Received: by 2002:a25:c205:0:0:0:0:0 with SMTP id s5csp1163352ybf; Thu, 27 Feb 2020 06:10:19 -0800 (PST) X-Google-Smtp-Source: APXvYqz7OJ7iQ9aAnFkpIMOdjNPEAzg01+1awVHomHRDsbIOj5PceGkv9mN/2WPGvheF4YI03I2L X-Received: by 2002:a05:6830:18ce:: with SMTP id v14mr3397547ote.36.1582812619848; Thu, 27 Feb 2020 06:10:19 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1582812619; cv=none; d=google.com; s=arc-20160816; b=EMT19FyCYEzChQ7YN8uA/9BnTJk+90aC7qb7qj6E0lzaGDlTjQXHI3areVKIVzkXqs 7ZW7D5/TB3Oik6ox01zKQEaa09OVOuoXESLB7mXHFCBsBRCTFQUXFWRdqeKDensjP7Xf XlQmTNYBYSv9wwLHmMd4XDGYLu3PmDApWPoXVShQieIxDeNOGo+3Ylku8Z/Xt5KHrPan SvBDaXx9UBo4sSbz0MUBNQ09VCyTo+BlIfoCOAiXdCTIuO0dWqshzHsXHIFhbwA0iVER JCu+kNFHKzZlk3mq9lICAAW0FodK2w8zmODzMzypS6TPS4eUgeshE52IkBFUu4C9YQkc iI3w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=BkRIroGN5ViaksXHXN/2VopabpS7gGpx0T1Gmq0osKE=; b=03PriG1A/Ke7z4xtNXiLpfs/Z9dmG0LGCEpU5wce2sZho0irqJwdSyK3jQwFJnGKt0 HhKFd4wjUc4WBLxmua4W7+Vq0c4YaixVpSazgM/F7DojOO3yTDmIk0kdyzrMsktPWa/X tVtDaAWgIlRX9Noif3TCBRhIMsPNuvBSE//Z2+PYQsGUhrj8dqKZwwZraymDt7uWILgf dWGDRIzzVeY+YAd8syRWWWqHsdfldHf3zSodAKddn992p62+UWr3RUpwPP3SP9ysGfuk kMFyoMPjiMFRmoBThPbAwnxRJyUkRGiIL+eX5zUL110/XviuaNSgiDh6/Rz36MTvAYaw EIZA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=V8zid6CV; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 2si1441976oij.97.2020.02.27.06.09.35; Thu, 27 Feb 2020 06:10:19 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=V8zid6CV; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388127AbgB0OHj (ORCPT + 99 others); Thu, 27 Feb 2020 09:07:39 -0500 Received: from mail.kernel.org ([198.145.29.99]:45138 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388112AbgB0OHg (ORCPT ); Thu, 27 Feb 2020 09:07:36 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id D6DBC2469F; Thu, 27 Feb 2020 14:07:35 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1582812456; bh=wg8/gne6dxpefqG07NpdOWoUXbrsKajZdCwFetq6xxY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=V8zid6CVy/MHE0+UX4GwLMpp+VL5S0WhJk7rhaRPfWSfc4tmDNYevlN8jwbeHYbUv JOLMRI/THawNJ1EYfThiyqDeSuaFjnaDkZPDa5vjgTQ5sUHnXqxqfFb30+eFW0r+js 3v9cEiQeq03bbBoPeqepWGSwmpzyigPL3O+weVFU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Roberto Sassu , Petr Vorel , Jarkko Sakkinen Subject: [PATCH 5.4 007/135] tpm: Initialize crypto_id of allocated_banks to HASH_ALGO__LAST Date: Thu, 27 Feb 2020 14:35:47 +0100 Message-Id: <20200227132230.091534974@linuxfoundation.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200227132228.710492098@linuxfoundation.org> References: <20200227132228.710492098@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Roberto Sassu commit dc10e4181c05a2315ddc375e963b7c763b5ee0df upstream. chip->allocated_banks, an array of tpm_bank_info structures, contains the list of TPM algorithm IDs of allocated PCR banks. It also contains the corresponding ID of the crypto subsystem, so that users of the TPM driver can calculate a digest for a PCR extend operation. However, if there is no mapping between TPM algorithm ID and crypto ID, the crypto_id field of tpm_bank_info remains set to zero (the array is allocated and initialized with kcalloc() in tpm2_get_pcr_allocation()). Zero should not be used as value for unknown mappings, as it is a valid crypto ID (HASH_ALGO_MD4). Thus, initialize crypto_id to HASH_ALGO__LAST. Cc: stable@vger.kernel.org # 5.1.x Fixes: 879b589210a9 ("tpm: retrieve digest size of unknown algorithms with PCR read") Signed-off-by: Roberto Sassu Reviewed-by: Petr Vorel Reviewed-by: Jarkko Sakkinen Signed-off-by: Jarkko Sakkinen Signed-off-by: Greg Kroah-Hartman --- drivers/char/tpm/tpm2-cmd.c | 2 ++ 1 file changed, 2 insertions(+) --- a/drivers/char/tpm/tpm2-cmd.c +++ b/drivers/char/tpm/tpm2-cmd.c @@ -831,6 +831,8 @@ static int tpm2_init_bank_info(struct tp return 0; } + bank->crypto_id = HASH_ALGO__LAST; + return tpm2_pcr_read(chip, 0, &digest, &bank->digest_size); }