Received: by 10.213.65.68 with SMTP id h4csp1312323imn; Mon, 26 Mar 2018 05:15:53 -0700 (PDT) X-Google-Smtp-Source: AG47ELvhyOhvimUebFqR1QqX8ppE/1bnZ9tluKCQI1/PA9f4/+5EyMkxRD9i6E2/xeJSqMGfiXdb X-Received: by 10.98.137.15 with SMTP id v15mr9453405pfd.95.1522066553571; Mon, 26 Mar 2018 05:15:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1522066553; cv=none; d=google.com; s=arc-20160816; b=B9JCewbEfsCTepELjLwMbXq3SEJN0QcIquZUGIH3qwem4GrMlK+khWggjxx1he9exl GqcmeGaJ5xGPsi9pTlfLIjeXQn+q2uSaZU0toNpQWON+4ZJ5j9QcQ9S0WSRooC5avYCn Bd7VR2C6hch5pmzwhYUPQLjl3kcXv5e9zdiPikpMsUKP4UwpeX82hLd4fnzw2U3i1XoM oHzrg5AhFfl6w5P13Xzsd+zuQ/aYT2dwRrb4bOJo8agdTEge6hpDpDK6V2wQJNdCNejV g0O3lKlUXwabzmZU5eRlKFTN2O72rKjGQ/7ELOwD2e9yZrtYxeuaKAy1Uj2jlG+f2c5l AeTg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=pRjvgcqQPJ47BCbb4AtNcvrQhu0BzKSjv0KDGXdVbQw=; b=ikz0iHUTEupt9ifIzo9HFSpNwzjwv6BqBjKLj3xFSmFNqM3H0Yt6ePJ1WLveskxBWe CItlOfpXRALVAGu0LPj+H6FCGCU/GUbLaJHJZBrtKT5es8t7bfMZQ4wBucdVsss+n+zm edOpgfeo99fKkAaD7lpkB3m4I4YAvtTjPujcwp1Kj1iYAzfkbL01jsb3ke3StdCjDlyi h2YJ+UD+C/rmBF8r8Rr+o1Nse0/gtukqfSLV2a9NgXsSVr63x1R7AKt58r/sc+X39Y+W N8EXJ7zot0Qz75RB5/hyzq1eTjzLNQBfrkE7flcB5aEclAs3Zxa62rWaf+KtMZ/E19Yj IaYg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k9-v6si2517747pll.27.2018.03.26.05.15.38; Mon, 26 Mar 2018 05:15:53 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751938AbeCZMOj (ORCPT + 99 others); Mon, 26 Mar 2018 08:14:39 -0400 Received: from mga01.intel.com ([192.55.52.88]:55451 "EHLO mga01.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751684AbeCZMOg (ORCPT ); Mon, 26 Mar 2018 08:14:36 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga001.fm.intel.com ([10.253.24.23]) by fmsmga101.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 26 Mar 2018 05:14:36 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.48,364,1517904000"; d="scan'208";a="41292432" Received: from meskola-mobl3.ger.corp.intel.com (HELO localhost) ([10.249.254.165]) by fmsmga001.fm.intel.com with ESMTP; 26 Mar 2018 05:14:31 -0700 From: Jarkko Sakkinen To: linux-integrity@vger.kernel.org Cc: linux-security-module@vger.kernel.org, Jarkko Sakkinen , Peter Huewe , Jason Gunthorpe , Arnd Bergmann , Greg Kroah-Hartman , linux-kernel@vger.kernel.org (open list) Subject: [PATCH v4 2/4] tpm: migrate tpm2_probe() to use struct tpm_buf Date: Mon, 26 Mar 2018 15:14:04 +0300 Message-Id: <20180326121406.14548-3-jarkko.sakkinen@linux.intel.com> X-Mailer: git-send-email 2.15.1 In-Reply-To: <20180326121406.14548-1-jarkko.sakkinen@linux.intel.com> References: <20180326121406.14548-1-jarkko.sakkinen@linux.intel.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org In order to make struct tpm_buf the first class object for constructing TPM commands, migrate tpm2_probe() to use it. Signed-off-by: Jarkko Sakkinen Acked-by: Jay Freyensee --- drivers/char/tpm/tpm2-cmd.c | 37 +++++++++++++++++++++---------------- 1 file changed, 21 insertions(+), 16 deletions(-) diff --git a/drivers/char/tpm/tpm2-cmd.c b/drivers/char/tpm/tpm2-cmd.c index 7665661d9230..7bffd0fd1dca 100644 --- a/drivers/char/tpm/tpm2-cmd.c +++ b/drivers/char/tpm/tpm2-cmd.c @@ -844,30 +844,35 @@ static int tpm2_do_selftest(struct tpm_chip *chip) /** * tpm2_probe() - probe TPM 2.0 - * @chip: TPM chip to use + * @chip: a TPM chip to probe * - * Return: < 0 error and 0 on success. + * Return: 0 on success, + * -errno otherwise * - * Send idempotent TPM 2.0 command and see whether TPM 2.0 chip replied based on - * the reply tag. + * Send an idempotent TPM 2.0 command and see whether there is TPM2 chip in the + * other end based on the response tag. The flag TPM_CHIP_FLAG_TPM2 is set if + * this is the case. */ int tpm2_probe(struct tpm_chip *chip) { - struct tpm2_cmd cmd; + struct tpm_output_header *out; + struct tpm_buf buf; int rc; - cmd.header.in = tpm2_get_tpm_pt_header; - cmd.params.get_tpm_pt_in.cap_id = cpu_to_be32(TPM2_CAP_TPM_PROPERTIES); - cmd.params.get_tpm_pt_in.property_id = cpu_to_be32(0x100); - cmd.params.get_tpm_pt_in.property_cnt = cpu_to_be32(1); - - rc = tpm_transmit_cmd(chip, NULL, &cmd, sizeof(cmd), 0, 0, NULL); - if (rc < 0) + rc = tpm_buf_init(&buf, TPM2_ST_NO_SESSIONS, TPM2_CC_GET_CAPABILITY); + if (rc) return rc; - - if (be16_to_cpu(cmd.header.out.tag) == TPM2_ST_NO_SESSIONS) - chip->flags |= TPM_CHIP_FLAG_TPM2; - + tpm_buf_append_u32(&buf, TPM2_CAP_TPM_PROPERTIES); + tpm_buf_append_u32(&buf, TPM_PT_TOTAL_COMMANDS); + tpm_buf_append_u32(&buf, 1); + rc = tpm_transmit_cmd(chip, NULL, buf.data, PAGE_SIZE, 0, 0, NULL); + /* We ignore TPM return codes on purpose. */ + if (rc >= 0) { + out = (struct tpm_output_header *)buf.data; + if (be16_to_cpu(out->tag) == TPM2_ST_NO_SESSIONS) + chip->flags |= TPM_CHIP_FLAG_TPM2; + } + tpm_buf_destroy(&buf); return 0; } EXPORT_SYMBOL_GPL(tpm2_probe); -- 2.15.1