Received: by 10.213.65.68 with SMTP id h4csp1312171imn; Mon, 26 Mar 2018 05:15:43 -0700 (PDT) X-Google-Smtp-Source: AG47ELvxdJmRq/DFEfaxeI1khZifLpFf+PmYWxrKo/TiPnKdsG/XBYyJd/0yGDg6D+nbilrazUEU X-Received: by 10.98.71.76 with SMTP id u73mr20140822pfa.4.1522066543459; Mon, 26 Mar 2018 05:15:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1522066543; cv=none; d=google.com; s=arc-20160816; b=hY/al042B5uvrwn6ZEGiUXyuGO2IGrPiO+2fjjMkSofQ2E6yDKX/x/3EPeKKF0ZKh8 LxV+LboO1NzYuh3+Ir3H0hwY6TCGS1ASwQjLo5mv2nr/kx5yGj8Sb8q4IRYjMFlqjLaK wU7tNpP8CjdM8nhzxIP7KaKyl2jJSIPSd00tx1MRFp57Q0H5fiDt6lKx+7cG9ZTNq6n6 FTA0y9+CLVP0g9IlXqUqNkWMz+QAENF43/SdFIN5xZstp9ORCi253F4e1AEkNPP8Qhfa 5qRsppysQcO08ynws5BO+qvG4USzy7d8ZnmQBEdhZk3dDqlVtzZm1ats88d252lPJ0CD pmNQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=Sl2dgE0yUZM4GR5M3Cz72WRVkejBcnbjaFCDGUW/4HU=; b=Dyi2QNe1w3UmRjaToJgcTKARi9GxPQn44EwXYtVStQa5fRLCyC1aIgyR4t1YMU/WmF gQsNqsL8FYfTWb2Or2uLLQXFQf2NJbwFY8LqlSOHNN+j9dZ0Gc7/kldCDs9UYSJVkUjN x8Tg6LfV6mofgB8ZYlwQhCyzjRfJ1vhZx3rO/xDCnSe/17KOO8iXTWiKgJn7moy3neDV 2wopmls/3RyIbHLetYfgeir7D+I2s0swS9BzAdFXIycJ7wOhqGlAKHQFrG6mVbWqFr15 60DLcMtA3oSZt2fzyDdhWnYme7F9KXlXB04fVQL/rnBiihqGh9i3uonVKhuGM7tS6x1k Jjdw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w12-v6si14671210pld.99.2018.03.26.05.15.29; Mon, 26 Mar 2018 05:15:43 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751827AbeCZMOc (ORCPT + 99 others); Mon, 26 Mar 2018 08:14:32 -0400 Received: from mga04.intel.com ([192.55.52.120]:8697 "EHLO mga04.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751684AbeCZMOa (ORCPT ); Mon, 26 Mar 2018 08:14:30 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga001.fm.intel.com ([10.253.24.23]) by fmsmga104.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 26 Mar 2018 05:14:29 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.48,364,1517904000"; d="scan'208";a="41292391" Received: from meskola-mobl3.ger.corp.intel.com (HELO localhost) ([10.249.254.165]) by fmsmga001.fm.intel.com with ESMTP; 26 Mar 2018 05:14:24 -0700 From: Jarkko Sakkinen To: linux-integrity@vger.kernel.org Cc: linux-security-module@vger.kernel.org, Jarkko Sakkinen , Peter Huewe , Jason Gunthorpe , Arnd Bergmann , Greg Kroah-Hartman , linux-kernel@vger.kernel.org (open list) Subject: [PATCH v4 1/4] tpm: migrate tpm2_shutdown() to use struct tpm_buf Date: Mon, 26 Mar 2018 15:14:03 +0300 Message-Id: <20180326121406.14548-2-jarkko.sakkinen@linux.intel.com> X-Mailer: git-send-email 2.15.1 In-Reply-To: <20180326121406.14548-1-jarkko.sakkinen@linux.intel.com> References: <20180326121406.14548-1-jarkko.sakkinen@linux.intel.