCrbfMr/cbd7Oj2ypFgqr6 te2zeEkHOVso1p1A8prficsqLA/OzbQRo6nCruK1vj8XA8YMM2E3V6vbLZP0BTKVG0tb Of9g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:content-language :content-transfer-encoding:in-reply-to:mime-version:user-agent:date :from:references:cc:to:subject:arc-authentication-results; bh=zWI63rNBWQBqSt2KM3vBblTDTg0SnEKdN8R9Y9+EZIo=; b=vuifmlA4vmW4BGS0+/ZyHE0p6bqsT5NGMstYzI8vruT4EL31k5iVYt1Q3LTCo8lNEH MOIm9u4NBv5zIup83NcU+2cd3zxXfNyTP+K2alRovZymIwxX+zloq4x5OcbQcRVvlK1R 9mz/9L5VkDFk8tNCSGS8m7/KE24/PEZuDjxFgFByQwLgb9n+mr5es3/yZx6LksUIPgMB gShrIUlwAQggYjclJHXvrhavJZe9r9WUNKcVAqwHV01Bg5kH+Bs0euHbAnWInUlGvu6j wGxq/4b7ld1As08m+YNG3+IbfYBL5nRgUVmbTR4Hn/tAVWtIWuFeNa+wGm/HMAAqkVBZ szpg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d10-v6si5223003pfh.119.2018.06.21.11.21.20; Thu, 21 Jun 2018 11:21:35 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754085AbeFUSTw (ORCPT + 99 others); Thu, 21 Jun 2018 14:19:52 -0400 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:40778 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753944AbeFUSTv (ORCPT ); Thu, 21 Jun 2018 14:19:51 -0400 Received: from pps.filterd (m0098394.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w5LIJa8H037361 for ; Thu, 21 Jun 2018 14:19:50 -0400 Received: from e12.ny.us.ibm.com (e12.ny.us.ibm.com [129.33.205.202]) by mx0a-001b2d01.pphosted.com with ESMTP id 2jrfbf4r1e-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Thu, 21 Jun 2018 14:19:50 -0400 Received: from localhost by e12.ny.us.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Thu, 21 Jun 2018 14:19:49 -0400 Received: from b01cxnp22036.gho.pok.ibm.com (9.57.198.26) by e12.ny.us.ibm.com (146.89.104.199) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256/256) Thu, 21 Jun 2018 14:19:45 -0400 Received: from b01ledav004.gho.pok.ibm.com (b01ledav004.gho.pok.ibm.com [9.57.199.109]) by b01cxnp22036.gho.pok.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id w5LIJiIn7012742 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Thu, 21 Jun 2018 18:19:44 GMT Received: from b01ledav004.gho.pok.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 45F11112065; Thu, 21 Jun 2018 14:19:41 -0400 (EDT) Received: from b01ledav004.gho.pok.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 32006112063; Thu, 21 Jun 2018 14:19:41 -0400 (EDT) Received: from sbct-3.pok.ibm.com (unknown [9.47.158.153]) by b01ledav004.gho.pok.ibm.com (Postfix) with ESMTP; Thu, 21 Jun 2018 14:19:41 -0400 (EDT) Subject: Re: [PATCH v2 1/4] tpm: Implement tpm_chip_find() and tpm_chip_put() for other subsystems To: Jason Gunthorpe Cc: Jarkko Sakkinen , linux-integrity@vger.kernel.org, zohar@linux.vnet.ibm.com, linux-kernel@vger.kernel.org References: <20180620204236.1572523-1-stefanb@linux.vnet.ibm.com> <20180620204236.1572523-2-stefanb@linux.vnet.ibm.com> <20180621171518.GI11859@linux.intel.com> <95b2970f-b71b-4cfc-c188-7ae7e8cb94c5@linux.vnet.ibm.com> <20180621175601.GC19270@ziepe.ca> From: Stefan Berger Date: Thu, 21 Jun 2018 14:19:44 -0400 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.8.0 MIME-Version: 1.0 In-Reply-To: <20180621175601.GC19270@ziepe.ca> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit Content-Language: en-MW X-TM-AS-GCONF: 00 x-cbid: 18062118-0060-0000-0000-00000280B261 X-IBM-SpamModules-Scores: X-IBM-SpamModules-Versions: BY=3.00009234; HX=3.00000241; KW=3.00000007; PH=3.00000004; SC=3.00000265; SDB=6.01050302; UDB=6.00538246; IPR=6.00829272; MB=3.00021788; MTD=3.00000008; XFM=3.00000015; UTC=2018-06-21 18:19:47 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18062118-0061-0000-0000-0000458796E3 Message-Id: <743f606f-b3eb-6917-33bb-5b080f76fe3f@linux.vnet.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-06-21_08:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1805220000 definitions=main-1806210197 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 06/21/2018 01:56 PM, Jason Gunthorpe wrote: > On Thu, Jun 21, 2018 at 01:45:03PM -0400, Stefan Berger wrote: >> On 06/21/2018 01:15 PM, Jarkko Sakkinen wrote: >>> On Wed, Jun 20, 2018 at 04:42:33PM -0400, Stefan Berger wrote: >>>> Implement tpm_chip_find() for other subsystems to find a TPM chip and >>>> get a reference to that chip. Once done with using the chip, the reference >>>> is released using tpm_chip_put(). >>>> >>>> Signed-off-by: Stefan Berger >>> You should sort this out in a way that we don't end up with duplicate >>> functions. >> Do you want me to create a function *like* tpm_chip_find_get() that takes an >> additional parameter whether to get the ops semaphore and have that function >> called by the existing tpm_chip_find_get() and the new tpm_chip_find(). The >> latter would then not get the ops semphore. I didn't want to do this since >> one time the function returns with a lock held and the other time not. > Another option, and I haven't looked, is to revise the callers of > tpm_chip_find_get to not require it to hold the ops semaphore for > them. We have tpm_chip_unregister calling tpm_del_char_device to set the ops to NULL once a chip is unregistered. All existing callers, if they pass in a tpm_chip != NULL, currently fail if the ops are NULL. (If they pass in tpm_chip = NULL, they shouldn't find a chip once ops are null and it has been removed from the IDR). I wouldn't change that since IMA will call in with a tpm_chip != NULL and we want to protect the ops. All existing code within the tpm subsystem does seem to call tpm_chip_find_get() with a NULL pointer, though. Also trusted keys seems to pass in a NULL pointer every time. > > Either by giving them an API to do it, or revising the TPM entry > points to do it. > > I didn't look, but how did the ops semaphore get grabbed in your > revised patches? They do grab it, right? The revised patches do not touch the existing code much but will call tpm_chip_find_get() and get that semaphore every time before the ops are used. IMA is the only caller of tpm_chip_find() that now gets an additional reference to the tpm_chip and these APIs get called like this from IMA: ima init: chip = tpm_chip_find() ima::tpm: tpm_chip_find_get(chip) ... tpm_put_ops(chip) ima::tpm: tpm_chip_find_get(chip) ... tpm_put_ops(chip) [repeat] ima shutdown: tpm_chip_put(chip)     Stefan > > Jason >