summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorThorsten Leemhuis <fedora@leemhuis.info>2019-10-01 08:48:04 +0200
committerThorsten Leemhuis <fedora@leemhuis.info>2019-10-01 08:48:04 +0200
commit774f64772085b64b40deb85a0ebf6c1725f3224b (patch)
tree18344fa83b2b9e7680570923b7abc3b0b9ad63ff
parent54102d4aaa7c0b293841d692e80c57e07c550fd2 (diff)
parent715d4067537b216ffb402b0feb5ac1c354f50601 (diff)
downloadkernel-774f64772085b64b40deb85a0ebf6c1725f3224b.tar.gz
kernel-774f64772085b64b40deb85a0ebf6c1725f3224b.tar.xz
kernel-774f64772085b64b40deb85a0ebf6c1725f3224b.zip
merge origin
-rw-r--r--0001-x86-amd_nb-Add-PCI-device-IDs-for-family-17h-model-7.patch92
-rw-r--r--iwlwifi-fw-don-t-send-GEO_TX_POWER_LIMIT-command-to-FW-version-36.patch87
-rw-r--r--kernel.spec22
-rw-r--r--v2-1-2-efi-tpm-Don-t-access-event--count-when-it-isn-t-mapped..patch233
-rw-r--r--v3-tpm-only-set-efi_tpm_final_log_size-after-successful-event-log-parsing.patch190
5 files changed, 621 insertions, 3 deletions
diff --git a/0001-x86-amd_nb-Add-PCI-device-IDs-for-family-17h-model-7.patch b/0001-x86-amd_nb-Add-PCI-device-IDs-for-family-17h-model-7.patch
new file mode 100644
index 000000000..327789e50
--- /dev/null
+++ b/0001-x86-amd_nb-Add-PCI-device-IDs-for-family-17h-model-7.patch
@@ -0,0 +1,92 @@
+From af4e1c5eca95bed1192d8dc45c8ed63aea2209e8 Mon Sep 17 00:00:00 2001
+From: Marcel Bocu <marcel.p.bocu@gmail.com>
+Date: Mon, 22 Jul 2019 20:45:10 +0300
+Subject: [PATCH] x86/amd_nb: Add PCI device IDs for family 17h, model 70h
+
+The AMD Ryzen gen 3 processors came with a different PCI IDs for the
+function 3 & 4 which are used to access the SMN interface. The root
+PCI address however remained at the same address as the model 30h.
+
+Adding the F3/F4 PCI IDs respectively to the misc and link ids appear
+to be sufficient for k10temp, so let's add them and follow up on the
+patch if other functions need more tweaking.
+
+Vicki Pfau sent an identical patch after I checked that no-one had
+written this patch. I would have been happy about dropping my patch but
+unlike for his patch series, I had already Cc:ed the x86 people and
+they already reviewed the changes. Since Vicki has not answered to
+any email after his initial series, let's assume she is on vacation
+and let's avoid duplication of reviews from the maintainers and merge
+my series. To acknowledge Vicki's anteriority, I added her S-o-b to
+the patch.
+
+v2, suggested by Guenter Roeck and Brian Woods:
+ - rename from 71h to 70h
+
+Signed-off-by: Vicki Pfau <vi@endrift.com>
+Signed-off-by: Marcel Bocu <marcel.p.bocu@gmail.com>
+Tested-by: Marcel Bocu <marcel.p.bocu@gmail.com>
+Acked-by: Thomas Gleixner <tglx@linutronix.de>
+Acked-by: Brian Woods <brian.woods@amd.com>
+Acked-by: Bjorn Helgaas <bhelgaas@google.com> # pci_ids.h
+
+Cc: Thomas Gleixner <tglx@linutronix.de>
+Cc: Ingo Molnar <mingo@redhat.com>
+Cc: Borislav Petkov <bp@alien8.de>
+Cc: "H. Peter Anvin" <hpa@zytor.com>
+Cc: x86@kernel.org
+Cc: "Woods, Brian" <Brian.Woods@amd.com>
+Cc: Clemens Ladisch <clemens@ladisch.de>
+Cc: Jean Delvare <jdelvare@suse.com>
+Cc: Guenter Roeck <linux@roeck-us.net>
+Cc: linux-hwmon@vger.kernel.org
+Link: https://lore.kernel.org/r/20190722174510.2179-1-marcel.p.bocu@gmail.com
+Signed-off-by: Guenter Roeck <linux@roeck-us.net>
+---
+ arch/x86/kernel/amd_nb.c | 3 +++
+ include/linux/pci_ids.h | 1 +
+ 2 files changed, 4 insertions(+)
+
+diff --git a/arch/x86/kernel/amd_nb.c b/arch/x86/kernel/amd_nb.c
+index d63e63b7d1d9..251c795b4eb3 100644
+--- a/arch/x86/kernel/amd_nb.c
++++ b/arch/x86/kernel/amd_nb.c
