Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp3698867pxk; Tue, 29 Sep 2020 04:08:38 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw5PYriDZlvie1NzLPYvCnXoF86iJ4fUcjTRlm7KsvXNAf/dp1uCYSfuUvycvLU/8/7AJGa X-Received: by 2002:a05:6402:1642:: with SMTP id s2mr490911edx.295.1601377718749; Tue, 29 Sep 2020 04:08:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1601377718; cv=none; d=google.com; s=arc-20160816; b=RTVXIm+Fv5+x/v4KnsSpcbFCm5zm3cCOqRrzeVPCw/Z6rBsWPrFepOnq44JMO7/EOb iCDzQvQM6mtox84r7Hy9f1F4viXCqE3qzhzRFojgFuB+W4EDyrZMWUhtatazjaLSKSS+ 0nxLLareV5dHwngQl9bloZ5PfGLVoUnFY8MwWiEg9wIkT4N22qSeFEB9KnPJs6+49hre 52Ja7xC8itL+m89kgDDVVfCS7jTbLD719/cC9i4Hyjj/v1+r8ulUPDdzHQacg55ujDvo kbuGCoyq50+JG+XcznPt1tdtpoTeOXpLYTmZx+eUmo2DMJTdiqBRt21JjHJ7/2QZaX1F obTg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=90Ydbgk1bhO6gjOyzBUO6bjugzZHdL9PJmnK7HW2Des=; b=ZrQb3yrwjJCzl7xctmd5BgzQDXQWfTfI5q6dYqntb3SpWfCBygM4JE1BsiC+yLaB1T /nBhBVZVBzi0oq3/g8eeBKZpbn3t0BmFSFpP2KaQ1RfZPiF4PdZzHOetLkbw4yjZ+Xp0 MTTfz60qy7EYfL2m/UeaQ0es12fJwAYNi95NH7cb+J+q7/qpm4O2ViRv8ksd/eWMBjhC abWgHQkBCpXUICqltDrxsduyXpldoWqNBpRvqLAaDKatnpBCThT9Nd0rAbuHZmwiNWNE i0ew+OQD9cfCAZbGGc8r5Zm5xINW7UK6lXRYQoLFEoRET5GIuF3Jf/efzFkD12Eq3NoM kwag== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=IziH99XM; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id gs17si2655352ejb.309.2020.09.29.04.08.14; Tue, 29 Sep 2020 04:08:38 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=IziH99XM; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728600AbgI2LEX (ORCPT + 99 others); Tue, 29 Sep 2020 07:04:23 -0400 Received: from mail.kernel.org ([198.145.29.99]:40406 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728494AbgI2LET (ORCPT ); Tue, 29 Sep 2020 07:04:19 -0400 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 3483721D7D; Tue, 29 Sep 2020 11:04:17 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1601377457; bh=nivr5uKabFiDxArYXNE7/ak5J5omCb8fcQonRumIVTg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=IziH99XM0GkMjA+0YVCPEMlgDWshl7GkUmPHsrgPbDCjSvjLFOxjQrLJLM5C3lwxy WX3y0zWFrB2aCmzufP1hX21fFrqonUlyZms5/+NlfXWPZabCyg1JC7psbv8hhOIhR4 zGSO04G0sG4KJC6DWAoQFJe8635oIUkL6Vk09sBE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Stefan Berger , Nayna Jain , Jarkko Sakkinen , Sasha Levin Subject: [PATCH 4.4 43/85] tpm: ibmvtpm: Wait for buffer to be set before proceeding Date: Tue, 29 Sep 2020 13:00:10 +0200 Message-Id: <20200929105930.386267897@linuxfoundation.org> X-Mailer: git-send-email 2.28.0 In-Reply-To: <20200929105928.198942536@linuxfoundation.org> References: <20200929105928.198942536@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Stefan Berger [ Upstream commit d8d74ea3c00214aee1e1826ca18e77944812b9b4 ] Synchronize with the results from the CRQs before continuing with the initialization. This avoids trying to send TPM commands while the rtce buffer has not been allocated, yet. This patch fixes an existing race condition that may occurr if the hypervisor does not quickly respond to the VTPM_GET_RTCE_BUFFER_SIZE request sent during initialization and therefore the ibmvtpm->rtce_buf has not been allocated at the time the first TPM command is sent. Fixes: 132f76294744 ("drivers/char/tpm: Add new device driver to support IBM vTPM") Signed-off-by: Stefan Berger Acked-by: Nayna Jain Tested-by: Nayna Jain Reviewed-by: Jarkko Sakkinen Signed-off-by: Jarkko Sakkinen Signed-off-by: Sasha Levin --- drivers/char/tpm/tpm_ibmvtpm.c | 9 +++++++++ drivers/char/tpm/tpm_ibmvtpm.h | 1 + 2 files changed, 10 insertions(+) diff --git a/drivers/char/tpm/tpm_ibmvtpm.c b/drivers/char/tpm/tpm_ibmvtpm.c index 3e6a22658b63b..d4cc1a1ac1f73 100644 --- a/drivers/char/tpm/tpm_ibmvtpm.c +++ b/drivers/char/tpm/tpm_ibmvtpm.c @@ -543,6 +543,7 @@ static irqreturn_t ibmvtpm_interrupt(int irq, void *vtpm_instance) */ while ((crq = ibmvtpm_crq_get_next(ibmvtpm)) != NULL) { ibmvtpm_crq_process(crq, ibmvtpm); + wake_up_interruptible(&ibmvtpm->crq_queue.wq); crq->valid = 0; smp_wmb(); } @@ -589,6 +590,7 @@ static int tpm_ibmvtpm_probe(struct vio_dev *vio_dev, } crq_q->num_entry = CRQ_RES_BUF_SIZE / sizeof(*crq_q->crq_addr); + init_waitqueue_head(&crq_q->wq); ibmvtpm->crq_dma_handle = dma_map_single(dev, crq_q->crq_addr, CRQ_RES_BUF_SIZE, DMA_BIDIRECTIONAL); @@ -641,6 +643,13 @@ static int tpm_ibmvtpm_probe(struct vio_dev *vio_dev, if (rc) goto init_irq_cleanup; + if (!wait_event_timeout(ibmvtpm->crq_queue.wq, + ibmvtpm->rtce_buf != NULL, + HZ)) { + dev_err(dev, "CRQ response timed out\n"); + goto init_irq_cleanup; + } + return tpm_chip_register(chip); init_irq_cleanup: do { diff --git a/drivers/char/tpm/tpm_ibmvtpm.h b/drivers/char/tpm/tpm_ibmvtpm.h index 6af92890518f8..1a8c3b698f104 100644 --- a/drivers/char/tpm/tpm_ibmvtpm.h +++ b/drivers/char/tpm/tpm_ibmvtpm.h @@ -31,6 +31,7 @@ struct ibmvtpm_crq_queue { struct ibmvtpm_crq *crq_addr; u32 index; u32 num_entry; + wait_queue_head_t wq; }; struct ibmvtpm_dev { -- 2.25.1