.. | .. |
---|
| 1 | +// SPDX-License-Identifier: GPL-2.0-only |
---|
1 | 2 | /* |
---|
2 | 3 | * Copyright (C) 2004 IBM Corporation |
---|
3 | 4 | * Copyright (C) 2014 Intel Corporation |
---|
.. | .. |
---|
13 | 14 | * Device driver for TCG/TCPA TPM (trusted platform module). |
---|
14 | 15 | * Specifications at www.trustedcomputinggroup.org |
---|
15 | 16 | * |
---|
16 | | - * This program is free software; you can redistribute it and/or |
---|
17 | | - * modify it under the terms of the GNU General Public License as |
---|
18 | | - * published by the Free Software Foundation, version 2 of the |
---|
19 | | - * License. |
---|
20 | | - * |
---|
21 | 17 | * Note, the TPM chip is not interrupt driven (only polling) |
---|
22 | 18 | * and can have very long timeouts (minutes!). Hence the unusual |
---|
23 | 19 | * calls to msleep. |
---|
24 | | - * |
---|
25 | 20 | */ |
---|
26 | 21 | |
---|
27 | 22 | #include <linux/poll.h> |
---|
28 | 23 | #include <linux/slab.h> |
---|
29 | 24 | #include <linux/mutex.h> |
---|
30 | 25 | #include <linux/spinlock.h> |
---|
| 26 | +#include <linux/suspend.h> |
---|
31 | 27 | #include <linux/freezer.h> |
---|
32 | 28 | #include <linux/tpm_eventlog.h> |
---|
33 | 29 | |
---|
34 | 30 | #include "tpm.h" |
---|
35 | | - |
---|
36 | | -#define TPM_MAX_ORDINAL 243 |
---|
37 | | -#define TSC_MAX_ORDINAL 12 |
---|
38 | | -#define TPM_PROTECTED_COMMAND 0x00 |
---|
39 | | -#define TPM_CONNECTION_COMMAND 0x40 |
---|
40 | 31 | |
---|
41 | 32 | /* |
---|
42 | 33 | * Bug workaround - some TPM's don't flush the most |
---|
43 | 34 | * recently changed pcr on suspend, so force the flush |
---|
44 | 35 | * with an extend to the selected _unused_ non-volatile pcr. |
---|
45 | 36 | */ |
---|
46 | | -static int tpm_suspend_pcr; |
---|
| 37 | +static u32 tpm_suspend_pcr; |
---|
47 | 38 | module_param_named(suspend_pcr, tpm_suspend_pcr, uint, 0644); |
---|
48 | 39 | MODULE_PARM_DESC(suspend_pcr, |
---|
49 | 40 | "PCR to use for dummy writes to facilitate flush on suspend."); |
---|
50 | 41 | |
---|
51 | | -/* |
---|
52 | | - * Array with one entry per ordinal defining the maximum amount |
---|
53 | | - * of time the chip could take to return the result. The ordinal |
---|
54 | | - * designation of short, medium or long is defined in a table in |
---|
55 | | - * TCG Specification TPM Main Part 2 TPM Structures Section 17. The |
---|
56 | | - * values of the SHORT, MEDIUM, and LONG durations are retrieved |
---|
57 | | - * from the chip during initialization with a call to tpm_get_timeouts. |
---|
| 42 | +/** |
---|
| 43 | + * tpm_calc_ordinal_duration() - calculate the maximum command duration |
---|
| 44 | + * @chip: TPM chip to use. |
---|
| 45 | + * @ordinal: TPM command ordinal. |
---|
| 46 | + * |
---|
| 47 | + * The function returns the maximum amount of time the chip could take |
---|
| 48 | + * to return the result for a particular ordinal in jiffies. |
---|
| 49 | + * |
---|
| 50 | + * Return: A maximal duration time for an ordinal in jiffies. |
---|
58 | 51 | */ |
---|
59 | | -static const u8 tpm_ordinal_duration[TPM_MAX_ORDINAL] = { |
---|
60 | | - TPM_UNDEFINED, /* 0 */ |
---|
61 | | - TPM_UNDEFINED, |
---|
62 | | - TPM_UNDEFINED, |
---|
63 | | - TPM_UNDEFINED, |
---|
64 | | - TPM_UNDEFINED, |
---|
65 | | - TPM_UNDEFINED, /* 5 */ |
---|
66 | | - TPM_UNDEFINED, |
---|
67 | | - TPM_UNDEFINED, |
---|
68 | | - TPM_UNDEFINED, |
---|
69 | | - TPM_UNDEFINED, |
---|
70 | | - TPM_SHORT, /* 10 */ |
---|
71 | | - TPM_SHORT, |
---|
72 | | - TPM_MEDIUM, |
---|
73 | | - TPM_LONG, |
---|
74 | | - TPM_LONG, |
---|
