Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp5503432imm; Tue, 26 Jun 2018 12:26:17 -0700 (PDT) X-Google-Smtp-Source: AAOMgpdp1Ikl3mX8g43FkhtBnC0Zomg9cz5YeVQTQ8a1J+S1f9brIg57QeFjVW7rSB7MoQLWmGeZ X-Received: by 2002:a62:cc4d:: with SMTP id a74-v6mr1066284pfg.200.1530041177500; Tue, 26 Jun 2018 12:26:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1530041177; cv=none; d=google.com; s=arc-20160816; b=k4GFy56bi8EnJuYbJ43BdaR27v03gWzlz/i9rKP0cqxLh/ms1a+kK09fkApZKEfaZV Bg7qQLK+n6FTsbDbSJlrlmGPrzoGjn/HXdw0MmEHOO56S/ARQW22fEJ8DK0ClFpBEfUc WRC/9WzHiPv4zoq5mntAs5LbCCunxqa67gXb/pMwLBgsD3LLFBc1izZ0vmzBp0MF0TwG 6+FyIGh4BpiNDqkcxOA6Qj+VNB/pfpUEABQGfZZ/s/i1ZFdP0AS6Wnd8xkZS4QWSNLYC gOtiGTj2vPS1/CkN6JXlzMN7GVvhPPFGUBXdz55Ka4DB+S0652YjsSK5TU4vtAw4djat r3ag== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:references:in-reply-to:date :subject:cc:to:from:arc-authentication-results; bh=c/k3eKuYZjOVknQjD7xaQQKynRspxu5ca4mLb7vJGvI=; b=DJ5SvAWOry4VqE+K9iz2n7XuqSgtc3GaFP1SVN4/mDEWWHVWM1vvMTIfdfAKlBjiPs H6dvWnBfNU8dIT9HhG4g32GVuhPEzBg/asxO5ihO/VS458cMDGGkzZ1bN9orjbTu0B6j /St2he05Vc7CzCGmze2cA4Uhy4BVp6oXCfBu8ssFnXmWwVBNVDgGXxJjEF37LcAyrDZv AL4beUTQrJErdQG/vomOu/NBfFdeupfINpbOQdTGbaREmQV2flcff3ZxMVNkYFCmbi9e Zd3JZCsqj6z9rP8OkfGr2cusY/erQsfo04z6D4YjJPnmWMCMebas+sDOVkH/j5GdYBHq wJ1A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t20-v6si2091513plr.240.2018.06.26.12.26.02; Tue, 26 Jun 2018 12:26:17 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755047AbeFZTKV (ORCPT + 99 others); Tue, 26 Jun 2018 15:10:21 -0400 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:33390 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754759AbeFZTJn (ORCPT ); Tue, 26 Jun 2018 15:09:43 -0400 Received: from pps.filterd (m0098394.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w5QJ8dCB123285 for ; Tue, 26 Jun 2018 15:09:42 -0400 Received: from e33.co.us.ibm.com (e33.co.us.ibm.com [32.97.110.151]) by mx0a-001b2d01.pphosted.com with ESMTP id 2jut0u3hu5-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Tue, 26 Jun 2018 15:09:42 -0400 Received: from localhost by e33.co.us.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Tue, 26 Jun 2018 13:09:42 -0600 Received: from b03cxnp07029.gho.boulder.ibm.com (9.17.130.16) by e33.co.us.ibm.com (192.168.1.133) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256/256) Tue, 26 Jun 2018 13:09:40 -0600 Received: from b03ledav003.gho.boulder.ibm.com (b03ledav003.gho.boulder.ibm.com [9.17.130.234]) by b03cxnp07029.gho.boulder.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id w5QJ9dSM7471448 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Tue, 26 Jun 2018 12:09:39 -0700 Received: from b03ledav003.gho.boulder.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 51E6E6A054; Tue, 26 Jun 2018 13:09:39 -0600 (MDT) Received: from b03ledav003.gho.boulder.