+@@ -21,6 +21,7 @@
+ #define PCI_DEVICE_ID_AMD_17H_DF_F4 0x1464
+ #define PCI_DEVICE_ID_AMD_17H_M10H_DF_F4 0x15ec
+ #define PCI_DEVICE_ID_AMD_17H_M30H_DF_F4 0x1494
++#define PCI_DEVICE_ID_AMD_17H_M70H_DF_F4 0x1444
+
+ /* Protect the PCI config register pairs used for SMN and DF indirect access. */
+ static DEFINE_MUTEX(smn_mutex);
+@@ -50,6 +51,7 @@ const struct pci_device_id amd_nb_misc_ids[] = {
+ { PCI_DEVICE(PCI_VENDOR_ID_AMD, PCI_DEVICE_ID_AMD_17H_M10H_DF_F3) },
+ { PCI_DEVICE(PCI_VENDOR_ID_AMD, PCI_DEVICE_ID_AMD_17H_M30H_DF_F3) },
+ { PCI_DEVICE(PCI_VENDOR_ID_AMD, PCI_DEVICE_ID_AMD_CNB17H_F3) },
++ { PCI_DEVICE(PCI_VENDOR_ID_AMD, PCI_DEVICE_ID_AMD_17H_M70H_DF_F3) },
+ {}
+ };
+ EXPORT_SYMBOL_GPL(amd_nb_misc_ids);
+@@ -63,6 +65,7 @@ static const struct pci_device_id amd_nb_link_ids[] = {
+ { PCI_DEVICE(PCI_VENDOR_ID_AMD, PCI_DEVICE_ID_AMD_17H_DF_F4) },
+ { PCI_DEVICE(PCI_VENDOR_ID_AMD, PCI_DEVICE_ID_AMD_17H_M10H_DF_F4) },
+ { PCI_DEVICE(PCI_VENDOR_ID_AMD, PCI_DEVICE_ID_AMD_17H_M30H_DF_F4) },
++ { PCI_DEVICE(PCI_VENDOR_ID_AMD, PCI_DEVICE_ID_AMD_17H_M70H_DF_F4) },
+ { PCI_DEVICE(PCI_VENDOR_ID_AMD, PCI_DEVICE_ID_AMD_CNB17H_F4) },
+ {}
+ };
+diff --git a/include/linux/pci_ids.h b/include/linux/pci_ids.h
+index c842735a4f45..4b97f427cc92 100644
+--- a/include/linux/pci_ids.h
++++ b/include/linux/pci_ids.h
+@@ -548,6 +548,7 @@
+ #define PCI_DEVICE_ID_AMD_17H_DF_F3 0x1463
+ #define PCI_DEVICE_ID_AMD_17H_M10H_DF_F3 0x15eb
+ #define PCI_DEVICE_ID_AMD_17H_M30H_DF_F3 0x1493
++#define PCI_DEVICE_ID_AMD_17H_M70H_DF_F3 0x1443
+ #define PCI_DEVICE_ID_AMD_CNB17H_F3 0x1703
+ #define PCI_DEVICE_ID_AMD_LANCE 0x2000
+ #define PCI_DEVICE_ID_AMD_LANCE_HOME 0x2001
+--
+2.21.0
+
diff --git a/iwlwifi-fw-don-t-send-GEO_TX_POWER_LIMIT-command-to-FW-version-36.patch b/iwlwifi-fw-don-t-send-GEO_TX_POWER_LIMIT-command-to-FW-version-36.patch
new file mode 100644
index 000000000..f583a5b2d
--- /dev/null
+++ b/iwlwifi-fw-don-t-send-GEO_TX_POWER_LIMIT-command-to-FW-version-36.patch
@@ -0,0 +1,87 @@
+From patchwork Tue Sep 24 10:30:57 2019
+Content-Type: text/plain; charset="utf-8"
+MIME-Version: 1.0
+Content-Transfer-Encoding: 7bit
+X-Patchwork-Submitter: Luca Coelho <luca@coelho.fi>
+X-Patchwork-Id: 11158395
+X-Patchwork-Delegate: kvalo@adurom.com
+Return-Path: <SRS0=l3ON=XT=vger.kernel.org=linux-wireless-owner@kernel.org>
+Received: from mail.kernel.org (pdx-korg-mail-1.web.codeaurora.org
+ [172.30.200.123])
+ by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 62FF3112B
+ for <patchwork-linux-wireless@patchwork.kernel.org>;
+ Tue, 24 Sep 2019 10:31:06 +0000 (UTC)
+Received: from vger.kernel.org (vger.kernel.org [209.132.180.67])
+ by mail.kernel.org (Postfix) with ESMTP id 4AA4E214D9
+ for <patchwork-linux-wireless@patchwork.kernel.org>;
+ Tue, 24 Sep 2019 10:31:06 +0000 (UTC)
+Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand
+ id S2409468AbfIXKbF (ORCPT
+ <rfc822;patchwork-linux-wireless@patchwork.kernel.org>);
+ Tue, 24 Sep 2019 06:31:05 -0400
+Received: from paleale.coelho.fi ([176.9.41.70]:44742 "EHLO
+ farmhouse.coelho.fi" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org
+ with ESMTP id S2387644AbfIXKbF (ORCPT
+ <rfc822;linux-wireless@vger.kernel.org>);
+ Tue, 24 Sep 2019 06:31:05 -0400
+Received: from [91.156.6.193] (helo=redipa.ger.corp.intel.com)
+ by farmhouse.coelho.fi with esmtpsa
+ (TLS1.3:ECDHE_X25519__RSA_PSS_RSAE_SHA256__AES_256_GCM:256)
+ (Exim 4.92)
+ (envelope-from <luca@coelho.fi>)
+ id 1iCi63-0005Je-8E; Tue, 24 Sep 2019 13:31:03 +0300
+From: Luca Coelho <luca@coelho.fi>
+To: kvalo@codeaurora.org
