Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp537217pxb; Wed, 3 Mar 2021 09:06:18 -0800 (PST) X-Google-Smtp-Source: ABdhPJw7OIoJBHG93n6pf+IYIMpthV9J3NG7ApCxrMgZwdJVK19ECeWiZbFXEtbbrBnmhJoOxVVF X-Received: by 2002:a17:906:13c4:: with SMTP id g4mr26904752ejc.390.1614791178065; Wed, 03 Mar 2021 09:06:18 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1614791178; cv=none; d=google.com; s=arc-20160816; b=0l1Pz6YMXOcnlrv255HkZogfhIWOeuyc72/1lRwGsrfPgu1gNoW7PlDG0kaNwb8WpO l2YrT14HQK6+1spIVawEhB206ixDKMVhzCJdbyGFkL32VKxbHvQlQ0VBFR6YI3aA1+jQ 1ln4qJqjLYsOxeUn+Hyk4vKgGxhooGr9LQH+Qjbp/neW2OOGa+0+xcb0TPUYNh1pz/9J wN+Kn29t4FVnnD6S1lMarWIrl61cLFpvqNgvhoVg/xvTIb95CzMTCiheS41NNl3iknKO mYiSHmunUab/9/2/KSZcXYU/WA2pSiKk+zhBYh+2miXNSgc0JLu4vSYpAI2v/NFpl1gu TUsw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=NjI2kqfv1TOSJ9cn1GFWYbHUJ6kIUu6DzuCSgNz9MYg=; b=BTg6FD5qbeYs8sMJNDnEpgLbu+KgxPfA2jP9NG7c/oBnz6/K8tDhFaMQBN+GjMYS2f XKuk0xKa4V+OCWnGh9D3tHTuy9qoRxRq/mN4JCgCgEIgY3Uxec+AYu/+jFS/1WWldi9r MI/amHqRcFK3zCnb1dVAdPnTzopw3w+AdlsNElxc48MRWsLB3Rnts2g9ZMrDbEtpjfyh xEVBgsi7aBROu1f5ml6B7FmbSwLRglj8kPBIDeJraWttJoqieHlFBFAS1xvvuK4PdIXW cIPu/nRBqAALyNEa2FL5U5Mm8BHjg3Frrtr1d4CQ3f+RAOG+lLIH1cF4/LwaZWpx0w7M ti3A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=Ur2Vi7Oe; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id ke3si7024007ejc.747.2021.03.03.09.05.42; Wed, 03 Mar 2021 09:06:18 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=Ur2Vi7Oe; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1346956AbhCBAlu (ORCPT + 99 others); Mon, 1 Mar 2021 19:41:50 -0500 Received: from mail.kernel.org ([198.145.29.99]:47668 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240109AbhCASgI (ORCPT ); Mon, 1 Mar 2021 13:36:08 -0500 Received: by mail.kernel.org (Postfix) with ESMTPSA id CD019650F1; Mon, 1 Mar 2021 17:00:58 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1614618059; bh=UUXgxDay4hebN8voDxmb3sKyYbiChEgdwOuhSR/bO1M=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Ur2Vi7OeQV/BoCYfzsVTffp4D8Pfd3aWVnuSMdVKzo+4eNvaj11OJIFh8IXPOIjGO XVFUk4uOBDy4vytG52akHSnBLYMO/3seydtSmAx7NRjxFLQaVbRuuLgtAwmnxgh/ik RB5D9HriWwv4Uy3tbnXkl4ymctvub1/8NZPGD27g= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, stable@ger.kernel.org, James Bottomley , Jerry Snitselaar , Jarkko Sakkinen Subject: [PATCH 5.4 262/340] tpm_tis: Fix check_locality for correct locality acquisition Date: Mon, 1 Mar 2021 17:13:26 +0100 Message-Id: <20210301161101.188955558@linuxfoundation.org> X-Mailer: git-send-email 2.30.1 In-Reply-To: <20210301161048.294656001@linuxfoundation.org> References: <20210301161048.294656001@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: James Bottomley commit 3d9ae54af1d02a7c0edc55c77d7df2b921e58a87 upstream. The TPM TIS specification says the TPM signals the acquisition of locality when the TMP_ACCESS_REQUEST_USE bit goes to one *and* the TPM_ACCESS_REQUEST_USE bit goes to zero. Currently we only check the former not the latter, so check both. Adding the check on TPM_ACCESS_REQUEST_USE should fix the case where the locality is re-requested before the TPM has released it. In this case the locality may get released briefly before it is reacquired, which causes all sorts of problems. However, with the added check, TPM_ACCESS_REQUEST_USE should remain 1 until the second request for the locality is granted. Cc: stable@ger.kernel.org Fixes: 27084efee0c3 ("[PATCH] tpm: driver for next generation TPM chips") Signed-off-by: James Bottomley Reviewed-by: Jerry Snitselaar Signed-off-by: Jarkko Sakkinen Signed-off-by: Greg Kroah-Hartman --- drivers/char/tpm/tpm_tis_core.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) --- a/drivers/char/tpm/tpm_tis_core.c +++ b/drivers/char/tpm/tpm_tis_core.c @@ -125,7 +125,8 @@ static bool check_locality(struct tpm_ch if (rc < 0) return false; - if ((access & (TPM_ACCESS_ACTIVE_LOCALITY | TPM_ACCESS_VALID)) == + if ((access & (TPM_ACCESS_ACTIVE_LOCALITY | TPM_ACCESS_VALID + | TPM_ACCESS_REQUEST_USE)) == (TPM_ACCESS_ACTIVE_LOCALITY | TPM_ACCESS_VALID)) { priv->locality = l; return true;