Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp706372imm; Fri, 21 Sep 2018 07:02:55 -0700 (PDT) X-Google-Smtp-Source: ANB0Vdb16mLYRIfEHKXl3t0feiD9lI7kYHwRZzlcEd6C7RCI4iN0YaI68rv0jCQnyW7F55W7j2iM X-Received: by 2002:a17:902:1681:: with SMTP id h1-v6mr44219334plh.262.1537538575572; Fri, 21 Sep 2018 07:02:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1537538575; cv=none; d=google.com; s=arc-20160816; b=ymnjUG0939X5qVay8fD5kyraCL4dMWAYDgfy5LMlwRC5ZPvpoShS4EhL8pmdl0bYtB p4/yTcGYVxZlbxNPNeWNEgb9tT4oeizlRkpak68FIBA2l8+008rM/r11IR4hk6tndBqV 1vFDD+GGpaAGNZwZAOZFn51PgQlczeEVPm3WOIJiEsTCJ6WHokWh7w8O3B/hDD1YvOd1 myY0A5ytXRpJGVUB2BChx0FzLqE1XYUiMKj3E5IIiVAG6WTjDTJ1VEizid+CmbH5z70J Uuojw99qsH+aHs2XYxPb6FLZUoiuDcLSlRxho6vJp2DOLn2wRODv0eSlV5UWZoBA1n+4 GjBQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=WWN5LhUWbtATamtgYggCT80kFsy1REhm9mwxG1GrwC8=; b=DwezoH9K+luA2Cn5h5VV4AwuDLLrz86PUqVaE+n/6WngED0089mdFr6NMnJINZnZtE 5opUfwEPhSYjbVjpkmEOdMX/T2Pz842YtrStAqs10yTmSl1cD5Owp6q1rxHMGCySn1Cu ipQ5G/sLDtwydu7MnLKsBKT/QCLnF41xefBsX8XMBGCdoV9R/ORY0RfnrsEeLPgXFg/6 4iOEoryYeU2AjAT38/ua1mvmVHTm11/yMKB4HcoLIHy1k8KVgZSD0OUZ/bHcMya7MJyv ZcXJwKG3w+TKEDbb5rL8ZoQT1XxfsvDx85SU65QKx1fyC0Aek1PfWVOnKWt5h9i7SMfC A1Sw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h22-v6si30100040pfa.238.2018.09.21.07.02.30; Fri, 21 Sep 2018 07:02:55 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390142AbeIUTuw (ORCPT + 99 others); Fri, 21 Sep 2018 15:50:52 -0400 Received: from mga18.intel.com ([134.134.136.126]:4585 "EHLO mga18.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728184AbeIUTuw (ORCPT ); Fri, 21 Sep 2018 15:50:52 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga007.fm.intel.com ([10.253.24.52]) by orsmga106.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 21 Sep 2018 07:01:49 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.54,285,1534834800"; d="scan'208";a="71839005" Received: from twinkler-lnx.jer.intel.com ([10.12.91.48]) by fmsmga007.fm.intel.com with ESMTP; 21 Sep 2018 07:01:47 -0700 From: Tomas Winkler To: Jarkko Sakkinen , Jason Gunthorpe Cc: Alexander Usyskin , Tadeusz Struk , linux-integrity@vger.kernel.org, linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org, Tomas Winkler Subject: [PATCH v4 00/21] tpm: separate tpm 1.x and tpm 2.x commands Date: Fri, 21 Sep 2018 16:57:59 +0300 Message-Id: <20180921135820.20549-1-tomas.winkler@intel.com> X-Mailer: git-send-email 2.14.4 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This patch series provides initial separation of tpm 1.x and tpm 2.x commands, in foresight that the tpm 1.x chips will eventually phase out and can be compiled out for modern systems. A new file is added tpm1-cmd.c that contains tpm 1.x specific commands. In addition, tpm 1.x commands are now implemented using tpm_buf structure and instead of tpm_cmd_t construct. The latter is now removed. Note: my tpm 1.x HW availability is limited hence some more testing is needed. This series also contains two trivial cleanups and addition of new commands by TCG spec 1.36, now supported on new Intet's platforms. Tomas Winkler (21): tpm2: add new tpm2 commands according to TCG 1.36 tpm: sort objects in the Makefile tpm: factor out tpm 1.x duration calculation to tpm1-cmd.c tpm: add tpm_calc_ordinal_duration() wrapper tpm: factor out tpm_get_timeouts() tpm: move tpm1_pcr_extend to tpm1-cmd.c tpm: move tpm_getcap to tpm1-cmd.c tpm: factor out tpm1_get_random into tpm1-cmd.c tpm: move tpm 1.x selftest code from tpm-interface.c tpm1-cmd.c tpm: factor out tpm 1.x pm suspend flow into tpm1-cmd.c tpm: factor out tpm_startup function tpm: move pcr extend code to tpm2-cmd.c tpm: add tpm_auto_startup() into tpm-interface.c tpm: tpm-interface.c drop unused macros tpm: tpm-space.c remove unneeded semicolon tpm: tpm1: rewrite tpm1_get_random() using tpm_buf structure tpm1: implement tpm1_pcr_read_dev() using tpm_buf structure tmp1: rename tpm1_pcr_read_dev to tpm1_pcr_read(). tpm1: reimplement SAVESTATE using tpm_buf tpm1: reimplement tpm1_continue_selftest() using tpm_buf tpm: use u32 instead of int for PCR index drivers/char/tpm/Makefile | 16 +- drivers/char/tpm/st33zp24/st33zp24.c | 2 +- drivers/char/tpm/tpm-chip.c | 11 +- drivers/char/tpm/tpm-interface.c | 841 +++-------------------------------- drivers/char/tpm/tpm-sysfs.c | 52 +-- drivers/char/tpm/tpm.h | 98 ++-- drivers/char/tpm/tpm1-cmd.c | 781 ++++++++++++++++++++++++++++++++ drivers/char/tpm/tpm2-cmd.c | 339 +++++++------- drivers/char/tpm/tpm2-space.c | 2 +- drivers/char/tpm/tpm_i2c_nuvoton.c | 10 +- drivers/char/tpm/tpm_tis_core.c | 10 +- include/linux/tpm.h | 11 +- security/integrity/ima/ima_crypto.c | 5 +- 13 files changed, 1117 insertions(+), 1061 deletions(-) create mode 100644 drivers/char/tpm/tpm1-cmd.c -- 2.14.4