Received: by 10.213.65.68 with SMTP id h4csp466432imn; Fri, 6 Apr 2018 03:32:28 -0700 (PDT) X-Google-Smtp-Source: AIpwx49Dwwyv9Od8E5WvQW2IOEfPFlabJdbKgLVKlQwxOnwY10bltl+ZuHIL2gpYNTDc2pI//oqM X-Received: by 10.99.100.197 with SMTP id y188mr17099221pgb.277.1523010748867; Fri, 06 Apr 2018 03:32:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523010748; cv=none; d=google.com; s=arc-20160816; b=S6IDI9xBZfiQAI+ZRwGt6QmW8bcF2cRBmmFQPHvAraQkTgHvsjLj/9NcQ7tP7Ciq5L Xl1Or6gBD+RSOn57qt/nQzqlokW8Xovq+FsMPgYdLr3bLFJsbJ57qN3im/mXhf809yg2 meafbt/Uy9TSDqYgA84guWDL9D9S6kBwAbmr7+2dDVHfUBS9Pb9JClDTakZr7Sl+Av4k LbaPnxv3hZYqaiAOT6EAXp4jALLkiHgken1j3MF2XHM9VplE49ZuSCVhngZAxuiepZKj dEJJsjbvM/NYc7gxwDFjAl6aTAJIm+12DUDLOSf3tR4FfzIbxMoLFW4Q3Hb4p1Yv+ztf zxbA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:organization:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=5BFRNU8xMlWsUk3VKcVtF0J7/wEy0WbU7yOuc9DWhwI=; b=d25/CXfzLMpaC2LvsUCr6qAc2LEW1BqatspYbGRptNagRxdzX2S4rmYFOAhmf06gz9 vPH5iYvICCStmmF6BGkWLYcTK1MCNjLdRvOFD1iv+bBtho/dg03T2hGHNGEbkwpwiiaS StKskbANU88vq2nuGiOunVaXfSngtXDb8Jjbt7tNy3W6tF9TpZfw92F3Z4UwsR1yhTcU CKk2/bS4Q9rFzE6IG/gtthhs1bvrEmic+zpE0TKSu3ItcntQC6V9HKjG/0ICaS2e/NgI yk4cmIRKXN+3ssQcB6KpdFNs8BEQGMHPaN4IfanZpHWZcZNposoQKZq+pXBsBe4WqyUz +Uxw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i61-v6si7867195plb.560.2018.04.06.03.32.14; Fri, 06 Apr 2018 03:32:28 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752220AbeDFKbI (ORCPT + 99 others); Fri, 6 Apr 2018 06:31:08 -0400 Received: from mga01.intel.com ([192.55.52.88]:54892 "EHLO mga01.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751494AbeDFKbH (ORCPT ); Fri, 6 Apr 2018 06:31:07 -0400 X-Amp-Result: UNKNOWN X-Amp-Original-Verdict: FILE UNKNOWN X-Amp-File-Uploaded: False Received: from fmsmga004.fm.intel.com ([10.253.24.48]) by fmsmga101.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 06 Apr 2018 03:31:06 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.48,415,1517904000"; d="scan'208";a="43958828" Received: from rthanimx-mobl3.gar.corp.intel.com (HELO localhost) ([10.249.254.57]) by fmsmga004.fm.intel.com with ESMTP; 06 Apr 2018 03:31:03 -0700 Date: Fri, 6 Apr 2018 13:31:01 +0300 From: Jarkko Sakkinen To: linux-integrity@vger.kernel.org Cc: linux-security-module@vger.kernel.org, Jason Gunthorpe , open list , tomas.winkler@intel.com, James Bottomley Subject: Re: [PATCH v4 0/4] Migrate all TPM 2.0 commands to use struct tpm_buf Message-ID: <20180406103101.GA14379@linux.intel.com> References: <20180326121406.14548-1-jarkko.sakkinen@linux.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180326121406.14548-1-jarkko.sakkinen@linux.intel.com> Organization: Intel Finland Oy - BIC 0357606-4 - Westendinkatu 7, 02160 Espoo User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Mar 26, 2018 at 03:14:02PM +0300, Jarkko Sakkinen wrote: > In order to make struct tpm_buf the first class object for constructing TPM > commands, this patch set migrates all TPM 2.0 commands to use it. Eventually, > tpm_transmit_cmd() can take simply struct tpm_buf as its argument and this > interface can be exported to be used by the kernel keyring and potentially > other subsystems. > > The ultimate goal of this work is to make constructing TPM commands inside > the kernel simple and robust. I pushed these commits to the master branch. Please report if you have any issues. If the master branch continues working for you, as you test it maybe for other reasons, I'm happy to get tested-by's for them. At worst they have regressions. I seriously don't think that the code changes have any major structural issues. I would guess that Tomas' similar changes for TPM 1.x will follow at some point. I'm looking forward to change the existing tpm_send() as one that takes tpm_buf in. That will allow to remove a lot of cruft code from keyring. I take no rush to merge these to 'next' but I think it is fine to have these in the bleeding edge. /Jarkko