Received: by 2002:a05:6a10:6d25:0:0:0:0 with SMTP id gq37csp1905759pxb; Mon, 13 Sep 2021 07:55:31 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxFueMgAJX20HVd77+1CmvlCe7F1NK9SENNefrXoDXC9Dk9YmrjyNJqWYxsIf6eo7totld1 X-Received: by 2002:a17:906:9241:: with SMTP id c1mr13074330ejx.125.1631544931326; Mon, 13 Sep 2021 07:55:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1631544931; cv=none; d=google.com; s=arc-20160816; b=LZv4+Ky6xyOUmwzJfI9Nk2NzpEZzfFjohYQu8KFCOR+NarpsYx4upT6q1dp26/2mSd A2AlL5csQ4TnQmZY3PH9MtKYGgoiKF2eGu9mhzwG0OgbI6IO2YjxvE6lNAYz3fALOQzT a5qSWrHg+7k0t1yKmiL4HnakJ+dAyoYZyKWZe+idKyQmAt54uVvCQGYPHIaKv8zM+h0O N2n13+TkIrkgPbSOlYjpnoJTKExi9zBLNNjtugnNj/vnPSdS5aK1CBKcjsFIftGI4Jl+ I/wHsC6A9Vn2fvZ8BcivkJqXPX6nv8ysMO83JAZkQxSlyeIotkbgsaqf48cU3RVgGb8T x1XQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=7+arkOPtCWRHBNLOEKZeM+OKPl2bar0YaZLG9YiC3/w=; b=ujjJzb0Qd6ov4l7ZIkHdrappHY0c2CgmIAUF+meBf90iBSoovIDtRM56jZ/RGaSZKo sWIpaWcJVkzdGDXa3Dbau9UTPm4sBcVaCrN35i3BxOm8s6r9xmux0kTZxJnqhn0KHd1f av+uw+hqB5R3g7PdNTJE4TdKJ4xBj0aLxZe24xGidJ7B+d7vGP9M886uSmluy6iqpcuR gs7ThFUurj850kJDnbJYMHID2ddTiwG8gMC0vZCnefYD1XIUEleFUrgvyi0asHI0WJfm e2xFriO86Sq3YWtB7h2y4KaSKe90hNADJqDWGV6yG7DdZrXafmsg7uDsLw0WXYLqoSXj Ox1g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d12si7722238ejj.130.2021.09.13.07.54.46; Mon, 13 Sep 2021 07:55:31 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1346614AbhIMOxH (ORCPT + 99 others); Mon, 13 Sep 2021 10:53:07 -0400 Received: from 212.199.177.27.static.012.net.il ([212.199.177.27]:42989 "EHLO herzl.nuvoton.co.il" rhost-flags-OK-FAIL-OK-FAIL) by vger.kernel.org with ESMTP id S1347133AbhIMOsY (ORCPT ); Mon, 13 Sep 2021 10:48:24 -0400 Received: from taln60.nuvoton.co.il (ntil-fw [212.199.177.25]) by herzl.nuvoton.co.il (8.13.8/8.13.8) with ESMTP id 18DEiX3j003109; Mon, 13 Sep 2021 17:44:33 +0300 Received: by taln60.nuvoton.co.il (Postfix, from userid 10140) id AB7FA63A20; Mon, 13 Sep 2021 17:44:43 +0300 (IDT) From: amirmizi6@gmail.com To: Eyal.Cohen@nuvoton.com, jarkko@kernel.org, oshrialkoby85@gmail.com, alexander.steffen@infineon.com, robh+dt@kernel.org, mark.rutland@arm.com, peterhuewe@gmx.de, jgg@ziepe.ca, arnd@arndb.de, gregkh@linuxfoundation.org, benoit.houyere@st.com, eajames@linux.ibm.com, joel@jms.id.au Cc: devicetree@vger.kernel.org, linux-kernel@vger.kernel.org, linux-integrity@vger.kernel.org, oshri.alkoby@nuvoton.com, tmaimon77@gmail.com, gcwilson@us.ibm.com, kgoldman@us.ibm.com, Dan.Morav@nuvoton.com, oren.tanami@nuvoton.com, shmulik.hager@nuvoton.com, amir.mizinski@nuvoton.com, Amir Mizinski Subject: [PATCH v14 5/7] tpm: tpm_tis: verify TPM_STS register is valid after locality request Date: Mon, 13 Sep 2021 17:43:49 +0300 Message-Id: <20210913144351.101167-6-amirmizi6@gmail.com> X-Mailer: git-send-email 2.22.0 In-Reply-To: <20210913144351.101167-1-amirmizi6@gmail.com> References: <20210913144351.101167-1-amirmizi6@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Amir Mizinski This issue could occur when the TPM does not update TPM_STS register after a locality request (TPM_STS Initial value = 0xFF) and a TPM_STS register read occurs in the tpm_tis_status(chip) function call. When a call to tpm_tis_send_data() function is made after a request_locality() call, the condition ("if ((status & TPM_STS_COMMAND_READY) == 0)") is checked. At this moment if the status value is 0xFF, then it is considered, wrongly, in “ready” state (by checking only one bit). However, at this moment the TPM is, in fact, in "Idle" state and remains in "Idle" state because "tpm_tis_ready(chip);" was not executed. Waiting for the condition TPM_STS.tpmGo == 0, will ensure that the TPM status register has the correct value. Suggested-by: Benoit Houyere Signed-off-by: Amir Mizinski --- drivers/char/tpm/tpm_tis_core.c | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/drivers/char/tpm/tpm_tis_core.c b/drivers/char/tpm/tpm_tis_core.c index 4145758..d527c43 100644 --- a/drivers/char/tpm/tpm_tis_core.c +++ b/drivers/char/tpm/tpm_tis_core.c @@ -177,8 +177,14 @@ static int request_locality(struct tpm_chip *chip, int l) } else { /* wait for burstcount */ do { - if (check_locality(chip, l)) + if (check_locality(chip, l)) { + if (tpm_tis_wait_for_stat(chip, TPM_STS_GO, 0, + chip->timeout_c, + &priv->int_queue, + false) < 0) + return -ETIME; return l; + } tpm_msleep(TPM_TIMEOUT); } while (time_before(jiffies, stop)); } -- 2.7.4