+Cc: linux-wireless@vger.kernel.org
+Date: Tue, 24 Sep 2019 13:30:57 +0300
+Message-Id: <20190924103057.17147-1-luca@coelho.fi>
+X-Mailer: git-send-email 2.23.0
+MIME-Version: 1.0
+X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on farmhouse.coelho.fi
+X-Spam-Level:
+X-Spam-Status: No, score=-2.9 required=5.0 tests=ALL_TRUSTED,BAYES_00,
+ URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.2
+Subject: [PATCH v5.4] iwlwifi: fw: don't send GEO_TX_POWER_LIMIT command to FW
+ version 36
+Sender: linux-wireless-owner@vger.kernel.org
+Precedence: bulk
+List-ID: <linux-wireless.vger.kernel.org>
+X-Mailing-List: linux-wireless@vger.kernel.org
+
+From: Luca Coelho <luciano.coelho@intel.com>
+
+The intention was to have the GEO_TX_POWER_LIMIT command in FW version
+36 as well, but not all 8000 family got this feature enabled. The
+8000 family is the only one using version 36, so skip this version
+entirely. If we try to send this command to the firmwares that do not
+support it, we get a BAD_COMMAND response from the firmware.
+
+This fixes https://bugzilla.kernel.org/show_bug.cgi?id=204151.
+
+Cc: stable@vger.kernel.org # 4.19+
+Signed-off-by: Luca Coelho <luciano.coelho@intel.com>
+---
+ drivers/net/wireless/intel/iwlwifi/mvm/fw.c | 8 +++++---
+ 1 file changed, 5 insertions(+), 3 deletions(-)
+
+diff --git a/drivers/net/wireless/intel/iwlwifi/mvm/fw.c b/drivers/net/wireless/intel/iwlwifi/mvm/fw.c
+index 014eca6596e2..32a5e4e5461f 100644
+--- a/drivers/net/wireless/intel/iwlwifi/mvm/fw.c
++++ b/drivers/net/wireless/intel/iwlwifi/mvm/fw.c
+@@ -889,11 +889,13 @@ static bool iwl_mvm_sar_geo_support(struct iwl_mvm *mvm)
+ * firmware versions. Unfortunately, we don't have a TLV API
+ * flag to rely on, so rely on the major version which is in
+ * the first byte of ucode_ver. This was implemented
+- * initially on version 38 and then backported to 36, 29 and
+- * 17.
++ * initially on version 38 and then backported to29 and 17.
++ * The intention was to have it in 36 as well, but not all
++ * 8000 family got this feature enabled. The 8000 family is
++ * the only one using version 36, so skip this version
++ * entirely.
+ */
+ return IWL_UCODE_SERIAL(mvm->fw->ucode_ver) >= 38 ||
+- IWL_UCODE_SERIAL(mvm->fw->ucode_ver) == 36 ||
+ IWL_UCODE_SERIAL(mvm->fw->ucode_ver) == 29 ||
+ IWL_UCODE_SERIAL(mvm->fw->ucode_ver) == 17;
+ }
diff --git a/kernel.spec b/kernel.spec
index b53dcf453..28d5c39a4 100644
--- a/kernel.spec
+++ b/kernel.spec
@@ -591,14 +591,24 @@ Patch332: arm64-dts-qcom-Add-Lenovo-Yoga-C630.patch
Patch501: input-rmi4-remove-the-need-for-artifical-IRQ.patch
# gcc9 fixes
-Patch507: 0001-Drop-that-for-now.patch
+Patch502: 0001-Drop-that-for-now.patch
# https://bugzilla.redhat.com/show_bug.cgi?id=1701096
# Submitted upstream at https://lkml.org/lkml/2019/4/23/89
-Patch508: KEYS-Make-use-of-platform-keyring-for-module-signature.patch
+Patch503: KEYS-Make-use-of-platform-keyring-for-module-signature.patch
# rhbz 1753099
-Patch509: dwc3-fix.patch
+Patch504: dwc3-fix.patch
+
+# https://patchwork.kernel.org/patch/11158395/
+Patch505: iwlwifi-fw-don-t-send-GEO_TX_POWER_LIMIT-command-to-FW-version-36.patch
+
+# new ids
+Patch506: 0001-x86-amd_nb-Add-PCI-device-IDs-for-family-17h-model-7.patch
+
+# rhbz 1752961
+Patch507: v2-1-2-efi-tpm-Don-t-access-event--count-when-it-isn-t-mapped..patch
+Patch508: v3-tpm-only-set-efi_tpm_final_log_size-after-successful-event-log-parsing.patch
# END OF PATCH DEFINITIONS
@@ -1804,6 +1814,12 @@ fi
#
#
%changelog
+* Mon Sep 30 2019 Laura Abbott <labbott@redhat.com>