75 | | - TPM_MEDIUM, /* 15 */ |
---|
76 | | - TPM_SHORT, |
---|
77 | | - TPM_SHORT, |
---|
78 | | - TPM_MEDIUM, |
---|
79 | | - TPM_LONG, |
---|
80 | | - TPM_SHORT, /* 20 */ |
---|
81 | | - TPM_SHORT, |
---|
82 | | - TPM_MEDIUM, |
---|
83 | | - TPM_MEDIUM, |
---|
84 | | - TPM_MEDIUM, |
---|
85 | | - TPM_SHORT, /* 25 */ |
---|
86 | | - TPM_SHORT, |
---|
87 | | - TPM_MEDIUM, |
---|
88 | | - TPM_SHORT, |
---|
89 | | - TPM_SHORT, |
---|
90 | | - TPM_MEDIUM, /* 30 */ |
---|
91 | | - TPM_LONG, |
---|
92 | | - TPM_MEDIUM, |
---|
93 | | - TPM_SHORT, |
---|
94 | | - TPM_SHORT, |
---|
95 | | - TPM_SHORT, /* 35 */ |
---|
96 | | - TPM_MEDIUM, |
---|
97 | | - TPM_MEDIUM, |
---|
98 | | - TPM_UNDEFINED, |
---|
99 | | - TPM_UNDEFINED, |
---|
100 | | - TPM_MEDIUM, /* 40 */ |
---|
101 | | - TPM_LONG, |
---|
102 | | - TPM_MEDIUM, |
---|
103 | | - TPM_SHORT, |
---|
104 | | - TPM_SHORT, |
---|
105 | | - TPM_SHORT, /* 45 */ |
---|
106 | | - TPM_SHORT, |
---|
107 | | - TPM_SHORT, |
---|
108 | | - TPM_SHORT, |
---|
109 | | - TPM_LONG, |
---|
110 | | - TPM_MEDIUM, /* 50 */ |
---|
111 | | - TPM_MEDIUM, |
---|
112 | | - TPM_UNDEFINED, |
---|
113 | | - TPM_UNDEFINED, |
---|
114 | | - TPM_UNDEFINED, |
---|
115 | | - TPM_UNDEFINED, /* 55 */ |
---|
116 | | - TPM_UNDEFINED, |
---|
117 | | - TPM_UNDEFINED, |
---|
118 | | - TPM_UNDEFINED, |
---|
119 | | - TPM_UNDEFINED, |
---|
120 | | - TPM_MEDIUM, /* 60 */ |
---|
121 | | - TPM_MEDIUM, |
---|
122 | | - TPM_MEDIUM, |
---|
123 | | - TPM_SHORT, |
---|
124 | | - TPM_SHORT, |
---|
125 | | - TPM_MEDIUM, /* 65 */ |
---|
126 | | - TPM_UNDEFINED, |
---|
127 | | - TPM_UNDEFINED, |
---|
128 | | - TPM_UNDEFINED, |
---|
129 | | - TPM_UNDEFINED, |
---|
130 | | - TPM_SHORT, /* 70 */ |
---|
131 | | - TPM_SHORT, |
---|
132 | | - TPM_UNDEFINED, |
---|
133 | | - TPM_UNDEFINED, |
---|
134 | | - TPM_UNDEFINED, |
---|
135 | | - TPM_UNDEFINED, /* 75 */ |
---|
136 | | - TPM_UNDEFINED, |
---|
137 | | - TPM_UNDEFINED, |
---|
138 | | - TPM_UNDEFINED, |
---|
139 | | - TPM_UNDEFINED, |
---|
140 | | - TPM_LONG, /* 80 */ |
---|
141 | | - TPM_UNDEFINED, |
---|
142 | | - TPM_MEDIUM, |
---|
143 | | - TPM_LONG, |
---|
144 | | - TPM_SHORT, |
---|
145 | | - TPM_UNDEFINED, /* 85 */ |
---|
146 | | - TPM_UNDEFINED, |
---|
147 | | - TPM_UNDEFINED, |
---|
148 | | - TPM_UNDEFINED, |
---|
149 | | - TPM_UNDEFINED, |
---|
150 | | - TPM_SHORT, /* 90 */ |
---|
151 | | - TPM_SHORT, |
---|
152 | | - TPM_SHORT, |
---|
153 | | - TPM_SHORT, |
---|
154 | | - TPM_SHORT, |
---|
155 | | - TPM_UNDEFINED, /* 95 */ |
---|
156 | | - TPM_UNDEFINED, |
---|
157 | | - TPM_UNDEFINED, |
---|
158 | | - TPM_UNDEFINED, |
---|
159 | | - TPM_UNDEFINED, |
---|
160 | | - TPM_MEDIUM, /* 100 */ |
---|
161 | | - TPM_SHORT, |
---|
162 | | - TPM_SHORT, |
---|
163 | | - TPM_UNDEFINED, |
---|
164 | | - TPM_UNDEFINED, |
---|
165 | | - TPM_UNDEFINED, /* 105 */ |
---|
166 | | - TPM_UNDEFINED, |
---|
167 | | - TPM_UNDEFINED, |
---|
168 | | - TPM_UNDEFINED, |
---|
169 | | - TPM_UNDEFINED, |
---|
170 | | - TPM_SHORT, /* 110 */ |
---|
171 | | - TPM_SHORT, |
---|
172 | | - TPM_SHORT, |
---|
173 | | - TPM_SHORT, |
---|
174 | | - TPM_SHORT, |
---|
175 | | - TPM_SHORT, /* 115 */ |
---|
176 | | - TPM_SHORT, |
---|
177 | | - TPM_SHORT, |
---|
178 | | - TPM_UNDEFINED, |
---|
179 | | - TPM_UNDEFINED, |
---|
180 | | - TPM_LONG, /* 120 */ |
---|
181 | | - TPM_LONG, |
---|
182 | | - TPM_MEDIUM, |
---|
183 | | - TPM_UNDEFINED, |
---|
184 | | - TPM_SHORT, |
---|
185 | | - TPM_SHORT, /* 125 */ |
---|
186 | | - TPM_SHORT, |
---|
187 | | - TPM_LONG, |
---|
188 | | - TPM_SHORT, |
---|
189 | | - TPM_SHORT, |
