Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp839265imu; Tue, 27 Nov 2018 23:52:14 -0800 (PST) X-Google-Smtp-Source: AFSGD/V2OY26ptFXxFFEoMpar61vYHRJ88Gn3epyNRaopIcORzAMXaYBUSrLOdomW9tF6MEubCOe X-Received: by 2002:a17:902:b20e:: with SMTP id t14mr25452640plr.128.1543391534055; Tue, 27 Nov 2018 23:52:14 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1543391534; cv=none; d=google.com; s=arc-20160816; b=C8BacFqAp4glAmrInxOM1P3weGzx7GxQV0smwOQyyp3LBufLddPigUy5o27zOydl7r VgKE24CTJ6fIs6jbJQj5NBK3hTr9y9GTuGrdpLOCtNjn4h5Jb1+WmlH9KicPycdjbtdI kwaO4YqXakzOyqtVp7gM2hS7ju75T0Ho0fcRnrCV6sWs9oXEOFNfWhgMFb+06+Uc4bJu 4I672TwYB9CPZoGdOLlqt8ilfWGy7Jh5dbcSiwB5iq/1zVbi3cAq1zggfAV2vv9L05iF iyTTZa67JxMNrlqElNmQvOymoSw1ZRSRh2+qkQrgLp0yHpLb8jirE2d2bKTWkpdlPcAZ x9wQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=gbDNruuaPwkWzPnh+vdYmcZkO23XnnkLbR0A6rH2nhc=; b=yKD/+b/gXuILjjloA68NhrZDhLtO42BF6vmHQx3WCFPJNIZVnfJTdTTYDMtxO8jM77 pY6wvBBCvC6bTjv0HklC5zhu5SDc4iIYWEiVFYSFWRh44FXNA76+KtkCi48VnHAQratA GSiBIWw0WC4KbLs8/ByMARf4PWKcOLHilFhuTU94WZDjAMOdaA794ttlAMaDYwWmfeUe HXL0c1FTrFiWoaAgK6J/1pmotyirNngeqFxiJgNZe63fq1stm+wFjDBJbEtWwFN8WOzs g4VxbNbhdRpKhHco954E+UaHWTtHvlY+575ObFSpNqBYvYOvF4mo2VH77/eGa9gJHX8P 9SAQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id ca6si7263307plb.141.2018.11.27.23.51.58; Tue, 27 Nov 2018 23:52:14 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727668AbeK1SvZ (ORCPT + 99 others); Wed, 28 Nov 2018 13:51:25 -0500 Received: from lhrrgout.huawei.com ([185.176.76.210]:32785 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1727268AbeK1SvY (ORCPT ); Wed, 28 Nov 2018 13:51:24 -0500 Received: from LHREML712-CAH.china.huawei.com (unknown [172.18.7.108]) by Forcepoint Email with ESMTP id 91678C7C568CE; Wed, 28 Nov 2018 07:50:38 +0000 (GMT) Received: from [10.204.65.144] (10.204.65.144) by smtpsuk.huawei.com (10.201.108.35) with Microsoft SMTP Server (TLS) id 14.3.408.0; Wed, 28 Nov 2018 07:50:31 +0000 Subject: Re: [PATCH v5 2/7] tpm: remove definition of TPM2_ACTIVE_PCR_BANKS To: Jarkko Sakkinen CC: , , , , , , References: <20181114153108.12907-1-roberto.sassu@huawei.com> <20181114153108.12907-3-roberto.sassu@huawei.com> <20181116133851.GB4163@linux.intel.com> From: Roberto Sassu Message-ID: <5c4866e4-dee0-730c-f08b-8ea8d00dbd96@huawei.com> Date: Wed, 28 Nov 2018 08:50:26 +0100 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.3.0 MIME-Version: 1.0 In-Reply-To: <20181116133851.GB4163@linux.intel.com> Content-Type: text/plain; charset="utf-8"; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Originating-IP: [10.204.65.144] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 11/16/2018 2:38 PM, Jarkko Sakkinen wrote: > On Wed, Nov 14, 2018 at 04:31:03PM +0100, Roberto Sassu wrote: >> tcg_efi_specid_event and tcg_pcr_event2 declaration contains static arrays >> for a list of hash algorithms used for event logs and event log digests. >> >> However, according to TCG EFI Protocol Specification, these arrays have >> variable sizes. Setting the array size to zero or 3 does not make any >> difference, because the parser has to adjust the offset depending on the >> actual array size to access structure members after the static arrays. >> >> Thus, this patch removes the declaration of TPM2_ACTIVE_PCR_BANKS and sets >> the array size to zero. >> >> Fixes: 4d23cc323cdb ("tpm: add securityfs support for TPM 2.0 firmware >> event log") >> >> Signed-off-by: Roberto Sassu >> --- >> include/linux/tpm_eventlog.h | 5 ++--- >> 1 file changed, 2 insertions(+), 3 deletions(-) >> >> diff --git a/include/linux/tpm_eventlog.h b/include/linux/tpm_eventlog.h >> index 20d9da77fc11..3d5d162f09cc 100644 >> --- a/include/linux/tpm_eventlog.h >> +++ b/include/linux/tpm_eventlog.h >> @@ -8,7 +8,6 @@ >> #define TCG_EVENT_NAME_LEN_MAX 255 >> #define MAX_TEXT_EVENT 1000 /* Max event string length */ >> #define ACPI_TCPA_SIG "TCPA" /* 0x41504354 /'TCPA' */ >> -#define TPM2_ACTIVE_PCR_BANKS 3 >> >> #define EFI_TCG2_EVENT_LOG_FORMAT_TCG_1_2 0x1 >> #define EFI_TCG2_EVENT_LOG_FORMAT_TCG_2 0x2 >> @@ -90,7 +89,7 @@ struct tcg_efi_specid_event { >> u8 spec_errata; >> u8 uintnsize; >> u32 num_algs; >> - struct tcg_efi_specid_event_algs digest_sizes[TPM2_ACTIVE_PCR_BANKS]; >> + struct tcg_efi_specid_event_algs digest_sizes[0]; >> u8 vendor_info_size; >> u8 vendor_info[0]; >> } __packed; >> @@ -117,7 +116,7 @@ struct tcg_pcr_event2 { >> u32 pcr_idx; >> u32 event_type; >> u32 count; >> - struct tpm2_digest digests[TPM2_ACTIVE_PCR_BANKS]; >> + struct tpm2_digest digests[0]; >> struct tcg_event_field event; >> } __packed; >> >> -- >> 2.17.1 >> > > NAK for the same reason as last time. No Fixes tag, or Fixes tag without newline? Roberto > /Jarkko > -- HUAWEI TECHNOLOGIES Duesseldorf GmbH, HRB 56063 Managing Director: Bo PENG, Jian LI, Yanli SHI