+- Fix for tpm crashes (rhbz 1752961)
+
+* Mon Sep 23 2019 Peter Robinson <pbrobinson@fedoraproject.org> 5.3.1-300
+- Upstream patch for iwlwifi 8000 series FW issues (rhbz: 1749949)
+
* Mon Sep 23 2019 Laura Abbott <labbott@redhat.com> - 5.3.1-100
- Linux v5.3.1
diff --git a/v2-1-2-efi-tpm-Don-t-access-event--count-when-it-isn-t-mapped..patch b/v2-1-2-efi-tpm-Don-t-access-event--count-when-it-isn-t-mapped..patch
new file mode 100644
index 000000000..d0ec73a2a
--- /dev/null
+++ b/v2-1-2-efi-tpm-Don-t-access-event--count-when-it-isn-t-mapped..patch
@@ -0,0 +1,233 @@
+From patchwork Wed Sep 25 10:16:18 2019
+Content-Type: text/plain; charset="utf-8"
+MIME-Version: 1.0
+Content-Transfer-Encoding: 7bit
+X-Patchwork-Submitter: Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com>
+X-Patchwork-Id: 11160381
+Return-Path: <SRS0=gTbe=XU=vger.kernel.org=linux-integrity-owner@kernel.org>
+Received: from mail.kernel.org (pdx-korg-mail-1.web.codeaurora.org
+ [172.30.200.123])
+ by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 43E0E112B
+ for <patchwork-linux-integrity@patchwork.kernel.org>;
+ Wed, 25 Sep 2019 10:16:35 +0000 (UTC)
+Received: from vger.kernel.org (vger.kernel.org [209.132.180.67])
+ by mail.kernel.org (Postfix) with ESMTP id 2BB5521D7A
+ for <patchwork-linux-integrity@patchwork.kernel.org>;
+ Wed, 25 Sep 2019 10:16:35 +0000 (UTC)
+Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand
+ id S2389040AbfIYKQe (ORCPT
+ <rfc822;patchwork-linux-integrity@patchwork.kernel.org>);
+ Wed, 25 Sep 2019 06:16:34 -0400
+Received: from mga06.intel.com ([134.134.136.31]:40402 "EHLO mga06.intel.com"
+ rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP
+ id S1727141AbfIYKQe (ORCPT <rfc822;linux-integrity@vger.kernel.org>);
+ Wed, 25 Sep 2019 06:16:34 -0400
+X-Amp-Result: SKIPPED(no attachment in message)
+X-Amp-File-Uploaded: False
+Received: from orsmga006.jf.intel.com ([10.7.209.51])
+ by orsmga104.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384;
+ 25 Sep 2019 03:16:33 -0700
+X-ExtLoop1: 1
+X-IronPort-AV: E=Sophos;i="5.64,547,1559545200";
+ d="scan'208";a="193723106"
+Received: from dariusvo-mobl.ger.corp.intel.com (HELO localhost)
+ ([10.249.39.150])
+ by orsmga006.jf.intel.com with ESMTP; 25 Sep 2019 03:16:27 -0700
+From: Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com>
+To: linux-integrity@vger.kernel.org
+Cc: Peter Jones <pjones@redhat.com>, linux-efi@vger.kernel.org,
+ stable@vger.kernel.org, Lyude Paul <lyude@redhat.com>,
+ Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com>,
+ Matthew Garrett <mjg59@google.com>,
+ Ard Biesheuvel <ard.biesheuvel@linaro.org>,
+ Roberto Sassu <roberto.sassu@huawei.com>,
+ Bartosz Szczepanek <bsz@semihalf.com>,
+ linux-kernel@vger.kernel.org (open list)
+Subject: [PATCH v2 1/2] efi+tpm: Don't access event->count when it isn't
+ mapped.
+Date: Wed, 25 Sep 2019 13:16:18 +0300
+Message-Id: <20190925101622.31457-1-jarkko.sakkinen@linux.intel.com>
+X-Mailer: git-send-email 2.20.1
+MIME-Version: 1.0
+Sender: linux-integrity-owner@vger.kernel.org
+Precedence: bulk
+List-ID: <linux-integrity.vger.kernel.org>
+X-Mailing-List: linux-integrity@vger.kernel.org
+
+From: Peter Jones <pjones@redhat.com>
+
+Some machines generate a lot of event log entries. When we're
+iterating over them, the code removes the old mapping and adds a
+new one, so once we cross the page boundary we're unmapping the page
+with the count on it. Hilarity ensues.
+
+This patch keeps the info from the header in local variables so we don't
+need to access that page again or keep track of if it's mapped.