---|
190 | | - TPM_SHORT, /* 130 */ |
---|
191 | | - TPM_MEDIUM, |
---|
192 | | - TPM_UNDEFINED, |
---|
193 | | - TPM_SHORT, |
---|
194 | | - TPM_MEDIUM, |
---|
195 | | - TPM_UNDEFINED, /* 135 */ |
---|
196 | | - TPM_UNDEFINED, |
---|
197 | | - TPM_UNDEFINED, |
---|
198 | | - TPM_UNDEFINED, |
---|
199 | | - TPM_UNDEFINED, |
---|
200 | | - TPM_SHORT, /* 140 */ |
---|
201 | | - TPM_SHORT, |
---|
202 | | - TPM_UNDEFINED, |
---|
203 | | - TPM_UNDEFINED, |
---|
204 | | - TPM_UNDEFINED, |
---|
205 | | - TPM_UNDEFINED, /* 145 */ |
---|
206 | | - TPM_UNDEFINED, |
---|
207 | | - TPM_UNDEFINED, |
---|
208 | | - TPM_UNDEFINED, |
---|
209 | | - TPM_UNDEFINED, |
---|
210 | | - TPM_SHORT, /* 150 */ |
---|
211 | | - TPM_MEDIUM, |
---|
212 | | - TPM_MEDIUM, |
---|
213 | | - TPM_SHORT, |
---|
214 | | - TPM_SHORT, |
---|
215 | | - TPM_UNDEFINED, /* 155 */ |
---|
216 | | - TPM_UNDEFINED, |
---|
217 | | - TPM_UNDEFINED, |
---|
218 | | - TPM_UNDEFINED, |
---|
219 | | - TPM_UNDEFINED, |
---|
220 | | - TPM_SHORT, /* 160 */ |
---|
221 | | - TPM_SHORT, |
---|
222 | | - TPM_SHORT, |
---|
223 | | - TPM_SHORT, |
---|
224 | | - TPM_UNDEFINED, |
---|
225 | | - TPM_UNDEFINED, /* 165 */ |
---|
226 | | - TPM_UNDEFINED, |
---|
227 | | - TPM_UNDEFINED, |
---|
228 | | - TPM_UNDEFINED, |
---|
229 | | - TPM_UNDEFINED, |
---|
230 | | - TPM_LONG, /* 170 */ |
---|
231 | | - TPM_UNDEFINED, |
---|
232 | | - TPM_UNDEFINED, |
---|
233 | | - TPM_UNDEFINED, |
---|
234 | | - TPM_UNDEFINED, |
---|
235 | | - TPM_UNDEFINED, /* 175 */ |
---|
236 | | - TPM_UNDEFINED, |
---|
237 | | - TPM_UNDEFINED, |
---|
238 | | - TPM_UNDEFINED, |
---|
239 | | - TPM_UNDEFINED, |
---|
240 | | - TPM_MEDIUM, /* 180 */ |
---|
241 | | - TPM_SHORT, |
---|
242 | | - TPM_MEDIUM, |
---|
243 | | - TPM_MEDIUM, |
---|
244 | | - TPM_MEDIUM, |
---|
245 | | - TPM_MEDIUM, /* 185 */ |
---|
246 | | - TPM_SHORT, |
---|
247 | | - TPM_UNDEFINED, |
---|
248 | | - TPM_UNDEFINED, |
---|
249 | | - TPM_UNDEFINED, |
---|
250 | | - TPM_UNDEFINED, /* 190 */ |
---|
251 | | - TPM_UNDEFINED, |
---|
252 | | - TPM_UNDEFINED, |
---|
253 | | - TPM_UNDEFINED, |
---|
254 | | - TPM_UNDEFINED, |
---|
255 | | - TPM_UNDEFINED, /* 195 */ |
---|
256 | | - TPM_UNDEFINED, |
---|
257 | | - TPM_UNDEFINED, |
---|
258 | | - TPM_UNDEFINED, |
---|
259 | | - TPM_UNDEFINED, |
---|
260 | | - TPM_SHORT, /* 200 */ |
---|
261 | | - TPM_UNDEFINED, |
---|
262 | | - TPM_UNDEFINED, |
---|
263 | | - TPM_UNDEFINED, |
---|
264 | | - TPM_SHORT, |
---|
265 | | - TPM_SHORT, /* 205 */ |
---|
266 | | - TPM_SHORT, |
---|
267 | | - TPM_SHORT, |
---|
268 | | - TPM_SHORT, |
---|
269 | | - TPM_SHORT, |
---|
270 | | - TPM_MEDIUM, /* 210 */ |
---|
271 | | - TPM_UNDEFINED, |
---|
272 | | - TPM_MEDIUM, |
---|
273 | | - TPM_MEDIUM, |
---|
274 | | - TPM_MEDIUM, |
---|
275 | | - TPM_UNDEFINED, /* 215 */ |
---|
276 | | - TPM_MEDIUM, |
---|
277 | | - TPM_UNDEFINED, |
---|
278 | | - TPM_UNDEFINED, |
---|
279 | | - TPM_SHORT, |
---|
280 | | - TPM_SHORT, /* 220 */ |
---|
281 | | - TPM_SHORT, |
---|
282 | | - TPM_SHORT, |
---|
283 | | - TPM_SHORT, |
---|
284 | | - TPM_SHORT, |
---|
285 | | - TPM_UNDEFINED, /* 225 */ |
---|
286 | | - TPM_UNDEFINED, |
---|
287 | | - TPM_UNDEFINED, |
---|
288 | | - TPM_UNDEFINED, |
---|
289 | | - TPM_UNDEFINED, |
---|
290 | | - TPM_SHORT, /* 230 */ |
---|
291 | | - TPM_LONG, |
---|
292 | | - TPM_MEDIUM, |
---|
293 | | - TPM_UNDEFINED, |
---|
294 | | - TPM_UNDEFINED, |
---|
295 | | - TPM_UNDEFINED, /* 235 */ |
---|
296 | | - TPM_UNDEFINED, |
---|
297 | | - TPM_UNDEFINED, |
---|
298 | | - TPM_UNDEFINED, |
---|
299 | | - TPM_UNDEFINED, |
---|