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id BEFC56A04F; Tue, 26 Jun 2018 13:09:38 -0600 (MDT) Received: from sbct-3.pok.ibm.com (unknown [9.47.158.153]) by b03ledav003.gho.boulder.ibm.com (Postfix) with ESMTP; Tue, 26 Jun 2018 13:09:38 -0600 (MDT) From: Stefan Berger To: linux-integrity@vger.kernel.org, jarkko.sakkinen@linux.intel.com, zohar@linux.vnet.ibm.com Cc: jgg@ziepe.ca, linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org, Stefan Berger Subject: [PATCH v7 2/5] tpm: Implement tpm_default_chip() to find a TPM chip Date: Tue, 26 Jun 2018 15:09:30 -0400 X-Mailer: git-send-email 2.14.4 In-Reply-To: <20180626190933.2508821-1-stefanb@linux.vnet.ibm.com> References: <20180626190933.2508821-1-stefanb@linux.vnet.ibm.com> X-TM-AS-GCONF: 00 x-cbid: 18062619-0036-0000-0000-00000A03E90C X-IBM-SpamModules-Scores: X-IBM-SpamModules-Versions: BY=3.00009259; HX=3.00000241; KW=3.00000007; PH=3.00000004; SC=3.00000266; SDB=6.01052709; UDB=6.00539692; IPR=6.00830633; MB=3.00021866; MTD=3.00000008; XFM=3.00000015; UTC=2018-06-26 19:09:41 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18062619-0037-0000-0000-000047E03969 Message-Id: <20180626190933.2508821-3-stefanb@linux.vnet.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-06-26_09:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=824 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1806210000 definitions=main-1806260213 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Implement tpm_default_chip() to find the first TPM chip and return it to the caller while increasing the reference count on its device. This function can be used by other subsystems, such as IMA, to find the system's default TPM chip and use it for all subsequent TPM operations. Signed-off-by: Stefan Berger --- drivers/char/tpm/tpm-chip.c | 27 +++++++++++++++++++++++++++ include/linux/tpm.h | 5 +++++ 2 files changed, 32 insertions(+) diff --git a/drivers/char/tpm/tpm-chip.c b/drivers/char/tpm/tpm-chip.c index 242b716aed5e..f551061262c9 100644 --- a/drivers/char/tpm/tpm-chip.c +++ b/drivers/char/tpm/tpm-chip.c @@ -80,6 +80,33 @@ void tpm_put_ops(struct tpm_chip *chip) } EXPORT_SYMBOL_GPL(tpm_put_ops); +/** + * tpm_default_chip() - find a TPM chip and get a reference to it + */ +struct tpm_chip *tpm_default_chip(void) +{ + struct tpm_chip *chip, *res = NULL; + int chip_num = 0; + int chip_prev; + + mutex_lock(&idr_lock); + + do { + chip_prev = chip_num; + chip = idr_get_next(&dev_nums_idr, &chip_num); + if (chip) { + get_device(&chip->dev); + res = chip; + break; + } + } while (chip_prev != chip_num); + + mutex_unlock(&idr_lock); + + return res; +} +EXPORT_SYMBOL_GPL(tpm_default_chip); + /** * tpm_find_get_ops() - find and reserve a TPM chip * @chip: a &struct tpm_chip instance, %NULL for the default chip diff --git a/include/linux/tpm.h b/include/linux/tpm.h index 06639fb6ab85..e0e51c49a0e6 100644 --- a/include/linux/tpm.h +++ b/include/linux/tpm.h @@ -61,6 +61,7 @@ extern int tpm_seal_trusted(struct tpm_chip *chip, extern int tpm_unseal_trusted(struct tpm_chip *chip, struct trusted_key_payload *payload, struct trusted_key_options *options); +extern struct tpm_chip *tpm_default_chip(void); #else static inline int tpm_is_tpm2(struct tpm_chip *chip) { @@ -96,5 +97,9 @@ static inline int tpm_unseal_trusted(struct tpm_chip *chip, { return -ENODEV; } +static inline struct tpm_chip *tpm_default_chip(void) +{ + return NULL; +} #endif #endif -- 2.17.1