+
+Fixes: 44038bc514a2 ("tpm: Abstract crypto agile event size calculations")
+Cc: linux-efi@vger.kernel.org
+Cc: linux-integrity@vger.kernel.org
+Cc: stable@vger.kernel.org
+Signed-off-by: Peter Jones <pjones@redhat.com>
+Tested-by: Lyude Paul <lyude@redhat.com>
+Reviewed-by: Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com>
+Acked-by: Matthew Garrett <mjg59@google.com>
+Acked-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
+Signed-off-by: Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com>
+---
+ include/linux/tpm_eventlog.h | 14 +++++++++++---
+ 1 file changed, 11 insertions(+), 3 deletions(-)
+
+diff --git a/include/linux/tpm_eventlog.h b/include/linux/tpm_eventlog.h
+index 63238c84dc0b..12584b69a3f3 100644
+--- a/include/linux/tpm_eventlog.h
++++ b/include/linux/tpm_eventlog.h
+@@ -170,6 +170,7 @@ static inline int __calc_tpm2_event_size(struct tcg_pcr_event2_head *event,
+ u16 halg;
+ int i;
+ int j;
++ u32 count, event_type;
+
+ marker = event;
+ marker_start = marker;
+@@ -190,16 +191,22 @@ static inline int __calc_tpm2_event_size(struct tcg_pcr_event2_head *event,
+ }
+
+ event = (struct tcg_pcr_event2_head *)mapping;
++ /*
++ * the loop below will unmap these fields if the log is larger than
++ * one page, so save them here for reference.
++ */
++ count = READ_ONCE(event->count);
++ event_type = READ_ONCE(event->event_type);
+
+ efispecid = (struct tcg_efi_specid_event_head *)event_header->event;
+
+ /* Check if event is malformed. */
+- if (event->count > efispecid->num_algs) {
++ if (count > efispecid->num_algs) {
+ size = 0;
+ goto out;
+ }
+
+- for (i = 0; i < event->count; i++) {
++ for (i = 0; i < count; i++) {
+ halg_size = sizeof(event->digests[i].alg_id);
+
+ /* Map the digest's algorithm identifier */
+@@ -256,8 +263,9 @@ static inline int __calc_tpm2_event_size(struct tcg_pcr_event2_head *event,
+ + event_field->event_size;
+ size = marker - marker_start;
+
+- if ((event->event_type == 0) && (event_field->event_size == 0))
++ if (event_type == 0 && event_field->event_size == 0)
+ size = 0;
++
+ out:
+ if (do_mapping)
+ TPM_MEMUNMAP(mapping, mapping_size);
+
+From patchwork Wed Sep 25 10:16:19 2019
+Content-Type: text/plain; charset="utf-8"
+MIME-Version: 1.0
+Content-Transfer-Encoding: 7bit
+X-Patchwork-Submitter: Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com>
+X-Patchwork-Id: 11160383
+Return-Path: <SRS0=gTbe=XU=vger.kernel.org=linux-integrity-owner@kernel.org>
+Received: from mail.kernel.org (pdx-korg-mail-1.web.codeaurora.org
+ [172.30.200.123])
+ by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 363B114DB
+ for <patchwork-linux-integrity@patchwork.kernel.org>;
+ Wed, 25 Sep 2019 10:16:40 +0000 (UTC)
+Received: from vger.kernel.org (vger.kernel.org [209.132.180.67])
+ by mail.kernel.org (Postfix) with ESMTP id 1DCE921D7C
+ for <patchwork-linux-integrity@patchwork.kernel.org>;
+ Wed, 25 Sep 2019 10:16:40 +0000 (UTC)
+Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand
+ id S2389138AbfIYKQj (ORCPT
+ <rfc822;patchwork-linux-integrity@patchwork.kernel.org>);
+ Wed, 25 Sep 2019 06:16:39 -0400
+Received: from mga18.intel.com ([134.134.136.126]:21948 "EHLO mga18.intel.com"
+ rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP
+ id S1727141AbfIYKQj (ORCPT <rfc822;linux-integrity@vger.kernel.org>);
+ Wed, 25 Sep 2019 06:16:39 -0400
+X-Amp-Result: SKIPPED(no attachment in message)
+X-Amp-File-Uploaded: False
+Received: from orsmga004.jf.intel.com ([10.7.209.38])
+ by orsmga106.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384;
+ 25 Sep 2019 03:16:38 -0700
+X-ExtLoop1: 1
+X-IronPort-AV: E=Sophos;i="5.64,547,1559545200";
+ d="scan'208";a="340366339"
+Received: from dariusvo-mobl.ger.corp.intel.com (HELO localhost)
+ ([10.249.39.150])
+ by orsmga004.jf.intel.com with ESMTP; 25 Sep 2019 03:16:35 -0700
+From: Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com>
+To: linux-integrity@vger.kernel.org
+Cc: Peter Jones <pjones@redhat.com>, linux-efi@vger.kernel.org,
+ stable@vger.kernel.org, Lyude Paul <lyude@redhat.com>,
+ Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com>,
+ Matthew Garrett <mjg59@google.com>,
+ Ard Biesheuvel <ard.biesheuvel@linaro.org>,
+ linux-kernel@vger.kernel.org (open list)
+Subject: [PATCH v2 2/2] efi+tpm: don't traverse an event log with no events
+Date: Wed, 25 Sep 2019 13:16:19 +0300
+Message-Id: <20190925101622.31457-2-jarkko.sakkinen@linux.intel.com>
+X-Mailer: git-send-email 2.20.1
+In-Reply-To: <20190925101622.31457-1-jarkko.sakkinen@linux.intel.com>
+References: <20190925101622.31457-1-jarkko.sakkinen@linux.intel.com>
+MIME-Version: 1.0
+Sender: linux-integrity-owner@vger.kernel.org
+Precedence: bulk
+List-ID: <linux-integrity.vger.kernel.org>
+X-Mailing-List: linux-integrity@vger.kernel.org
+
+From: Peter Jones <pjones@redhat.com>
+
+When there are no entries to put into the final event log, some machines
+will return the template they would have populated anyway. In this case
+the nr_events field is 0, but the rest of the log is just garbage.
