From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-15.7 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH, MAILING_LIST_MULTI,MENTIONS_GIT_HOSTING,SPF_HELO_NONE,SPF_NONE autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3085AC433ED for ; Thu, 22 Apr 2021 20:26:52 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id F1E7361425 for ; Thu, 22 Apr 2021 20:26:51 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236949AbhDVU10 (ORCPT ); Thu, 22 Apr 2021 16:27:26 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:59542 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236877AbhDVU1Z (ORCPT ); Thu, 22 Apr 2021 16:27:25 -0400 Received: from bedivere.hansenpartnership.com (bedivere.hansenpartnership.com [IPv6:2607:fcd0:100:8a00::2]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 9FFD7C06174A; Thu, 22 Apr 2021 13:26:50 -0700 (PDT) Received: from localhost (localhost [127.0.0.1]) by bedivere.hansenpartnership.com (Postfix) with ESMTP id 1E3E0128064B; Thu, 22 Apr 2021 13:26:50 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=hansenpartnership.com; s=20151216; t=1619123210; bh=lpKpLvDQXs9Q1NT+GrGlV26p58c3MffiY5+OKf1+e+w=; h=Message-ID:Subject:From:To:Date:From; b=XBoHKLeABmtc9VSExXGpBUJcNmTiYYY7Xq9XID6UBEfeBWQ3h4jbjKNaJmgNY1lWG Qc2MfKVCNIK2xWGVsvBMvLrTJi1Q0kcJ8Ek3V8iuFfHTyWq6MTIf37GSpoZfvv1Oix 9OBXbN+pkT4lfvrw1nf8e+udS6PdeBQY/c8C9cmg= Received: from bedivere.hansenpartnership.com ([127.0.0.1]) by localhost (bedivere.hansenpartnership.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lZCDzqQ8o4I4; Thu, 22 Apr 2021 13:26:50 -0700 (PDT) Received: from jarvis.int.hansenpartnership.com (unknown [IPv6:2601:600:8280:66d1::527]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by bedivere.hansenpartnership.com (Postfix) with ESMTPSA id 7A749128064A; Thu, 22 Apr 2021 13:26:49 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=hansenpartnership.com; s=20151216; t=1619123209; bh=lpKpLvDQXs9Q1NT+GrGlV26p58c3MffiY5+OKf1+e+w=; h=Message-ID:Subject:From:To:Date:From; b=hJxS7DxFsB1c1iCdADorsimylaRFA8On+fYLM5W1mPU8jdwBM+Rh94rTLkQw23t/i 9yH/Wo2QDtRRFhTVCZB6mdk9MCkdyAy+hamWthEbnYAKYYVAmSQT8Gwa72KjJV2/Sx JAIN7UBo068NKIDvPSE73EQgTZVoOiFxqpq9JMKo= Message-ID: <3315246e429b385bbd08c8a509843e99dcc829e3.camel@HansenPartnership.com> Subject: [GIT PULL] KEYS: trusted fixes for 5.12-rc7 From: James Bottomley To: Andrew Morton , Linus Torvalds Cc: linux-kernel , Mimi Zohar , jarkko@kernel.org, linux-integrity@vger.kernel.org, keyrings@vger.kernel.org, David Howells Date: Thu, 22 Apr 2021 13:26:48 -0700 Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.34.4 MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-integrity@vger.kernel.org This is an urgent regression fix for a tpm patch set that went in this merge window. It looks like a rebase before the original pull request lost a tpm_try_get_ops() so we have a lock imbalance in our code which is causing oopses. The original patch was correct on the mailing list. I'm sending this in agreement with Mimi (as joint maintainers of trusted keys) because Jarkko is off communing with the Reindeer or whatever it is Finns do when on holiday. git://git.kernel.org/pub/scm/linux/kernel/git/jejb/tpmdd.git fixes The short changelog is: James Bottomley (1): KEYS: trusted: Fix TPM reservation for seal/unseal And the diffstat: security/keys/trusted-keys/trusted_tpm2.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) With full diff below. James --- diff --git a/security/keys/trusted-keys/trusted_tpm2.c b/security/keys/trusted-keys/trusted_tpm2.c index e2a0ed5d02f0..c87c4df8703d 100644 --- a/security/keys/trusted-keys/trusted_tpm2.c +++ b/security/keys/trusted-keys/trusted_tpm2.c @@ -79,7 +79,7 @@ int tpm2_seal_trusted(struct tpm_chip *chip, if (i == ARRAY_SIZE(tpm2_hash_map)) return -EINVAL; - rc = tpm_buf_init(&buf, TPM2_ST_SESSIONS, TPM2_CC_CREATE); + rc = tpm_try_get_ops(chip); if (rc) return rc;