On Thu, 2025-03-06 at 11:30 -0800, James Bottomley wrote: > On Thu, 2025-03-06 at 13:59 -0500, Mimi Zohar wrote: > > On Thu, 2025-03-06 at 15:15 +0000, Jonathan McDowell wrote: > > > We're seeing a lot of: > > > > > > tpm tpm0: auth session is active > > > > > > messages in our logs. This is emitted (once per boot) by > > > tpm2_start_auth_session() if the auth sessions is already active > > > when it is called. > > > > > > Investigating I think this is because tpm2_pcr_extend() calls > > > tpm_buf_append_hmac_session() which sets TPM2_SA_CONTINUE_SESSION > > > so tpm_buf_check_hmac_response() does not cleanup the auth session, > > > but then doesn't call tpm2_end_auth_session(). > > > > > > Looking at tpm2_get_random() it uses TPM2_SA_CONTINUE_SESSION but > > > *also* cleans up with tpm2_end_auth_session(). > > > > > > I'd be sending a patch proposing the addition of > > > tpm2_end_auth_session() to the end of tpm2_pcr_extend() but I > > > recall a bunch of discussion about trying to cache the HMAC session > > > to improve IMA performance, so I don't know if perhaps we should be > > > dropping the warning instead? > > > > Hi Jonathan, > > > > That suggestion was nixed. > > Well it's also upstream as > > https://web.git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=df745e25098dcb2f706399c0d06dd8d1bab6b6ec > > even though it didn't work out for large numbers of extends. Oh, right! That patch definitely helped with performance, just not enough. Without that patch, some of my test systems wouldn't boot. Mimi > However, > that commit introduced this message on a warn once behaviour, so it > seems to be expected that this gets printed once for some reason. From > a code flow point of view, the lazy session handling seems to be > working correctly, so I think just dropping the warn is correct. > > Regards, > > James >