300 | | - TPM_SHORT, /* 240 */ |
---|
301 | | - TPM_UNDEFINED, |
---|
302 | | - TPM_MEDIUM, |
---|
303 | | -}; |
---|
304 | | - |
---|
305 | | -/* |
---|
306 | | - * Returns max number of jiffies to wait |
---|
307 | | - */ |
---|
308 | | -unsigned long tpm_calc_ordinal_duration(struct tpm_chip *chip, |
---|
309 | | - u32 ordinal) |
---|
| 52 | +unsigned long tpm_calc_ordinal_duration(struct tpm_chip *chip, u32 ordinal) |
---|
310 | 53 | { |
---|
311 | | - int duration_idx = TPM_UNDEFINED; |
---|
312 | | - int duration = 0; |
---|
313 | | - |
---|
314 | | - /* |
---|
315 | | - * We only have a duration table for protected commands, where the upper |
---|
316 | | - * 16 bits are 0. For the few other ordinals the fallback will be used. |
---|
317 | | - */ |
---|
318 | | - if (ordinal < TPM_MAX_ORDINAL) |
---|
319 | | - duration_idx = tpm_ordinal_duration[ordinal]; |
---|
320 | | - |
---|
321 | | - if (duration_idx != TPM_UNDEFINED) |
---|
322 | | - duration = chip->duration[duration_idx]; |
---|
323 | | - if (duration <= 0) |
---|
324 | | - return 2 * 60 * HZ; |
---|
| 54 | + if (chip->flags & TPM_CHIP_FLAG_TPM2) |
---|
| 55 | + return tpm2_calc_ordinal_duration(chip, ordinal); |
---|
325 | 56 | else |
---|
326 | | - return duration; |
---|
| 57 | + return tpm1_calc_ordinal_duration(chip, ordinal); |
---|
327 | 58 | } |
---|
328 | 59 | EXPORT_SYMBOL_GPL(tpm_calc_ordinal_duration); |
---|
329 | 60 | |
---|
330 | | -static int tpm_validate_command(struct tpm_chip *chip, |
---|
331 | | - struct tpm_space *space, |
---|
332 | | - const u8 *cmd, |
---|
333 | | - size_t len) |
---|
| 61 | +static ssize_t tpm_try_transmit(struct tpm_chip *chip, void *buf, size_t bufsiz) |
---|
334 | 62 | { |
---|
335 | | - const struct tpm_input_header *header = (const void *)cmd; |
---|
336 | | - int i; |
---|
337 | | - u32 cc; |
---|
338 | | - u32 attrs; |
---|
339 | | - unsigned int nr_handles; |
---|
340 | | - |
---|
341 | | - if (len < TPM_HEADER_SIZE) |
---|
342 | | - return -EINVAL; |
---|
343 | | - |
---|
344 | | - if (!space) |
---|
345 | | - return 0; |
---|
346 | | - |
---|
347 | | - if (chip->flags & TPM_CHIP_FLAG_TPM2 && chip->nr_commands) { |
---|
348 | | - cc = be32_to_cpu(header->ordinal); |
---|
349 | | - |
---|
350 | | - i = tpm2_find_cc(chip, cc); |
---|
351 | | - if (i < 0) { |
---|
352 | | - dev_dbg(&chip->dev, "0x%04X is an invalid command\n", |
---|
353 | | - cc); |
---|
354 | | - return -EOPNOTSUPP; |
---|
355 | | - } |
---|
356 | | - |
---|
357 | | - attrs = chip->cc_attrs_tbl[i]; |
---|
358 | | - nr_handles = |
---|
359 | | - 4 * ((attrs >> TPM2_CC_ATTR_CHANDLES) & GENMASK(2, 0)); |
---|
360 | | - if (len < TPM_HEADER_SIZE + 4 * nr_handles) |
---|
361 | | - goto err_len; |
---|
362 | | - } |
---|
363 | | - |
---|
364 | | - return 0; |
---|
365 | | -err_len: |
---|
366 | | - dev_dbg(&chip->dev, |
---|
367 | | - "%s: insufficient command length %zu", __func__, len); |
---|
368 | | - return -EINVAL; |
---|
369 | | -} |
---|
370 | | - |
---|
371 | | -static int tpm_request_locality(struct tpm_chip *chip, unsigned int flags) |
---|
372 | | -{ |
---|
373 | | - int rc; |
---|
374 | | - |
---|
375 | | - if (flags & TPM_TRANSMIT_NESTED) |
---|
376 | | - return 0; |
---|
377 | | - |
---|
378 | | - if (!chip->ops->request_locality) |
---|
379 | | - return 0; |
---|
380 | | - |
---|
381 | | - rc = chip->ops->request_locality(chip, 0); |
---|
382 | | - if (rc < 0) |
---|
383 | | - return rc; |
---|
384 | | - |
---|
385 | | - chip->locality = rc; |
---|
386 | | - |
---|
387 | | - return 0; |
---|
388 | | -} |
---|
389 | | - |
---|
