Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp4460943imm; Mon, 17 Sep 2018 14:28:08 -0700 (PDT) X-Google-Smtp-Source: ANB0VdYZZNFT/6HPtffkx9jggMqlXR8xv4zEzgQ1xHd9ffTJLFtn3qFleXCIrN9tjFbK49k0elYg X-Received: by 2002:a63:f849:: with SMTP id v9-v6mr24916681pgj.71.1537219688695; Mon, 17 Sep 2018 14:28:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1537219688; cv=none; d=google.com; s=arc-20160816; b=h9dXnoW4NtPM9dGXCyGpm+KcBpEizdaxlSTjuP3vSkHa+WykbZXucbrPXaThHdZdlv FgxcvfY+2PlyKf0/0gIAFEL49b92isJsPkBN0ULSK9Ik/i747Myg1AuZHQav3XW3+NIa su3qBF33HpWEp3u8SlqwGTNjnhlyPS96+omqgcMDqDnI6OlCsUFiP+3hObgnaeP0Zg5O iJFBDsJ6MQRyllkZhTZn2oZY0jBpb7qQaoZFXotQ2whq04c9EqrYpplk9BF1tY5WFwaA 3gvar0UdGhOk1pGEuU8Yps+6zG5PreiTXU6zYBfMwv2tBq7fEdm4fj+LcbL3ByMv+NNQ aiJg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:organization:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=klv1wtxtrhSh25bB+YMNN54bv0xweQvpBL5LE0dPn6k=; b=k1qAD1iadHrNyEJ6i2qZZsompxjlbUunTu5ykO70pL/lmTxSi/dXz5+ZjIG3Zh6zkR doOETGL9uoFtIcYvd/GOtx5DpwfaMrwznGo/7dPIjdnN8s9wGSb0tV7+j3Em8WKuZxYQ gDO74fi8+PBOzla6eBaaHw0apt34yy8EQxQFZDkQw3cmmb1urELch5Yho59GmYJCBEh9 28P0PaXUbmvur5w5OFNjwb0YtGTwfYq/IYnc0RfVvrp2bVfS5V/i9jxE5CqSvqB+uNby Dc3SZj76CuxGp6fJE4a1QcScIY58qdKR8gspqVqaVN+XOlp+lnDVQLUwo91CNe8dveP8 Ox9Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y11-v6si8834246pgj.171.2018.09.17.14.27.53; Mon, 17 Sep 2018 14:28:08 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728478AbeIRC44 (ORCPT + 99 others); Mon, 17 Sep 2018 22:56:56 -0400 Received: from mga18.intel.com ([134.134.136.126]:38446 "EHLO mga18.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726844AbeIRC44 (ORCPT ); Mon, 17 Sep 2018 22:56:56 -0400 X-Amp-Result: UNSCANNABLE X-Amp-File-Uploaded: False Received: from orsmga002.jf.intel.com ([10.7.209.21]) by orsmga106.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 17 Sep 2018 14:27:47 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.53,386,1531810800"; d="scan'208";a="92552304" Received: from maclarck-mobl1.ger.corp.intel.com (HELO localhost) ([10.249.39.44]) by orsmga002.jf.intel.com with ESMTP; 17 Sep 2018 14:27:36 -0700 Date: Tue, 18 Sep 2018 00:27:35 +0300 From: Jarkko Sakkinen To: Tadeusz Struk Cc: flihp@twobit.us, jgg@ziepe.ca, linux-integrity@vger.kernel.org, linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v6 0/2] tpm: add support for nonblocking operation Message-ID: <20180917212735.GA9368@linux.intel.com> References: <153659990230.2284.5511495299744743989.stgit@tstruk-mobl1.jf.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <153659990230.2284.5511495299744743989.stgit@tstruk-mobl1.jf.intel.com> Organization: Intel Finland Oy - BIC 0357606-4 - Westendinkatu 7, 02160 Espoo User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Sep 10, 2018 at 10:18:22AM -0700, Tadeusz Struk wrote: > The TCG SAPI specification [1] defines a set of functions, which allow > applications to use the TPM device in either blocking or non-blocking fashion. > Each command defined by the specification has a corresponding > Tss2_Sys__Prepare() and Tss2_Sys__Complete() call, which > together with Tss2_Sys_ExecuteAsync() is designed to allow asynchronous > mode of operation. Currently the TPM driver supports only blocking calls, > which doesn't allow asynchronous IO operations. > This patch changes it and adds support for nonblocking write and a new poll > function to enable applications, which want to take advantage of this feature. > The new functionality can be tested using standard TPM tools implemented > in [2], together with modified TCTI from [3], and an example application > by Philip Tricca [4]. Here is a short description from Philip: > > "The example application `glib-tss2-event` uses a glib main event loop > to create an RSA 2048 primary key in the TPM2 NULL hierarchy while > using a glib timer event to time the operation. A GSource object is > used to generate an event when the FD underlying the tss2 function > call has data ready. While the application waits for an event indicating > that the CreatePrimary operation is complete, it counts timer events > that occur every 100ms. Once the CreatePrimary operation completes the > number of timer events that occurred is used to make a rough calculation > of the elapsed time. This value is then printed to the console. > This takes ~300 lines of C code and requires no management or > synchronization of threads. The glib GMainContext is "just a poll() > loop" according to the glib documentation here: > > https://developer.gnome.org/programming-guidelines/stable/main-contexts.html.en > > and so supporting 'poll' is the easiest way to integrate with glib / > gtk+. This is true of any other event system that relies on 'poll' > instead of worker threads." > > [1] https://trustedcomputinggroup.org/wp-content/uploads/TSS_SAPI_Version-1.1_Revision-22_review_030918.pdf > [2] https://github.com/tpm2-software/tpm2-tools > [3] https://github.com/tstruk/tpm2-tss/tree/async > [4] https://github.com/flihp/glib-tss2-async-example > > --- > Changes in v6: > - Changed commit message in the first patch to more specific. > - Chenged labels names in tpm-interface.c > > Changes in v5: > - Changed the workqueue allocation time back from the first user interface > open to module init. > > Changes in v4: > - Changed the way buffer_mutex is handled in nonblocking mode so that > it is not held when write() returns to user space. > > Changes in v3: > - Fixed problem reported by 0-dey kbuild test robot around __exitcall. > It complained because there is a module_exit() in another file already. > - Added info on example application from Philip > > Changes in v2: > - Split the change into two separate patches. First patch adds a pointer > to the space to the struct file_priv to have access to it from the async job. > This is to avoid memory allocations on every write call. Now everything > what's needed is in the file_priv struct. > - Renamed the 'work' member of the timer to avoid confusion. > Now there are 'timeout_work' and 'async_work'. > - Removed the global wait queue and moved it to file_priv. > - Only creating the work queue when the first file is opened. > > Tadeusz Struk (2): > tpm: add ptr to the tpm_space struct to file_priv > tpm: add support for nonblocking operation > > drivers/char/tpm/tpm-dev-common.c | 150 +++++++++++++++++++++++++++---------- > drivers/char/tpm/tpm-dev.c | 22 +++-- > drivers/char/tpm/tpm-dev.h | 19 +++-- > drivers/char/tpm/tpm-interface.c | 1 > drivers/char/tpm/tpm.h | 1 > drivers/char/tpm/tpmrm-dev.c | 31 ++++---- > 6 files changed, 152 insertions(+), 72 deletions(-) > > -- > TS Patches have been merged. /Jarkko