[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <3315246e429b385bbd08c8a509843e99dcc829e3.camel@HansenPartnership.com>
Date: Thu, 22 Apr 2021 13:26:48 -0700
From: James Bottomley <James.Bottomley@...senPartnership.com>
To: Andrew Morton <akpm@...ux-foundation.org>,
Linus Torvalds <torvalds@...ux-foundation.org>
Cc: linux-kernel <linux-kernel@...r.kernel.org>,
Mimi Zohar <zohar@...ux.ibm.com>, jarkko@...nel.org,
linux-integrity@...r.kernel.org, keyrings@...r.kernel.org,
David Howells <dhowells@...hat.com>
Subject: [GIT PULL] KEYS: trusted fixes for 5.12-rc7
This is an urgent regression fix for a tpm patch set that went in this
merge window. It looks like a rebase before the original pull request
lost a tpm_try_get_ops() so we have a lock imbalance in our code which
is causing oopses. The original patch was correct on the mailing list.
I'm sending this in agreement with Mimi (as joint maintainers of
trusted keys) because Jarkko is off communing with the Reindeer or
whatever it is Finns do when on holiday.
git://git.kernel.org/pub/scm/linux/kernel/git/jejb/tpmdd.git fixes
The short changelog is:
James Bottomley (1):
KEYS: trusted: Fix TPM reservation for seal/unseal
And the diffstat:
security/keys/trusted-keys/trusted_tpm2.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
With full diff below.
James
---
diff --git a/security/keys/trusted-keys/trusted_tpm2.c b/security/keys/trusted-keys/trusted_tpm2.c
index e2a0ed5d02f0..c87c4df8703d 100644
--- a/security/keys/trusted-keys/trusted_tpm2.c
+++ b/security/keys/trusted-keys/trusted_tpm2.c
@@ -79,7 +79,7 @@ int tpm2_seal_trusted(struct tpm_chip *chip,
if (i == ARRAY_SIZE(tpm2_hash_map))
return -EINVAL;
- rc = tpm_buf_init(&buf, TPM2_ST_SESSIONS, TPM2_CC_CREATE);
+ rc = tpm_try_get_ops(chip);
if (rc)
return rc;
Powered by blists - more mailing lists