390 | | -static void tpm_relinquish_locality(struct tpm_chip *chip, unsigned int flags) |
---|
391 | | -{ |
---|
392 | | - int rc; |
---|
393 | | - |
---|
394 | | - if (flags & TPM_TRANSMIT_NESTED) |
---|
395 | | - return; |
---|
396 | | - |
---|
397 | | - if (!chip->ops->relinquish_locality) |
---|
398 | | - return; |
---|
399 | | - |
---|
400 | | - rc = chip->ops->relinquish_locality(chip, chip->locality); |
---|
401 | | - if (rc) |
---|
402 | | - dev_err(&chip->dev, "%s: : error %d\n", __func__, rc); |
---|
403 | | - |
---|
404 | | - chip->locality = -1; |
---|
405 | | -} |
---|
406 | | - |
---|
407 | | -static int tpm_cmd_ready(struct tpm_chip *chip, unsigned int flags) |
---|
408 | | -{ |
---|
409 | | - if (flags & TPM_TRANSMIT_NESTED) |
---|
410 | | - return 0; |
---|
411 | | - |
---|
412 | | - if (!chip->ops->cmd_ready) |
---|
413 | | - return 0; |
---|
414 | | - |
---|
415 | | - return chip->ops->cmd_ready(chip); |
---|
416 | | -} |
---|
417 | | - |
---|
418 | | -static int tpm_go_idle(struct tpm_chip *chip, unsigned int flags) |
---|
419 | | -{ |
---|
420 | | - if (flags & TPM_TRANSMIT_NESTED) |
---|
421 | | - return 0; |
---|
422 | | - |
---|
423 | | - if (!chip->ops->go_idle) |
---|
424 | | - return 0; |
---|
425 | | - |
---|
426 | | - return chip->ops->go_idle(chip); |
---|
427 | | -} |
---|
428 | | - |
---|
429 | | -static ssize_t tpm_try_transmit(struct tpm_chip *chip, |
---|
430 | | - struct tpm_space *space, |
---|
431 | | - u8 *buf, size_t bufsiz, |
---|
432 | | - unsigned int flags) |
---|
433 | | -{ |
---|
434 | | - struct tpm_output_header *header = (void *)buf; |
---|
| 63 | + struct tpm_header *header = buf; |
---|
435 | 64 | int rc; |
---|
436 | 65 | ssize_t len = 0; |
---|
437 | 66 | u32 count, ordinal; |
---|
438 | 67 | unsigned long stop; |
---|
439 | | - bool need_locality; |
---|
440 | 68 | |
---|
441 | | - rc = tpm_validate_command(chip, space, buf, bufsiz); |
---|
442 | | - if (rc == -EINVAL) |
---|
443 | | - return rc; |
---|
444 | | - /* |
---|
445 | | - * If the command is not implemented by the TPM, synthesize a |
---|
446 | | - * response with a TPM2_RC_COMMAND_CODE return for user-space. |
---|
447 | | - */ |
---|
448 | | - if (rc == -EOPNOTSUPP) { |
---|
449 | | - header->length = cpu_to_be32(sizeof(*header)); |
---|
450 | | - header->tag = cpu_to_be16(TPM2_ST_NO_SESSIONS); |
---|
451 | | - header->return_code = cpu_to_be32(TPM2_RC_COMMAND_CODE | |
---|
452 | | - TSS2_RESMGR_TPM_RC_LAYER); |
---|
453 | | - return sizeof(*header); |
---|
454 | | - } |
---|
| 69 | + if (bufsiz < TPM_HEADER_SIZE) |
---|
| 70 | + return -EINVAL; |
---|
455 | 71 | |
---|
456 | 72 | if (bufsiz > TPM_BUFSIZE) |
---|
457 | 73 | bufsiz = TPM_BUFSIZE; |
---|
458 | 74 | |
---|
459 | | - count = be32_to_cpu(*((__be32 *) (buf + 2))); |
---|
460 | | - ordinal = be32_to_cpu(*((__be32 *) (buf + 6))); |
---|
| 75 | + count = be32_to_cpu(header->length); |
---|
| 76 | + ordinal = be32_to_cpu(header->ordinal); |
---|
461 | 77 | if (count == 0) |
---|
462 | 78 | return -ENODATA; |
---|
463 | 79 | if (count > bufsiz) { |
---|
.. | .. |
---|
466 | 82 | return -E2BIG; |
---|
467 | 83 | } |
---|
468 | 84 | |
---|
469 | | - if (!(flags & TPM_TRANSMIT_UNLOCKED) && !(flags & TPM_TRANSMIT_NESTED)) |
---|
470 | | - mutex_lock(&chip->tpm_mutex); |
---|
471 | | - |
---|
472 | | - if (chip->ops->clk_enable != NULL) |
---|
473 | | - chip->ops->clk_enable(chip, true); |
---|
474 | | - |
---|
475 | | - /* Store the decision as chip->locality will be changed. */ |
---|
476 | | - need_locality = chip->locality == -1; |
---|
477 | | - |
---|
