Received: by 2002:a05:6a10:1d13:0:0:0:0 with SMTP id pp19csp375099pxb; Thu, 26 Aug 2021 05:24:10 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxrslm82V2UNAU7Xv9wkRwrKq8fDNDtKFB0QAM/rpo9jyKd3U56+oMYuTqG2F6EBpdOuoH7 X-Received: by 2002:a05:6402:424c:: with SMTP id g12mr4001595edb.121.1629980650265; Thu, 26 Aug 2021 05:24:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1629980650; cv=none; d=google.com; s=arc-20160816; b=I3/G3FUX4NBlrSfGVcz1cU2g8zhob3q1r0m8mNq9bKRyIpx/DsgDd5S8fTIrh4A1p0 9X1tR6bV5bisSyL04gpuTCvuZE2zrMA3EefTgbFR8HQEpovlXitMwhZES31+rXKhHGZu ZzJdCifX6VB2z+WxNI2P+J6Pe+FBi+0KkNbsJvXqZc7RsrhQiZGfHktZzGwuSwnmaw2X IlPnrmAdOpgk226j1P6cHT4IdsYUyP1yxHyhCzpBigq8693Jn+A4BlNFKks6np8Zwydt OwjSscMikpTg1N5jLTfHD4pNdFdpZ0UY7mVx3FxjrK379sPVIc8UjO1AK7X5uiwjJcTD rBCg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=AjqnJ7MYQV7ZP6MkJON6Vpy+iomhSXBRWuBSIvStmvA=; b=LyPfRAUQika0gmJeEQBXQilMkyt7Xofjcn5mgO8loEyNqgHlGwoh83bEPz65IAdWPS AR0/er4z2Uksw99d5OkAiP/6dKLWxuc8na4tQH+HlzUDhPjv9grq1c53D+6szK36Wwty QnRoZrClvawoWquUlFXtMw/aCRpaW6kgJ0lNL+6y+TnHYEvT8QiUwbBN2oizeN4OLZdf 4p0Jgw4kG75nIZJ7kRm52VbWWxEp37gB1yWHAtAUT4k/eBzH6/mzO8TtbPDqcWXcWndg fm93NZQTqvs5SbyiRF6/OqtCcf3y/fbSwNL8Xj5MCQCCktK8Ysm2QGpr0bsmVWHFhmB+ 4uMQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id h8si3158470ejj.422.2021.08.26.05.23.36; Thu, 26 Aug 2021 05:24:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S242551AbhHZMTm (ORCPT + 99 others); Thu, 26 Aug 2021 08:19:42 -0400 Received: from 212.199.177.27.static.012.net.il ([212.199.177.27]:41648 "EHLO herzl.nuvoton.co.il" rhost-flags-OK-FAIL-OK-FAIL) by vger.kernel.org with ESMTP id S242508AbhHZMTm (ORCPT ); Thu, 26 Aug 2021 08:19:42 -0400 Received: from taln60.nuvoton.co.il (ntil-fw [212.199.177.25]) by herzl.nuvoton.co.il (8.13.8/8.13.8) with ESMTP id 17QBJZw3025253; Thu, 26 Aug 2021 14:19:35 +0300 Received: by taln60.nuvoton.co.il (Postfix, from userid 10140) id 2A4A463A1D; Thu, 26 Aug 2021 14:19:45 +0300 (IDT) From: amirmizi6@gmail.com To: Eyal.Cohen@nuvoton.com, jarkko.sakkinen@linux.intel.com, oshrialkoby85@gmail.com, alexander.steffen@infineon.com, robh+dt@kernel.org, mark.rutland@arm.com, peterhuewe@gmx.de, jgg@ziepe.ca, arnd@arndb.de, gregkh@linuxfoundation.org, benoit.houyere@st.com, eajames@linux.ibm.com, joel@jms.id.au Cc: devicetree@vger.kernel.org, linux-kernel@vger.kernel.org, linux-integrity@vger.kernel.org, oshri.alkoby@nuvoton.com, tmaimon77@gmail.com, gcwilson@us.ibm.com, kgoldman@us.ibm.com, Dan.Morav@nuvoton.com, oren.tanami@nuvoton.com, shmulik.hager@nuvoton.com, amir.mizinski@nuvoton.com, Amir Mizinski Subject: [PATCH v13 5/7] tpm: tpm_tis: verify TPM_STS register is valid after locality request Date: Thu, 26 Aug 2021 14:19:06 +0300 Message-Id: <20210826111908.117278-6-amirmizi6@gmail.com> X-Mailer: git-send-email 2.22.0 In-Reply-To: <20210826111908.117278-1-amirmizi6@gmail.com> References: <20210826111908.117278-1-amirmizi6@gmail.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Amir Mizinski Issue could result when the TPM does not update TPM_STS register after a locality request (TPM_STS Initial value = 0xFF) and a TPM_STS register read occurs (tpm_tis_status(chip)). Checking the next condition("if ((status & TPM_STS_COMMAND_READY) == 0)"), the status will be at 0xFF and will be considered, wrongly, in "Ready" state (by checking only one bit). However, at this moment the TPM is, in fact, in "Idle" state and remains in "Idle" state because "tpm_tis_ready(chip);" was not executed. Suggested-by: Benoit Houyere Signed-off-by: Amir Mizinski --- drivers/char/tpm/tpm_tis_core.c | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/drivers/char/tpm/tpm_tis_core.c b/drivers/char/tpm/tpm_tis_core.c index 4145758..d527c43 100644 --- a/drivers/char/tpm/tpm_tis_core.c +++ b/drivers/char/tpm/tpm_tis_core.c @@ -177,8 +177,14 @@ static int request_locality(struct tpm_chip *chip, int l) } else { /* wait for burstcount */ do { - if (check_locality(chip, l)) + if (check_locality(chip, l)) { + if (tpm_tis_wait_for_stat(chip, TPM_STS_GO, 0, + chip->timeout_c, + &priv->int_queue, + false) < 0) + return -ETIME; return l; + } tpm_msleep(TPM_TIMEOUT); } while (time_before(jiffies, stop)); } -- 2.7.4