Received: by 10.213.65.68 with SMTP id h4csp1312393imn; Mon, 26 Mar 2018 05:16:00 -0700 (PDT) X-Google-Smtp-Source: AG47ELuLQrE2CEzdCB42LlCghPMzx6sz29SK9BUxF3YqxZOwJV01+vwiwOnnouZunnQdlkBxo/13 X-Received: by 10.98.69.142 with SMTP id n14mr21717384pfi.42.1522066560150; Mon, 26 Mar 2018 05:16:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1522066560; cv=none; d=google.com; s=arc-20160816; b=oValLSzDDskxSPJD8TZzjrXlfbBjf7N5a1+urk20SW8qg+JQ2PYULMwBeoNOJLZtNb SUT1QjmDpOPkWwb2FppyKaJbU604m8cZEgOkGQPZOp4lnyPfF5mUOjeOmRFr3o8LlwbQ 4W/AaUOwoPVHJ+3YXdpGTaN1ukQA1/Io6633Bi3QO5FyHsaMdZ9uwTwpXkJaFhXVF9O3 uwdXYMG0z4ItoH6wnxt+kKg2/IMBtvxn7EjikPrxZ7/eq05xmisScVOswYxkrfcxikIA CLFR9EzYbdXawuuQvfCmLI9ZvpaoIA773s+0GrXe2TKHKg1NDEfHipkPN6eub0MQ1uPT emRA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=+3pbbnYgsNEM+LzAFahBMJqCqVj7M1HcOslQn497mWY=; b=u5tC8gErY/x28IfIwAV4tw/9Y3ielOFCc1TmF0Q4A4JHfWRo2JkOG7i2B5FHDDGoIQ AMslAAH7GSvtqpa1kWQ0ID3euF1zp5B0dGyfAiK6rqt8zqM0qNjtJYz15Dda/dUxFT4q MoV1sGE+PDI0S5HPjsUDDeyru55hIugTYj5mPFhsYLS/Kx8FXW1DfEe0nPkbLKOncUyP tX9bqRb2icZNrqsPeW7PBwawCaiik1kaCgGaqNxpDZkDgO9+d9scM9/Izch4osnWXW7I LJZPhQquoLds0ciPL6BsDis7W6vWqhfWVCBvDNNKmn0jnx+ACJcnwGYGnd8gj8/qXWO/ p6vQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z8-v6si14174458plk.305.2018.03.26.05.15.45; Mon, 26 Mar 2018 05:16:00 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752036AbeCZMOq (ORCPT + 99 others); Mon, 26 Mar 2018 08:14:46 -0400 Received: from mga05.intel.com ([192.55.52.43]:38225 "EHLO mga05.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751686AbeCZMOn (ORCPT ); Mon, 26 Mar 2018 08:14:43 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga001.fm.intel.com ([10.253.24.23]) by fmsmga105.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 26 Mar 2018 05:14:42 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.48,364,1517904000"; d="scan'208";a="41292452" Received: from meskola-mobl3.ger.corp.intel.com (HELO localhost) ([10.249.254.165]) by fmsmga001.fm.intel.com with ESMTP; 26 Mar 2018 05:14:38 -0700 From: Jarkko Sakkinen To: linux-integrity@vger.kernel.org Cc: linux-security-module@vger.kernel.org, Jarkko Sakkinen , Peter Huewe , Jason Gunthorpe , Arnd Bergmann , Greg Kroah-Hartman , linux-kernel@vger.kernel.org (open list) Subject: [PATCH v4 3/4] tpm: migrate tpm2_get_tpm_pt() to use struct tpm_buf Date: Mon, 26 Mar 2018 15:14:05 +0300 Message-Id: <20180326121406.14548-4-jarkko.sakkinen@linux.intel.com> X-Mailer: git-send-email 2.15.1 In-Reply-To: <20180326121406.14548-1-jarkko.sakkinen@linux.intel.com> References: <20180326121406.14548-1-jarkko.sakkinen@linux.intel.