Ping. Just checking in on this patch. It has received a "Reviewed-by" tag, and I was wondering if there is anything else needed from my side for it to be picked up.
Thanks, Denis On Thu, Jul 3, 2025 at 8:00 AM Denis Aleksandrov <dalek...@redhat.com> wrote: > > Hi Jarkko, > > Thank you for the review. I'll add your Reviewed-by tag to my local commit. > Please let me know if you would like me to send a v2 version of the > patch with your tag included. > > Best, > Denis > > > On Thu, Jul 3, 2025 at 7:56 AM Denis Aleksandrov <dalek...@redhat.com> wrote: > > > > Hi Jarkko, > > > > Thank you for the review. I'll add your Reviewed-by tag to my local commit. > > Please let me know if you would like me to send a v2 version of the patch > > with your tag included. > > > > Best, > > Denis > > > > On Wed, Jul 2, 2025 at 6:46 PM Jarkko Sakkinen <jar...@kernel.org> wrote: > >> > >> On Wed, Jul 02, 2025 at 04:28:51PM -0400, Denis Aleksandrov wrote: > >> > This bug is not seen on most machines. Reads on tpm/tpm0/ppi/*operations > >> > can become very long on misconfigured systems. Reading the TPM is a > >> > blocking operation, thus a user could effectively trigger a DOS. > >> > > >> > Resolve this by restricting unprivileged user from reading the > >> > above-mentioned device files. > >> > >> I suppose we can do this. I'm going to holiday for one week next > >> week so I'll hold for additional feedback for that period and > >> apply this if nothing comes up. > >> > >> There's no use case for unprivileged user, or app that stops > >> working because of this. If you cut hairs, with patch shifting > >> uapi you have to we always prepared that tree falls down > >> somewhere but I'm willing to take risk with this :-) > >> > >> > >> Reviewed-by: Jarkko Sakkinen <jar...@kernel.org> > >> > >> > > >> > Reported-by: Jan Stancek <jstan...@redhat.com> > >> > Signed-off-by: Denis Aleksandrov <dalek...@redhat.com> > >> > --- > >> > > >> > Running scripts/checkpatch.pl suggested that the permissions be > >> > changed to octal format. What do the maintainers think of this? > >> > The rest of the permissions in the file are macros. > >> > > >> > Lastly, this bug was reproduced and the fix was tested accordingly. > >> > > >> > drivers/char/tpm/tpm_ppi.c | 4 ++-- > >> > 1 file changed, 2 insertions(+), 2 deletions(-) > >> > > >> > diff --git a/drivers/char/tpm/tpm_ppi.c b/drivers/char/tpm/tpm_ppi.c > >> > index bc7b1b4501b3..ac6e0aee566e 100644 > >> > --- a/drivers/char/tpm/tpm_ppi.c > >> > +++ b/drivers/char/tpm/tpm_ppi.c > >> > @@ -347,8 +347,8 @@ static DEVICE_ATTR(request, S_IRUGO | S_IWUSR | > >> > S_IWGRP, > >> > static DEVICE_ATTR(transition_action, S_IRUGO, > >> > tpm_show_ppi_transition_action, NULL); > >> > static DEVICE_ATTR(response, S_IRUGO, tpm_show_ppi_response, NULL); > >> > -static DEVICE_ATTR(tcg_operations, S_IRUGO, > >> > tpm_show_ppi_tcg_operations, NULL); > >> > -static DEVICE_ATTR(vs_operations, S_IRUGO, tpm_show_ppi_vs_operations, > >> > NULL); > >> > +static DEVICE_ATTR(tcg_operations, S_IRUSR | S_IRGRP, > >> > tpm_show_ppi_tcg_operations, NULL); > >> > +static DEVICE_ATTR(vs_operations, S_IRUSR | S_IRGRP, > >> > tpm_show_ppi_vs_operations, NULL); > >> > > >> > static struct attribute *ppi_attrs[] = { > >> > &dev_attr_version.attr, > >> > -- > >> > 2.48.1 > >> > > >> > >> BR, Jarkko > >>