+
+This patch stops us from trying to iterate the table with
+__calc_tpm2_event_size() when the number of events in the table is 0.
+
+Fixes: c46f3405692d ("tpm: Reserve the TPM final events table")
+Cc: linux-efi@vger.kernel.org
+Cc: linux-integrity@vger.kernel.org
+Cc: stable@vger.kernel.org
+Signed-off-by: Peter Jones <pjones@redhat.com>
+Tested-by: Lyude Paul <lyude@redhat.com>
+Reviewed-by: Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com>
+Acked-by: Matthew Garrett <mjg59@google.com>
+Acked-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
+Signed-off-by: Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com>
+---
+ drivers/firmware/efi/tpm.c | 15 ++++++++++-----
+ 1 file changed, 10 insertions(+), 5 deletions(-)
+
+diff --git a/drivers/firmware/efi/tpm.c b/drivers/firmware/efi/tpm.c
+index 1d3f5ca3eaaf..b9ae5c6f9b9c 100644
+--- a/drivers/firmware/efi/tpm.c
++++ b/drivers/firmware/efi/tpm.c
+@@ -75,11 +75,16 @@ int __init efi_tpm_eventlog_init(void)
+ goto out;
+ }
+
+- tbl_size = tpm2_calc_event_log_size((void *)efi.tpm_final_log
+- + sizeof(final_tbl->version)
+- + sizeof(final_tbl->nr_events),
+- final_tbl->nr_events,
+- log_tbl->log);
++ tbl_size = 0;
++ if (final_tbl->nr_events != 0) {
++ void *events = (void *)efi.tpm_final_log
++ + sizeof(final_tbl->version)
++ + sizeof(final_tbl->nr_events);
++
++ tbl_size = tpm2_calc_event_log_size(events,
++ final_tbl->nr_events,
++ log_tbl->log);
++ }
+ memblock_reserve((unsigned long)final_tbl,
+ tbl_size + sizeof(*final_tbl));
+ early_memunmap(final_tbl, sizeof(*final_tbl));
diff --git a/v3-tpm-only-set-efi_tpm_final_log_size-after-successful-event-log-parsing.patch b/v3-tpm-only-set-efi_tpm_final_log_size-after-successful-event-log-parsing.patch
new file mode 100644
index 000000000..a828cb294
--- /dev/null
+++ b/v3-tpm-only-set-efi_tpm_final_log_size-after-successful-event-log-parsing.patch
@@ -0,0 +1,190 @@
+From patchwork Wed Sep 25 17:27:05 2019
+Content-Type: text/plain; charset="utf-8"
+MIME-Version: 1.0
+Content-Transfer-Encoding: 7bit
+X-Patchwork-Submitter: Jerry Snitselaar <jsnitsel@redhat.com>
+X-Patchwork-Id: 11161161
+Return-Path: <SRS0=gTbe=XU=vger.kernel.org=linux-integrity-owner@kernel.org>
+Received: from mail.kernel.org (pdx-korg-mail-1.web.codeaurora.org
+ [172.30.200.123])
+ by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 88B8A1747
+ for <patchwork-linux-integrity@patchwork.kernel.org>;
+ Wed, 25 Sep 2019 17:27:13 +0000 (UTC)
+Received: from vger.kernel.org (vger.kernel.org [209.132.180.67])
+ by mail.kernel.org (Postfix) with ESMTP id 66F4F217F4
+ for <patchwork-linux-integrity@patchwork.kernel.org>;
+ Wed, 25 Sep 2019 17:27:13 +0000 (UTC)
+Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand
+ id S2505171AbfIYR1J (ORCPT
+ <rfc822;patchwork-linux-integrity@patchwork.kernel.org>);
+ Wed, 25 Sep 2019 13:27:09 -0400
+Received: from mx1.redhat.com ([209.132.183.28]:41496 "EHLO mx1.redhat.com"
+ rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP
+ id S2505170AbfIYR1J (ORCPT <rfc822;linux-integrity@vger.kernel.org>);
+ Wed, 25 Sep 2019 13:27:09 -0400
+Received: from smtp.corp.redhat.com (int-mx07.intmail.prod.int.phx2.redhat.com
+ [10.5.11.22])
+ (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))
+ (No client certificate requested)
+ by mx1.redhat.com (Postfix) with ESMTPS id 4CE7C1056FB1;
+ Wed, 25 Sep 2019 17:27:08 +0000 (UTC)
+Received: from cantor.redhat.com (ovpn-117-191.phx2.redhat.com [10.3.117.191])
+ by smtp.corp.redhat.com (Postfix) with ESMTP id D081B1001B12;
+ Wed, 25 Sep 2019 17:27:07 +0000 (UTC)
+From: Jerry Snitselaar <jsnitsel@redhat.com>
+To: linux-efi@vger.kernel.org
+Cc: linux-kernel@vger.kernel.org, linux-integrity@vger.kernel.org,
+ stable@vger.kernel.org, Matthew Garrett <mjg59@google.com>,
+ Ard Biesheuvel <ard.biesheuvel@linaro.org>,
+ Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com>
+Subject: [PATCH v3] tpm: only set efi_tpm_final_log_size after successful
+ event log parsing
+Date: Wed, 25 Sep 2019 10:27:05 -0700
+Message-Id: <20190925172705.17358-1-jsnitsel@redhat.com>
+MIME-Version: 1.0
+X-Scanned-By: MIMEDefang 2.84 on 10.5.11.22
+X-Greylist: Sender IP whitelisted,
+ not delayed by milter-greylist-4.6.2 (mx1.redhat.com [10.5.110.64]);
+ Wed, 25 Sep 2019 17:27:08 +0000 (UTC)
+Sender: linux-integrity-owner@vger.kernel.org
+Precedence: bulk
+List-ID: <linux-integrity.vger.kernel.org>
+X-Mailing-List: linux-integrity@vger.kernel.org
+
+If __calc_tpm2_event_size fails to parse an event it will return 0,
+resulting tpm2_calc_event_log_size returning -1. Currently there is
+no check of this return value, and efi_tpm_final_log_size can end up
+being set to this negative value resulting in a panic like the
+the one given below.
