Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp304386imm; Tue, 16 Oct 2018 23:50:52 -0700 (PDT) X-Google-Smtp-Source: ACcGV60QtlUxvLxXkY7TSGAW57LcHwQ1IZlo/MTXee5pY9haejsLu7NkhnHbXF9oyAVki9LATrAB X-Received: by 2002:a17:902:f209:: with SMTP id gn9mr709546plb.6.1539759052296; Tue, 16 Oct 2018 23:50:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1539759052; cv=none; d=google.com; s=arc-20160816; b=zP/tuDczuiyIqQ/Hrk0PM8T9pixz9m5irPld7lhbGaZ2oQ9m1MHfSXB1AWi2SBe+aH I+230xfDKXB3ons8ESv6Wcp+bYP4Rr4TTURHSmEUO7RulyjVPGqpIUdCkDAUKWy5sJ0U kndDMpJqquzIbt7MsMZnEZYbEjPRR/rLgq3K1MhnpL+MmLzbKDAcDTwGI6NiSeXT4PGh bhkNCyBhUoipJmBsAzhx75cTYlmydtJuGM8aPMv4v8mzVdZhkpEVFhjlb2fYhXTTTo4H KyXmPsAzemQoC64H5zwDedEq+3TzzqA3eJT3dREfU8usfQSAuoLhmGAPRCnZtGcQQu3m X0+w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=YWhq1MT/Uh26Zr3f0eWGN0LXW2ar2kbPEVL4mD7CeEs=; b=GaoPmNdInsUrNdxVHbbhyWKExkNp1svk+19uOKj/AeO/smMcElkZUwy7MnzllhAT+D hWSY5D29gw4cKPp2XuYtZEZaYUBOinTHqHtUW2vM1ttRD935E0Y9frwiGidFoZJlUwfo hNS4YPBbuLkB9pmsVY5ZrdAytev3MzaNLV0ecANXSmjUIsMPRVEdngkfV63uaKOvDPLO lsYsFLq7jsdscccbg+4oyvgkhTIPwKjb6gt2vEF5uLO7Mv9NTGQri3WYmYTc7EWmjkqK aff7UU2wtuWNHRm8hy+uS8Zq/EDUSm7wni8fb/vK6pctmiu58hmiaDP8rNriFcQwGsal 1k0A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e1-v6si14606572pgc.233.2018.10.16.23.50.35; Tue, 16 Oct 2018 23:50:52 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727292AbeJQOoZ (ORCPT + 99 others); Wed, 17 Oct 2018 10:44:25 -0400 Received: from mga18.intel.com ([134.134.136.126]:4079 "EHLO mga18.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727080AbeJQOoZ (ORCPT ); Wed, 17 Oct 2018 10:44:25 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga008.fm.intel.com ([10.253.24.58]) by orsmga106.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 16 Oct 2018 23:50:14 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.54,391,1534834800"; d="scan'208";a="79371034" Received: from twinkler-lnx.jer.intel.com ([10.12.91.48]) by fmsmga008.fm.intel.com with ESMTP; 16 Oct 2018 23:50:11 -0700 From: Tomas Winkler To: Jarkko Sakkinen , Jason Gunthorpe Cc: Nayna Jain , Alexander Usyskin , Tadeusz Struk , linux-integrity@vger.kernel.org, linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org, Tomas Winkler Subject: [PATCH v6 00/21] tpm: separate tpm 1.x and tpm 2.x commands Date: Wed, 17 Oct 2018 09:45:53 +0300 Message-Id: <20181017064613.19746-1-tomas.winkler@intel.com> X-Mailer: git-send-email 2.14.4 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This patch series provides initial separation of tpm 1.x and tpm 2.x commands, in foresight that the tpm 1.x chips will eventually phase out and can be compiled out for modern systems. A new file is added tpm1-cmd.c that contains tpm 1.x specific commands. In addition, tpm 1.x commands are now implemented using tpm_buf structure and instead of tpm_cmd_t construct. The latter is now removed. Note: my tpm 1.x HW availability is limited hence some more testing is needed. This series also contains two trivial cleanups and addition of new commands by TCG spec 1.36, now supported on new Intet's platforms. V6: 1. Dropping tpm: move pcr extend code to tpm2-cmd.c and rebasing code over that change 2. Trivial fixes in kdoc and header Tomas Winkler (21): tpm2: add new tpm2 commands according to TCG 1.36 tpm: sort objects in the Makefile tpm: factor out tpm 1.x duration calculation to tpm1-cmd.c tpm: add tpm_calc_ordinal_duration() wrapper tpm: factor out tpm_get_timeouts() tpm: move tpm1_pcr_extend to tpm1-cmd.c tpm: move tpm_getcap to tpm1-cmd.c tpm: factor out tpm1_get_random into tpm1-cmd.c tpm: move tpm 1.x selftest code from tpm-interface.c tpm1-cmd.c tpm: factor out tpm 1.x pm suspend flow into tpm1-cmd.c tpm: factor out tpm_startup function tpm: add tpm_auto_startup() into tpm-interface.c tpm: tpm-interface.c drop unused macros tpm: tpm-space.c remove unneeded semicolon tpm: tpm1: rewrite tpm1_get_random() using tpm_buf structure tpm1: implement tpm1_pcr_read_dev() using tpm_buf structure tmp1: rename tpm1_pcr_read_dev to tpm1_pcr_read() tpm1: reimplement SAVESTATE using tpm_buf tpm1: reimplement tpm1_continue_selftest() using tpm_buf tpm: use u32 instead of int for PCR index drivers/char/tpm/Makefile | 16 +- drivers/char/tpm/st33zp24/st33zp24.c | 2 +- drivers/char/tpm/tpm-chip.c | 11 +- drivers/char/tpm/tpm-interface.c | 817 +++-------------------------------- drivers/char/tpm/tpm-sysfs.c | 52 +-- drivers/char/tpm/tpm.h | 97 ++--- drivers/char/tpm/tpm1-cmd.c | 781 +++++++++++++++++++++++++++++++++ drivers/char/tpm/tpm2-cmd.c | 301 +++++++------ drivers/char/tpm/tpm2-space.c | 2 +- drivers/char/tpm/tpm_i2c_nuvoton.c | 10 +- drivers/char/tpm/tpm_tis_core.c | 10 +- include/linux/tpm.h | 11 +- security/integrity/ima/ima_crypto.c | 5 +- 13 files changed, 1081 insertions(+), 1034 deletions(-) create mode 100644 drivers/char/tpm/tpm1-cmd.c -- 2.14.4