Received: by 2002:a25:c205:0:0:0:0:0 with SMTP id s5csp1180497ybf; Thu, 27 Feb 2020 06:25:19 -0800 (PST) X-Google-Smtp-Source: APXvYqzqeuUWggfgNCuWk/oYgee8RDjBDHomOcK0ve0KQMYOZ5JmXAKz8EdlYtTbuc7g2/Z8oDhl X-Received: by 2002:aca:5fc6:: with SMTP id t189mr3688743oib.166.1582813518969; Thu, 27 Feb 2020 06:25:18 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1582813518; cv=none; d=google.com; s=arc-20160816; b=IY8uTimAP73Y/wwbN9Vx2QL2aYHcww6//I4x3GxWqDMLDiDacHb8gbeFvkK3AMQhE9 qAStyWJIixVnemhvAf403IDorrgroaOFn6zl/iFlXU1ohvqaqJwU/4NkR5PgtDxwXkIw VWh+zl9WSZrbWJ6eA0og/7hD/KWpBduoRhExB2JDqrCLMlM69Cptm+GJajeXGFfXC8Eo tMvvfWLbSGMbFlxI3oYlSGuF+OLP8WXH+OwL+ddaYyl+zpDBsf7wnWo5uBDRD9om2yrP 7Z+p9+OGDUm39iYdg6BvdSgfjLn7f8stigsvTW7IMfr6zhfTgfsLHxmPDwF9Pmwduzit BSrQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=n75lPujXsTyPpIdHfZwJVSWt5TWt2YogciZhsXMe3Io=; b=Yedh0krHBfjwBxHYkTlZCNWZrSOYrUSA5q7aeJwl7QWBaa+j9VOJ5CSWfw3QsZx3YP xQ65Bz+oa6k7qBSxeA+l44B3+VgH1/A0WKCuUzJMv1twPkDy/wMO4hvSF91Ih2Zy9UWJ 8p3AF/gIewgAA1MoBqdCojVRTWZ8jN+0XNGuc4KPYqmBoFx8GsC4Ho2oaoaFQRDRkuCp zJBSujX7MXjeockb8ubBroV4VI9nTR3e6E6pbZh3hRKY5IJ5l4J6MVqeTZNc6js2EHnM melxCyl0CIBOFi8KqA4wcUhvXk/qEhrDp58Zf8qI6Rq5G3wAfCAojaLNjRTVw8umCoOc qCBA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=gm266H4o; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n21si1370945oic.0.2020.02.27.06.25.06; Thu, 27 Feb 2020 06:25:18 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=gm266H4o; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729950AbgB0OND (ORCPT + 99 others); Thu, 27 Feb 2020 09:13:03 -0500 Received: from mail.kernel.org ([198.145.29.99]:51814 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388719AbgB0OM6 (ORCPT ); Thu, 27 Feb 2020 09:12:58 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 5F10020578; Thu, 27 Feb 2020 14:12:57 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1582812777; bh=s9PRbJgZoRfil7RlXNlak23YZ7mHVGiUFrYZ5T47Uj4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=gm266H4odsENRqXeYb9OMerYowz57EWRmKkM7c4zM3iVF8BboEElFK9XlmARYvUEC Kmdpz/iDOTJ8sbj636pJWaLiHW0qDiBOkzTG1ZXEomuRosVVdzCr7Fw1cQUjLW0skk LnyccmFV0Dur2I93Wglosgym0DzGTtjNRXYMqkIc= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Roberto Sassu , Petr Vorel , Jarkko Sakkinen Subject: [PATCH 5.5 013/150] tpm: Initialize crypto_id of allocated_banks to HASH_ALGO__LAST Date: Thu, 27 Feb 2020 14:35:50 +0100 Message-Id: <20200227132234.635198004@linuxfoundation.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200227132232.815448360@linuxfoundation.org> References: <20200227132232.815448360@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Roberto Sassu commit dc10e4181c05a2315ddc375e963b7c763b5ee0df upstream. chip->allocated_banks, an array of tpm_bank_info structures, contains the list of TPM algorithm IDs of allocated PCR banks. It also contains the corresponding ID of the crypto subsystem, so that users of the TPM driver can calculate a digest for a PCR extend operation. However, if there is no mapping between TPM algorithm ID and crypto ID, the crypto_id field of tpm_bank_info remains set to zero (the array is allocated and initialized with kcalloc() in tpm2_get_pcr_allocation()). Zero should not be used as value for unknown mappings, as it is a valid crypto ID (HASH_ALGO_MD4). Thus, initialize crypto_id to HASH_ALGO__LAST. Cc: stable@vger.kernel.org # 5.1.x Fixes: 879b589210a9 ("tpm: retrieve digest size of unknown algorithms with PCR read") Signed-off-by: Roberto Sassu Reviewed-by: Petr Vorel Reviewed-by: Jarkko Sakkinen Signed-off-by: Jarkko Sakkinen Signed-off-by: Greg Kroah-Hartman --- drivers/char/tpm/tpm2-cmd.c | 2 ++ 1 file changed, 2 insertions(+) --- a/drivers/char/tpm/tpm2-cmd.c +++ b/drivers/char/tpm/tpm2-cmd.c @@ -525,6 +525,8 @@ static int tpm2_init_bank_info(struct tp return 0; } + bank->crypto_id = HASH_ALGO__LAST; + return tpm2_pcr_read(chip, 0, &digest, &bank->digest_size); }