+
+Also __calc_tpm2_event_size returns a size of 0 when it fails
+to parse an event, so update function documentation to reflect this.
+
+[ 0.774340] BUG: unable to handle page fault for address: ffffbc8fc00866ad
+[ 0.774788] #PF: supervisor read access in kernel mode
+[ 0.774788] #PF: error_code(0x0000) - not-present page
+[ 0.774788] PGD 107d36067 P4D 107d36067 PUD 107d37067 PMD 107d38067 PTE 0
+[ 0.774788] Oops: 0000 [#1] SMP PTI
+[ 0.774788] CPU: 0 PID: 1 Comm: swapper/0 Not tainted 5.3.0-0.rc2.1.elrdy.x86_64 #1
+[ 0.774788] Hardware name: LENOVO 20HGS22D0W/20HGS22D0W, BIOS N1WET51W (1.30 ) 09/14/2018
+[ 0.774788] RIP: 0010:memcpy_erms+0x6/0x10
+[ 0.774788] Code: 90 90 90 90 eb 1e 0f 1f 00 48 89 f8 48 89 d1 48 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 c3 66 0f 1f 44 00 00 48 89 f8 48 89 d1 <f3> a4 c3 0f 1f 80 00 00 00 00 48 89 f8 48 83 fa 20 72 7e 40 38 fe
+[ 0.774788] RSP: 0000:ffffbc8fc0073b30 EFLAGS: 00010286
+[ 0.774788] RAX: ffff9b1fc7c5b367 RBX: ffff9b1fc8390000 RCX: ffffffffffffe962
+[ 0.774788] RDX: ffffffffffffe962 RSI: ffffbc8fc00866ad RDI: ffff9b1fc7c5b367
+[ 0.774788] RBP: ffff9b1c10ca7018 R08: ffffbc8fc0085fff R09: 8000000000000063
+[ 0.774788] R10: 0000000000001000 R11: 000fffffffe00000 R12: 0000000000003367
+[ 0.774788] R13: ffff9b1fcc47c010 R14: ffffbc8fc0085000 R15: 0000000000000002
+[ 0.774788] FS: 0000000000000000(0000) GS:ffff9b1fce200000(0000) knlGS:0000000000000000
+[ 0.774788] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
+[ 0.774788] CR2: ffffbc8fc00866ad CR3: 000000029f60a001 CR4: 00000000003606f0
+[ 0.774788] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
+[ 0.774788] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
+[ 0.774788] Call Trace:
+[ 0.774788] tpm_read_log_efi+0x156/0x1a0
+[ 0.774788] tpm_bios_log_setup+0xc8/0x190
+[ 0.774788] tpm_chip_register+0x50/0x1c0
+[ 0.774788] tpm_tis_core_init.cold.9+0x28c/0x466
+[ 0.774788] tpm_tis_plat_probe+0xcc/0xea
+[ 0.774788] platform_drv_probe+0x35/0x80
+[ 0.774788] really_probe+0xef/0x390
+[ 0.774788] driver_probe_device+0xb4/0x100
+[ 0.774788] device_driver_attach+0x4f/0x60
+[ 0.774788] __driver_attach+0x86/0x140
+[ 0.774788] ? device_driver_attach+0x60/0x60
+[ 0.774788] bus_for_each_dev+0x76/0xc0
+[ 0.774788] ? klist_add_tail+0x3b/0x70
+[ 0.774788] bus_add_driver+0x14a/0x1e0
+[ 0.774788] ? tpm_init+0xea/0xea
+[ 0.774788] ? do_early_param+0x8e/0x8e
+[ 0.774788] driver_register+0x6b/0xb0
+[ 0.774788] ? tpm_init+0xea/0xea
+[ 0.774788] init_tis+0x86/0xd8
+[ 0.774788] ? do_early_param+0x8e/0x8e
+[ 0.774788] ? driver_register+0x94/0xb0
+[ 0.774788] do_one_initcall+0x46/0x1e4
+[ 0.774788] ? do_early_param+0x8e/0x8e
+[ 0.774788] kernel_init_freeable+0x199/0x242
+[ 0.774788] ? rest_init+0xaa/0xaa
+[ 0.774788] kernel_init+0xa/0x106
+[ 0.774788] ret_from_fork+0x35/0x40
+[ 0.774788] Modules linked in:
+[ 0.774788] CR2: ffffbc8fc00866ad
+[ 0.774788] ---[ end trace 42930799f8d6eaea ]---
+[ 0.774788] RIP: 0010:memcpy_erms+0x6/0x10
+[ 0.774788] Code: 90 90 90 90 eb 1e 0f 1f 00 48 89 f8 48 89 d1 48 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 c3 66 0f 1f 44 00 00 48 89 f8 48 89 d1 <f3> a4 c3 0f 1f 80 00 00 00 00 48 89 f8 48 83 fa 20 72 7e 40 38 fe
+[ 0.774788] RSP: 0000:ffffbc8fc0073b30 EFLAGS: 00010286
