Received: by 2002:a05:6a10:413:0:0:0:0 with SMTP id 19csp2825115pxp; Tue, 8 Mar 2022 02:34:56 -0800 (PST) X-Google-Smtp-Source: ABdhPJyOHxz3zJk5TDmJadtJuLf+W9ow+W+YNUyLU2m1myXbCgQWUq/NPvKGfjxIS95jEgNAwrrs X-Received: by 2002:a17:906:1f05:b0:6ce:69ef:5ef0 with SMTP id w5-20020a1709061f0500b006ce69ef5ef0mr13175374ejj.606.1646735696525; Tue, 08 Mar 2022 02:34:56 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1646735696; cv=none; d=google.com; s=arc-20160816; b=S40QVVYik1aM67oqLRM8UKcfZxtaYsJwo9voXdZ5+MvVQR5S8TjjIZf5+dZmc5lMoa bDXQbt6dRDw/lAM+6pUzwOAw0U47RzqsR3KnydzQDR5NpJ42Pe0FYw2ck8gZVxKWGWm8 Mmq8T5akB97Hkw9dmr9/vaxirwpg/3eSZQMZ0vL8/o4Kt/8QkoQxkYCQ/yq3xFYWfXFF 0DKhR3xe+WGvpPrbpeWPyJSx4LCmbLkr149h9yLZEw1cw0/w8M0EBO1DlQ+xMV8khz/R Lz7gZWc8fE52b9PoXpLDf5YxXfoKobZ+yf2bjO8nTmVcjpZDxq0NCN1rFF+Ngg5ZEI7f 26/g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=68UIJNriO1PvKyY1H+lWDBgUfL0JHO7MoiHoknvo98U=; b=VF3jG5WN/ewbjMQ+HCUhpVLzWCW4k449Ky+g9Tjn1Q4AtBDDrJrdN7zYWcp0BZB4CR i2HI961tqUMTGJPSsShRBK8H+H0mB//64oZeKSPeihbTXDgpkfg7DRJxmIvVH7Y62hhV PQQS3/iWeoqBk71uludu1CulJnQaxc+8R/YuRjpHEma7RYUGQrinOSkTsH0upqwH4fDB T9tdo+glwiRqd2p+0v0vU3sIBJGwBq0II/YuMlWDFSCHcp1mrjjim0ogX+7vmeXYNu+9 OlhCmGan+5dG5pPjmxBcyoU7DRr5XHkoZ53uNy9FLgpPV+M8VeSTH3XBusR1k5KYyg7U Cy6A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="Wyml7Am/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id w2-20020a056402128200b0041627c1f70fsi5743274edv.629.2022.03.08.02.34.33; Tue, 08 Mar 2022 02:34:56 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="Wyml7Am/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233094AbiCHIbb (ORCPT + 99 others); Tue, 8 Mar 2022 03:31:31 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58574 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238409AbiCHIbY (ORCPT ); Tue, 8 Mar 2022 03:31:24 -0500 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id EA70A3F8A1; Tue, 8 Mar 2022 00:30:24 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 9924FB8179F; Tue, 8 Mar 2022 08:30:23 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id DD48FC340EB; Tue, 8 Mar 2022 08:30:21 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1646728222; bh=d4iX8PMKAGFjzqQJsmEWtLrsA3AzOiHHSY+t4oi+qwo=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=Wyml7Am/nzk+GK45JiukdCoLYjIeuQbDYqgDJxA/Ge5dZXUOoTVH2Kq2PKrmiYcTI mfj0O29ZG+Kgcfel2g5Ymz+Ye7gVpUOrQ2ajEUvtQDt4RitMQINFc/bPSD1qvmq/Xd RyDFqv71c+ndZ6gLyhJYEJRa6mUT7GACA9yJAvFbusIYfiFwpXmVrUo+yH6TBbUxu1 AaHVuYDou1Ld96hJF12vkfaTICg4yL/4zzMJhL7OIe3irpG3NPFTYBDawpnjdbZioh VBvcabxQ2Uad9ERSArFwdCslBGgndE0JcZEwktTeZtSo7MFouUZw2r6Ue30r9Hz6vs wHvETz1aPTaCw== Date: Tue, 8 Mar 2022 10:29:41 +0200 From: Jarkko Sakkinen To: James Bottomley Cc: Sergey Temerkhanov , Peter Huewe , Jason Gunthorpe , Jerry Snitselaar , linux-integrity@vger.kernel.org, linux-kernel Subject: Re: [PATCH] tpm: use try_get_ops() in tpm-space.c Message-ID: References: <3953c743ce7e7fc1db26f5b849b53df671b2f221.camel@HansenPartnership.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <3953c743ce7e7fc1db26f5b849b53df671b2f221.camel@HansenPartnership.com> X-Spam-Status: No, score=-7.6 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Mar 07, 2022 at 03:58:03PM -0500, James Bottomley wrote: > As part of the series conversion to remove nested TPM operations: > > https://lore.kernel.org/all/20190205224723.19671-1-jarkko.sakkinen@linux.intel.com/ > > exposure of the chip->tpm_mutex was removed from much of the upper > level code. In this conversion, tpm2_del_space() was missed. This > didn't matter much because it's usually called closely after a > converted operation, so there's only a very tiny race window where the > chip can be removed before the space flushing is done which causes a > NULL deref on the mutex. However, there are reports of this window > being hit in practice, so fix this by converting tpm2_del_space() to > use tpm_try_get_ops(), which performs all the teardown checks before > acquring the mutex. > > Signed-off-by: James Bottomley > Reviewed-by: Jarkko Sakkinen > --- > drivers/char/tpm/tpm2-space.c | 8 ++++---- > 1 file changed, 4 insertions(+), 4 deletions(-) > > diff --git a/drivers/char/tpm/tpm2-space.c b/drivers/char/tpm/tpm2-space.c > index 265ec72b1d81..ffb35f0154c1 100644 > --- a/drivers/char/tpm/tpm2-space.c > +++ b/drivers/char/tpm/tpm2-space.c > @@ -58,12 +58,12 @@ int tpm2_init_space(struct tpm_space *space, unsigned int buf_size) > > void tpm2_del_space(struct tpm_chip *chip, struct tpm_space *space) > { > - mutex_lock(&chip->tpm_mutex); > - if (!tpm_chip_start(chip)) { > + > + if (tpm_try_get_ops(chip) == 0) { > tpm2_flush_sessions(chip, space); > - tpm_chip_stop(chip); > + tpm_put_ops(chip); > } > - mutex_unlock(&chip->tpm_mutex); > + > kfree(space->context_buf); > kfree(space->session_buf); > } > -- > 2.34.1 > > Thank you! BR, Jarkko