478 | | - if (need_locality) { |
---|
479 | | - rc = tpm_request_locality(chip, flags); |
---|
480 | | - if (rc < 0) { |
---|
481 | | - need_locality = false; |
---|
482 | | - goto out_locality; |
---|
483 | | - } |
---|
484 | | - } |
---|
485 | | - |
---|
486 | | - rc = tpm_cmd_ready(chip, flags); |
---|
487 | | - if (rc) |
---|
488 | | - goto out_locality; |
---|
489 | | - |
---|
490 | | - rc = tpm2_prepare_space(chip, space, ordinal, buf); |
---|
491 | | - if (rc) |
---|
492 | | - goto out; |
---|
493 | | - |
---|
494 | 85 | rc = chip->ops->send(chip, buf, count); |
---|
495 | 86 | if (rc < 0) { |
---|
496 | 87 | if (rc != -EPIPE) |
---|
497 | 88 | dev_err(&chip->dev, |
---|
498 | 89 | "%s: send(): error %d\n", __func__, rc); |
---|
499 | | - goto out; |
---|
| 90 | + return rc; |
---|
500 | 91 | } |
---|
501 | 92 | |
---|
502 | 93 | /* A sanity check. send() should just return zero on success e.g. |
---|
.. | .. |
---|
511 | 102 | if (chip->flags & TPM_CHIP_FLAG_IRQ) |
---|
512 | 103 | goto out_recv; |
---|
513 | 104 | |
---|
514 | | - if (chip->flags & TPM_CHIP_FLAG_TPM2) |
---|
515 | | - stop = jiffies + tpm2_calc_ordinal_duration(chip, ordinal); |
---|
516 | | - else |
---|
517 | | - stop = jiffies + tpm_calc_ordinal_duration(chip, ordinal); |
---|
| 105 | + stop = jiffies + tpm_calc_ordinal_duration(chip, ordinal); |
---|
518 | 106 | do { |
---|
519 | 107 | u8 status = chip->ops->status(chip); |
---|
520 | 108 | if ((status & chip->ops->req_complete_mask) == |
---|
.. | .. |
---|
523 | 111 | |
---|
524 | 112 | if (chip->ops->req_canceled(chip, status)) { |
---|
525 | 113 | dev_err(&chip->dev, "Operation Canceled\n"); |
---|
526 | | - rc = -ECANCELED; |
---|
527 | | - goto out; |
---|
| 114 | + return -ECANCELED; |
---|
528 | 115 | } |
---|
529 | 116 | |
---|
530 | 117 | tpm_msleep(TPM_TIMEOUT_POLL); |
---|
.. | .. |
---|
533 | 120 | |
---|
534 | 121 | chip->ops->cancel(chip); |
---|
535 | 122 | dev_err(&chip->dev, "Operation Timed out\n"); |
---|
536 | | - rc = -ETIME; |
---|
537 | | - goto out; |
---|
| 123 | + return -ETIME; |
---|
538 | 124 | |
---|
539 | 125 | out_recv: |
---|
540 | 126 | len = chip->ops->recv(chip, buf, bufsiz); |
---|
541 | 127 | if (len < 0) { |
---|
542 | 128 | rc = len; |
---|
543 | | - dev_err(&chip->dev, |
---|
544 | | - "tpm_transmit: tpm_recv: error %d\n", rc); |
---|
545 | | - goto out; |
---|
546 | | - } else if (len < TPM_HEADER_SIZE) { |
---|
| 129 | + dev_err(&chip->dev, "tpm_transmit: tpm_recv: error %d\n", rc); |
---|
| 130 | + } else if (len < TPM_HEADER_SIZE || len != be32_to_cpu(header->length)) |
---|
547 | 131 | rc = -EFAULT; |
---|
548 | | - goto out; |
---|
549 | | - } |
---|
550 | 132 | |
---|
551 | | - if (len != be32_to_cpu(header->length)) { |
---|
552 | | - rc = -EFAULT; |
---|
553 | | - goto out; |
---|
554 | | - } |
---|
555 | | - |
---|
556 | | - rc = tpm2_commit_space(chip, space, ordinal, buf, &len); |
---|
557 | | - if (rc) |
---|
558 | | - dev_err(&chip->dev, "tpm2_commit_space: error %d\n", rc); |
---|
559 | | - |
---|
560 | | -out: |
---|
561 | | - /* may fail but do not override previous error value in rc */ |
---|
562 | | - tpm_go_idle(chip, flags); |
---|
563 | | - |
---|
564 | | -out_locality: |
---|
565 | | - if (need_locality) |
---|
566 | | - tpm_relinquish_locality(chip, flags); |
---|
567 | | - |
---|
568 | | - if (chip->ops->clk_enable != NULL) |
---|
569 | | - chip->ops->clk_enable(chip, false); |
---|
570 | | - |
---|
571 | | - if (!(flags & TPM_TRANSMIT_UNLOCKED) && !(flags & TPM_TRANSMIT_NESTED)) |
---|
572 | | - mutex_unlock(&chip->tpm_mutex); |
---|
