diff mbox

tpm, tpm_crb: fail when TPM2 ACPI table contents look corrupted

Message ID 1435155295-16934-1-git-send-email-jarkko.sakkinen@linux.intel.com (mailing list archive)
State New, archived
Headers show

Commit Message

Jarkko Sakkinen June 24, 2015, 2:14 p.m. UTC
At least some versions of AMI BIOS have corrupted contents in the TPM2
ACPI table and namely the physical address of the control area is set to
zero.

This patch changes the driver to fail gracefully  when we observe a zero
address instead of continuing to ioremap.

Signed-off-by: Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com>
---
 drivers/char/tpm/tpm_crb.c | 8 ++++++++
 1 file changed, 8 insertions(+)

Comments

Peter Huewe July 13, 2015, 9:11 p.m. UTC | #1
Am Mittwoch, 24. Juni 2015, 16:14:55 schrieb Jarkko Sakkinen:
> At least some versions of AMI BIOS have corrupted contents in the TPM2
> ACPI table and namely the physical address of the control area is set to
> zero.
> 
> This patch changes the driver to fail gracefully  when we observe a zero
> address instead of continuing to ioremap.

Reviewed-by: Peter Huewe <peterhuewe@gmx.de>

Thanks for fixing this.
Peter

------------------------------------------------------------------------------
Don't Limit Your Business. Reach for the Cloud.
GigeNET's Cloud Solutions provide you with the tools and support that
you need to offload your IT needs and focus on growing your business.
Configured For All Businesses. Start Your Cloud Today.
https://www.gigenetcloud.com/
Peter Huewe July 13, 2015, 9:42 p.m. UTC | #2
Am Mittwoch, 24. Juni 2015, 16:14:55 schrieb Jarkko Sakkinen:
> At least some versions of AMI BIOS have corrupted contents in the TPM2
> ACPI table and namely the physical address of the control area is set to
> zero.
> 
> This patch changes the driver to fail gracefully  when we observe a zero
> address instead of continuing to ioremap.
> 
> Signed-off-by: Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com>
> ---
>  drivers/char/tpm/tpm_crb.c | 8 ++++++++
>  1 file changed, 8 insertions(+)
> 
> diff --git a/drivers/char/tpm/tpm_crb.c b/drivers/char/tpm/tpm_crb.c
> index b26ceee..c8fae5b 100644
> --- a/drivers/char/tpm/tpm_crb.c
> +++ b/drivers/char/tpm/tpm_crb.c
> @@ -233,6 +233,14 @@ static int crb_acpi_add(struct acpi_device *device)
>  		return -ENODEV;
>  	}
> 
> +	/* At least some versions of AMI BIOS have a bug that TPM2 table has
> +	 * zero address for the control area and therefore we must fail.
> +	*/
> +	if (!buf->control_area_pa) {
> +		dev_err(dev, "TPM2 ACPI table has a zero address for the control
> area\n"); +		return -EINVAL;
> +	}
> +
>  	if (buf->hdr.length < sizeof(struct acpi_tpm2)) {
>  		dev_err(dev, "TPM2 ACPI table has wrong size");
>  		return -EINVAL;

Applied and pushed.
Thanks!!

------------------------------------------------------------------------------
Don't Limit Your Business. Reach for the Cloud.
GigeNET's Cloud Solutions provide you with the tools and support that
you need to offload your IT needs and focus on growing your business.
Configured For All Businesses. Start Your Cloud Today.
https://www.gigenetcloud.com/
diff mbox

Patch

diff --git a/drivers/char/tpm/tpm_crb.c b/drivers/char/tpm/tpm_crb.c
index b26ceee..c8fae5b 100644
--- a/drivers/char/tpm/tpm_crb.c
+++ b/drivers/char/tpm/tpm_crb.c
@@ -233,6 +233,14 @@  static int crb_acpi_add(struct acpi_device *device)
 		return -ENODEV;
 	}
 
+	/* At least some versions of AMI BIOS have a bug that TPM2 table has
+	 * zero address for the control area and therefore we must fail.
+	*/
+	if (!buf->control_area_pa) {
+		dev_err(dev, "TPM2 ACPI table has a zero address for the control area\n");
+		return -EINVAL;
+	}
+
 	if (buf->hdr.length < sizeof(struct acpi_tpm2)) {
 		dev_err(dev, "TPM2 ACPI table has wrong size");
 		return -EINVAL;