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org In order to make struct tpm_buf the first class object for constructing TPM commands, migrate tpm2_shutdown() to use it. In addition, removed the klog entry when tpm_transmit_cmd() fails because tpm_tansmit_cmd() already prints an error message. Signed-off-by: Jarkko Sakkinen --- drivers/char/tpm/tpm2-cmd.c | 44 ++++++++++++-------------------------------- 1 file changed, 12 insertions(+), 32 deletions(-) diff --git a/drivers/char/tpm/tpm2-cmd.c b/drivers/char/tpm/tpm2-cmd.c index 96c77c8e7f40..7665661d9230 100644 --- a/drivers/char/tpm/tpm2-cmd.c +++ b/drivers/char/tpm/tpm2-cmd.c @@ -27,10 +27,6 @@ enum tpm2_session_attributes { TPM2_SA_CONTINUE_SESSION = BIT(0), }; -struct tpm2_startup_in { - __be16 startup_type; -} __packed; - struct tpm2_get_tpm_pt_in { __be32 cap_id; __be32 property_id; @@ -55,7 +51,6 @@ struct tpm2_get_random_out { } __packed; union tpm2_cmd_params { - struct tpm2_startup_in startup_in; struct tpm2_get_tpm_pt_in get_tpm_pt_in; struct tpm2_get_tpm_pt_out get_tpm_pt_out; struct tpm2_get_random_in getrandom_in; @@ -412,11 +407,8 @@ void tpm2_flush_context_cmd(struct tpm_chip *chip, u32 handle, int rc; rc = tpm_buf_init(&buf, TPM2_ST_NO_SESSIONS, TPM2_CC_FLUSH_CONTEXT); - if (rc) { - dev_warn(&chip->dev, "0x%08x was not flushed, out of memory\n", - handle); + if (rc) return; - } tpm_buf_append_u32(&buf, handle); @@ -762,40 +754,28 @@ ssize_t tpm2_get_tpm_pt(struct tpm_chip *chip, u32 property_id, u32 *value, } EXPORT_SYMBOL_GPL(tpm2_get_tpm_pt); -#define TPM2_SHUTDOWN_IN_SIZE \ - (sizeof(struct tpm_input_header) + \ - sizeof(struct tpm2_startup_in)) - -static const struct tpm_input_header tpm2_shutdown_header = { - .tag = cpu_to_be16(TPM2_ST_NO_SESSIONS), - .length = cpu_to_be32(TPM2_SHUTDOWN_IN_SIZE), - .ordinal = cpu_to_be32(TPM2_CC_SHUTDOWN) -}; - /** * tpm2_shutdown() - send shutdown command to the TPM chip * + * In places where shutdown command is sent there's no much we can do except + * print the error code on a system failure. + * * @chip: TPM chip to use. * @shutdown_type: shutdown type. The value is either * TPM_SU_CLEAR or TPM_SU_STATE. */ void tpm2_shutdown(struct tpm_chip *chip, u16 shutdown_type) { - struct tpm2_cmd cmd; + struct tpm_buf buf; int rc; - cmd.header.in = tpm2_shutdown_header; - cmd.params.startup_in.startup_type = cpu_to_be16(shutdown_type); - - rc = tpm_transmit_cmd(chip, NULL, &cmd, sizeof(cmd), 0, 0, - "stopping the TPM"); - - /* In places where shutdown command is sent there's no much we can do - * except print the error code on a system failure. - */ - if (rc < 0 && rc != -EPIPE) - dev_warn(&chip->dev, "transmit returned %d while stopping the TPM", - rc); + rc = tpm_buf_init(&buf, TPM2_ST_NO_SESSIONS, TPM2_CC_SHUTDOWN); + if (rc) + return; + tpm_buf_append_u16(&buf, shutdown_type); + tpm_transmit_cmd(chip, NULL, buf.data, PAGE_SIZE, 0, 0, + "stopping the TPM"); + tpm_buf_destroy(&buf); } /* -- 2.15.1