573 | 133 | return rc ? rc : len; |
---|
574 | 134 | } |
---|
575 | 135 | |
---|
576 | 136 | /** |
---|
577 | 137 | * tpm_transmit - Internal kernel interface to transmit TPM commands. |
---|
| 138 | + * @chip: a TPM chip to use |
---|
| 139 | + * @buf: a TPM command buffer |
---|
| 140 | + * @bufsiz: length of the TPM command buffer |
---|
578 | 141 | * |
---|
579 | | - * @chip: TPM chip to use |
---|
580 | | - * @space: tpm space |
---|
581 | | - * @buf: TPM command buffer |
---|
582 | | - * @bufsiz: length of the TPM command buffer |
---|
583 | | - * @flags: tpm transmit flags - bitmap |
---|
| 142 | + * A wrapper around tpm_try_transmit() that handles TPM2_RC_RETRY returns from |
---|
| 143 | + * the TPM and retransmits the command after a delay up to a maximum wait of |
---|
| 144 | + * TPM2_DURATION_LONG. |
---|
584 | 145 | * |
---|
585 | | - * A wrapper around tpm_try_transmit that handles TPM2_RC_RETRY |
---|
586 | | - * returns from the TPM and retransmits the command after a delay up |
---|
587 | | - * to a maximum wait of TPM2_DURATION_LONG. |
---|
588 | | - * |
---|
589 | | - * Note: TPM1 never returns TPM2_RC_RETRY so the retry logic is TPM2 |
---|
590 | | - * only |
---|
| 146 | + * Note that TPM 1.x never returns TPM2_RC_RETRY so the retry logic is TPM 2.0 |
---|
| 147 | + * only. |
---|
591 | 148 | * |
---|
592 | 149 | * Return: |
---|
593 | | - * the length of the return when the operation is successful. |
---|
594 | | - * A negative number for system errors (errno). |
---|
| 150 | + * * The response length - OK |
---|
| 151 | + * * -errno - A system error |
---|
595 | 152 | */ |
---|
596 | | -ssize_t tpm_transmit(struct tpm_chip *chip, struct tpm_space *space, |
---|
597 | | - u8 *buf, size_t bufsiz, unsigned int flags) |
---|
| 153 | +ssize_t tpm_transmit(struct tpm_chip *chip, u8 *buf, size_t bufsiz) |
---|
598 | 154 | { |
---|
599 | | - struct tpm_output_header *header = (struct tpm_output_header *)buf; |
---|
| 155 | + struct tpm_header *header = (struct tpm_header *)buf; |
---|
600 | 156 | /* space for header and handles */ |
---|
601 | 157 | u8 save[TPM_HEADER_SIZE + 3*sizeof(u32)]; |
---|
602 | 158 | unsigned int delay_msec = TPM2_DURATION_SHORT; |
---|
603 | 159 | u32 rc = 0; |
---|
604 | 160 | ssize_t ret; |
---|
605 | | - const size_t save_size = min(space ? sizeof(save) : TPM_HEADER_SIZE, |
---|
606 | | - bufsiz); |
---|
| 161 | + const size_t save_size = min(sizeof(save), bufsiz); |
---|
607 | 162 | /* the command code is where the return code will be */ |
---|
608 | 163 | u32 cc = be32_to_cpu(header->return_code); |
---|
609 | 164 | |
---|
.. | .. |
---|
615 | 170 | memcpy(save, buf, save_size); |
---|
616 | 171 | |
---|
617 | 172 | for (;;) { |
---|
618 | | - ret = tpm_try_transmit(chip, space, buf, bufsiz, flags); |
---|
| 173 | + ret = tpm_try_transmit(chip, buf, bufsiz); |
---|
619 | 174 | if (ret < 0) |
---|
620 | 175 | break; |
---|
621 | 176 | rc = be32_to_cpu(header->return_code); |
---|
.. | .. |
---|
642 | 197 | } |
---|
643 | 198 | return ret; |
---|
644 | 199 | } |
---|
| 200 | + |
---|
645 | 201 | /** |
---|
646 | 202 | * tpm_transmit_cmd - send a tpm command to the device |
---|
647 | | - * The function extracts tpm out header return code |
---|
648 | | - * |
---|
649 | | - * @chip: TPM chip to use |
---|
650 | | - * @space: tpm space |
---|
651 | | - * @buf: TPM command buffer |
---|
652 | | - * @bufsiz: length of the buffer |
---|
653 | | - * @min_rsp_body_length: minimum expected length of response body |
---|
654 | | - * @flags: tpm transmit flags - bitmap |
---|
