Received: by 2002:ac0:946b:0:0:0:0:0 with SMTP id j40csp1657908imj; Fri, 8 Feb 2019 05:19:57 -0800 (PST) X-Google-Smtp-Source: AHgI3IYQtYmSDyTekAMo+VHa53C7zTxUgkWlVsvauWulvJJFYU9RhWL1feE6HosColVZigAtFls+ X-Received: by 2002:a63:db04:: with SMTP id e4mr5927609pgg.40.1549631997668; Fri, 08 Feb 2019 05:19:57 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1549631997; cv=none; d=google.com; s=arc-20160816; b=mxhhlGhsjR9+S6Ie5wAlQDwaoUb9B3t5zM64Kh354wEfrXCnj+I16/W3KCuqhlLrRo ym3ZwbWIHiEYDOWD6I42wNo/F9p0GwV0jTNU0uft7qni+3lGsihtB3M+9nUFeKPzLqZb 6ODiMB8nGsGltszomq/LsFupVwnsBlJgshLGq6mbhwrQunAw9MLsfl9rp2dLncdR0vwD bZcv4cO5KqFskgt29yl++1rziouzPGITwSSpTYqC3eE87bzOwohAPHMVnX1JhOR3q1KB 2Akd+XCYdaGkdEBjZdP4wYffWrl4Ek5ZRVfAOwC908FBgGQ/GXb007abzO6lm6z8bes5 oM+A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:organization:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=JQUuTjwzB5cIgrKy8MplVjrxij5bdJ4Ze15uX+ts51w=; b=U+O6rYIU6TxL4LnPGiQz877SeX/Ll2Q8BjuRv5GcbEOnUMS/N8lEJMFNhet/5DVDWT 5T47GkVvRSCFbzakhu4du0n0iUCH3+diabrDGb+Od6psJh2vBjlSFV7NOwpj5lwzorXk 0zA+QEL+QE8bC8yZainlqB2bWNZ/LHgkjliOfEVGBodhP/aVzPvOsRWPEidHKCE4HUip jbfb89qN+guMH93n/yzu3xnXHbP7SChwixZgEtO1ViJj1MB+puNNU6EbvCc4rXwQwfT1 xTHGhVqGZhTHBDSAOaxU7XfSgLv6dxmYoJ1xoQ4miUuNNQnTJcm6yxL22spuQrL3uQHI oAoQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e129si2062573pgc.333.2019.02.08.05.19.41; Fri, 08 Feb 2019 05:19:57 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727580AbfBHNSA (ORCPT + 99 others); Fri, 8 Feb 2019 08:18:00 -0500 Received: from mga07.intel.com ([134.134.136.100]:32200 "EHLO mga07.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727336AbfBHNR7 (ORCPT ); Fri, 8 Feb 2019 08:17:59 -0500 X-Amp-Result: UNSCANNABLE X-Amp-File-Uploaded: False Received: from fmsmga004.fm.intel.com ([10.253.24.48]) by orsmga105.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 08 Feb 2019 05:17:58 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.58,347,1544515200"; d="scan'208";a="142659512" Received: from jsakkine-mobl1.tm.intel.com (HELO localhost) ([10.237.50.115]) by fmsmga004.fm.intel.com with ESMTP; 08 Feb 2019 05:17:54 -0800 Date: Fri, 8 Feb 2019 15:17:54 +0200 From: Jarkko Sakkinen To: Stefan Berger Cc: Alexander Steffen , linux-integrity@vger.kernel.org, linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org, Peter Huewe , Jason Gunthorpe , Tomas Winkler , Tadeusz Struk , Stefan Berger , Nayna Jain Subject: Re: [PATCH v11 00/16] Remove nested TPM operations Message-ID: <20190208131754.GA18133@linux.intel.com> References: <20190206120634.GA4680@linux.intel.com> <3d6fdcc1-8221-2137-fc82-596377cc2fdc@infineon.com> <20190207212912.GD23906@linux.intel.com> <0af40351-91d5-d0a7-2965-0a9c6505af79@linux.ibm.com> <20190208003314.GB7202@linux.intel.com> <1fbd29ad-1005-8450-4c39-00974468183b@linux.ibm.com> <20190208111442.GA11755@linux.intel.com> <06473b24-7c59-9405-bbe0-8d30b3450391@linux.ibm.com> <20190208130227.GA16679@linux.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Organization: Intel Finland Oy - BIC 0357606-4 - Westendinkatu 7, 02160 Espoo User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Feb 08, 2019 at 08:10:32AM -0500, Stefan Berger wrote: > On 2/8/19 8:02 AM, Jarkko Sakkinen wrote: > > On Fri, Feb 08, 2019 at 07:05:26AM -0500, Stefan Berger wrote: > > > See my comment on [PATCH v11 08/16]. It needs to be added in that patch > > > since otherwise rc holds a non-zero value on function exit, which is wrong > > > at that point. > > The snippet in question: > > > > rc = chip->ops->send(chip, buf, count); > > if (rc < 0) { > > if (rc != -EPIPE) > > dev_err(&chip->dev, > > "%s: tpm_send: error %d\n", __func__, rc); > > return rc; > > } > > > > if (chip->flags & TPM_CHIP_FLAG_IRQ) > > goto out_recv; > > > > 'send()' ought to return zero on success case. > > > > This is how the snippet was before applying any patches scheduled for > > v5.1: > > > > rc = chip->ops->send(chip, buf, count); > > if (rc < 0) { > > if (rc != -EPIPE) > > dev_err(&chip->dev, > > "%s: tpm_send: error %d\n", __func__, rc); > > return rc; > > } > > > > if (chip->flags & TPM_CHIP_FLAG_IRQ) > > goto out_recv; > > > > Does not compute. > > tpm_tis_send_main returns 'len' and that's what we have here. Before doing any kind of code change, we should at least know what has caused this that it has worked before. And also which commit caused the regression to happen, because it looks like a bug in tpm_tis_core, not in the main TPM driver. It would need the fixes tag and cc to stable. /Jarkko