+[ 0.774788] RAX: ffff9b1fc7c5b367 RBX: ffff9b1fc8390000 RCX: ffffffffffffe962
+[ 0.774788] RDX: ffffffffffffe962 RSI: ffffbc8fc00866ad RDI: ffff9b1fc7c5b367
+[ 0.774788] RBP: ffff9b1c10ca7018 R08: ffffbc8fc0085fff R09: 8000000000000063
+[ 0.774788] R10: 0000000000001000 R11: 000fffffffe00000 R12: 0000000000003367
+[ 0.774788] R13: ffff9b1fcc47c010 R14: ffffbc8fc0085000 R15: 0000000000000002
+[ 0.774788] FS: 0000000000000000(0000) GS:ffff9b1fce200000(0000) knlGS:0000000000000000
+[ 0.774788] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
+[ 0.774788] CR2: ffffbc8fc00866ad CR3: 000000029f60a001 CR4: 00000000003606f0
+[ 0.774788] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
+[ 0.774788] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
+[ 0.774788] Kernel panic - not syncing: Fatal exception
+[ 0.774788] Kernel Offset: 0x1d000000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff)
+[ 0.774788] ---[ end Kernel panic - not syncing: Fatal exception ]---
+
+The root cause of the issue that caused the failure of event parsing
+in this case is resolved by Peter Jone's patchset dealing with large
+event logs where crossing over a page boundary causes the page with
+the event count to be unmapped.
+
+Fixes: c46f3405692de ("tpm: Reserve the TPM final events table")
+Cc: linux-efi@vger.kernel.org
+Cc: linux-integrity@vger.kernel.org
+Cc: stable@vger.kernel.org
+Cc: Matthew Garrett <mjg59@google.com>
+Cc: Ard Biesheuvel <ard.biesheuvel@linaro.org>
+Cc: Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com>
+Signed-off-by: Jerry Snitselaar <jsnitsel@redhat.com>
+Reviewed-by: <jarkko.sakkinen@linux.intel.com>
+---
+v3: rebase on top of Peter Jone's patchset
+v2: added FW_BUG to pr_err, and renamed label to out_calc.
+ Updated doc comment for __calc_tpm2_event_size.
+
+ drivers/firmware/efi/tpm.c | 9 ++++++++-
+ include/linux/tpm_eventlog.h | 2 +-
+ 2 files changed, 9 insertions(+), 2 deletions(-)
+
+diff --git a/drivers/firmware/efi/tpm.c b/drivers/firmware/efi/tpm.c
+index b9ae5c6f9b9c..703469c1ab8e 100644
+--- a/drivers/firmware/efi/tpm.c
++++ b/drivers/firmware/efi/tpm.c
+@@ -85,11 +85,18 @@ int __init efi_tpm_eventlog_init(void)
+ final_tbl->nr_events,
+ log_tbl->log);
+ }
++
++ if (tbl_size < 0) {
++ pr_err(FW_BUG "Failed to parse event in TPM Final Events Log\n");
++ goto out_calc;
++ }
++
+ memblock_reserve((unsigned long)final_tbl,
+ tbl_size + sizeof(*final_tbl));
+- early_memunmap(final_tbl, sizeof(*final_tbl));
+ efi_tpm_final_log_size = tbl_size;
+
++out_calc:
++ early_memunmap(final_tbl, sizeof(*final_tbl));
+ out:
+ early_memunmap(log_tbl, sizeof(*log_tbl));
+ return ret;
+diff --git a/include/linux/tpm_eventlog.h b/include/linux/tpm_eventlog.h
+index 12584b69a3f3..2dfdd63ac034 100644
+--- a/include/linux/tpm_eventlog.h
++++ b/include/linux/tpm_eventlog.h
+@@ -152,7 +152,7 @@ struct tcg_algorithm_info {
+ * total. Once we've done this we know the offset of the data length field,
+ * and can calculate the total size of the event.
+ *
+- * Return: size of the event on success, <0 on failure
++ * Return: size of the event on success, 0 on failure
+ */
+
+ static inline int __calc_tpm2_event_size(struct tcg_pcr_event2_head *event,