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org In order to make struct tpm_buf the first class object for constructing TPM commands, migrate tpm2_get_tpm_pt() to use it. Signed-off-by: Jarkko Sakkinen --- drivers/char/tpm/tpm2-cmd.c | 63 +++++++++++++++++---------------------------- 1 file changed, 23 insertions(+), 40 deletions(-) diff --git a/drivers/char/tpm/tpm2-cmd.c b/drivers/char/tpm/tpm2-cmd.c index 7bffd0fd1dca..b3b52f9eb65f 100644 --- a/drivers/char/tpm/tpm2-cmd.c +++ b/drivers/char/tpm/tpm2-cmd.c @@ -27,20 +27,6 @@ enum tpm2_session_attributes { TPM2_SA_CONTINUE_SESSION = BIT(0), }; -struct tpm2_get_tpm_pt_in { - __be32 cap_id; - __be32 property_id; - __be32 property_cnt; -} __packed; - -struct tpm2_get_tpm_pt_out { - u8 more_data; - __be32 subcap_id; - __be32 property_cnt; - __be32 property_id; - __be32 value; -} __packed; - struct tpm2_get_random_in { __be16 size; } __packed; @@ -51,8 +37,6 @@ struct tpm2_get_random_out { } __packed; union tpm2_cmd_params { - struct tpm2_get_tpm_pt_in get_tpm_pt_in; - struct tpm2_get_tpm_pt_out get_tpm_pt_out; struct tpm2_get_random_in getrandom_in; struct tpm2_get_random_out getrandom_out; }; @@ -379,19 +363,6 @@ int tpm2_get_random(struct tpm_chip *chip, u8 *out, size_t max) return total ? total : -EIO; } -#define TPM2_GET_TPM_PT_IN_SIZE \ - (sizeof(struct tpm_input_header) + \ - sizeof(struct tpm2_get_tpm_pt_in)) - -#define TPM2_GET_TPM_PT_OUT_BODY_SIZE \ - sizeof(struct tpm2_get_tpm_pt_out) - -static const struct tpm_input_header tpm2_get_tpm_pt_header = { - .tag = cpu_to_be16(TPM2_ST_NO_SESSIONS), - .length = cpu_to_be32(TPM2_GET_TPM_PT_IN_SIZE), - .ordinal = cpu_to_be32(TPM2_CC_GET_CAPABILITY) -}; - /** * tpm2_flush_context_cmd() - execute a TPM2_FlushContext command * @chip: TPM chip to use @@ -725,6 +696,14 @@ int tpm2_unseal_trusted(struct tpm_chip *chip, return rc; } +struct tpm2_get_cap_out { + u8 more_data; + __be32 subcap_id; + __be32 property_cnt; + __be32 property_id; + __be32 value; +} __packed; + /** * tpm2_get_tpm_pt() - get value of a TPM_CAP_TPM_PROPERTIES type property * @chip: TPM chip to use. @@ -737,19 +716,23 @@ int tpm2_unseal_trusted(struct tpm_chip *chip, ssize_t tpm2_get_tpm_pt(struct tpm_chip *chip, u32 property_id, u32 *value, const char *desc) { - struct tpm2_cmd cmd; + struct tpm2_get_cap_out *out; + struct tpm_buf buf; int rc; - cmd.header.in = tpm2_get_tpm_pt_header; - cmd.params.get_tpm_pt_in.cap_id = cpu_to_be32(TPM2_CAP_TPM_PROPERTIES); - cmd.params.get_tpm_pt_in.property_id = cpu_to_be32(property_id); - cmd.params.get_tpm_pt_in.property_cnt = cpu_to_be32(1); - - rc = tpm_transmit_cmd(chip, NULL, &cmd, sizeof(cmd), - TPM2_GET_TPM_PT_OUT_BODY_SIZE, 0, desc); - if (!rc) - *value = be32_to_cpu(cmd.params.get_tpm_pt_out.value); - + rc = tpm_buf_init(&buf, TPM2_ST_NO_SESSIONS, TPM2_CC_GET_CAPABILITY); + if (rc) + return rc; + tpm_buf_append_u32(&buf, TPM2_CAP_TPM_PROPERTIES); + tpm_buf_append_u32(&buf, property_id); + tpm_buf_append_u32(&buf, 1); + rc = tpm_transmit_cmd(chip, NULL, buf.data, PAGE_SIZE, 0, 0, NULL); + if (!rc) { + out = (struct tpm2_get_cap_out *) + &buf.data[TPM_HEADER_SIZE]; + *value = be32_to_cpu(out->value); + } + tpm_buf_destroy(&buf); return rc; } EXPORT_SYMBOL_GPL(tpm2_get_tpm_pt); -- 2.15.1