655 | | - * @desc: command description used in the error message |
---|
| 203 | + * @chip: a TPM chip to use |
---|
| 204 | + * @buf: a TPM command buffer |
---|
| 205 | + * @min_rsp_body_length: minimum expected length of response body |
---|
| 206 | + * @desc: command description used in the error message |
---|
656 | 207 | * |
---|
657 | 208 | * Return: |
---|
658 | | - * 0 when the operation is successful. |
---|
659 | | - * A negative number for system errors (errno). |
---|
660 | | - * A positive number for a TPM error. |
---|
| 209 | + * * 0 - OK |
---|
| 210 | + * * -errno - A system error |
---|
| 211 | + * * TPM_RC - A TPM error |
---|
661 | 212 | */ |
---|
662 | | -ssize_t tpm_transmit_cmd(struct tpm_chip *chip, struct tpm_space *space, |
---|
663 | | - void *buf, size_t bufsiz, |
---|
664 | | - size_t min_rsp_body_length, unsigned int flags, |
---|
665 | | - const char *desc) |
---|
| 213 | +ssize_t tpm_transmit_cmd(struct tpm_chip *chip, struct tpm_buf *buf, |
---|
| 214 | + size_t min_rsp_body_length, const char *desc) |
---|
666 | 215 | { |
---|
667 | | - const struct tpm_output_header *header = buf; |
---|
| 216 | + const struct tpm_header *header = (struct tpm_header *)buf->data; |
---|
668 | 217 | int err; |
---|
669 | 218 | ssize_t len; |
---|
670 | 219 | |
---|
671 | | - len = tpm_transmit(chip, space, buf, bufsiz, flags); |
---|
| 220 | + len = tpm_transmit(chip, buf->data, PAGE_SIZE); |
---|
672 | 221 | if (len < 0) |
---|
673 | 222 | return len; |
---|
674 | 223 | |
---|
675 | 224 | err = be32_to_cpu(header->return_code); |
---|
676 | 225 | if (err != 0 && err != TPM_ERR_DISABLED && err != TPM_ERR_DEACTIVATED |
---|
677 | | - && desc) |
---|
| 226 | + && err != TPM2_RC_TESTING && desc) |
---|
678 | 227 | dev_err(&chip->dev, "A TPM error (%d) occurred %s\n", err, |
---|
679 | 228 | desc); |
---|
680 | 229 | if (err) |
---|
.. | .. |
---|
687 | 236 | } |
---|
688 | 237 | EXPORT_SYMBOL_GPL(tpm_transmit_cmd); |
---|
689 | 238 | |
---|
690 | | -#define TPM_ORD_STARTUP 153 |
---|
691 | | -#define TPM_ST_CLEAR 1 |
---|
692 | | - |
---|
693 | | -/** |
---|
694 | | - * tpm_startup - turn on the TPM |
---|
695 | | - * @chip: TPM chip to use |
---|
696 | | - * |
---|
697 | | - * Normally the firmware should start the TPM. This function is provided as a |
---|
698 | | - * workaround if this does not happen. A legal case for this could be for |
---|
699 | | - * example when a TPM emulator is used. |
---|
700 | | - * |
---|
701 | | - * Return: same as tpm_transmit_cmd() |
---|
702 | | - */ |
---|
703 | | -int tpm_startup(struct tpm_chip *chip) |
---|
704 | | -{ |
---|
705 | | - struct tpm_buf buf; |
---|
706 | | - int rc; |
---|
707 | | - |
---|
708 | | - dev_info(&chip->dev, "starting up the TPM manually\n"); |
---|
709 | | - |
---|
710 | | - if (chip->flags & TPM_CHIP_FLAG_TPM2) { |
---|
711 | | - rc = tpm_buf_init(&buf, TPM2_ST_NO_SESSIONS, TPM2_CC_STARTUP); |
---|
712 | | - if (rc < 0) |
---|
713 | | - return rc; |
---|
714 | | - |
---|
715 | | - tpm_buf_append_u16(&buf, TPM2_SU_CLEAR); |
---|
716 | | - } else { |
---|
717 | | - rc = tpm_buf_init(&buf, TPM_TAG_RQU_COMMAND, TPM_ORD_STARTUP); |
---|
718 | | - if (rc < 0) |
---|
719 | | - return rc; |
---|
720 | | - |
---|
721 | | - tpm_buf_append_u16(&buf, TPM_ST_CLEAR); |
---|
722 | | - } |
---|
723 | | - |
---|
724 | | - rc = tpm_transmit_cmd(chip, NULL, buf.data, PAGE_SIZE, 0, 0, |
---|
725 | | - "attempting to start the TPM"); |
---|
726 | | - |
---|
727 | | - tpm_buf_destroy(&buf); |
---|
728 | | - return rc; |
---|
729 | | -} |
---|
730 | | - |
---|
731 | | -#define TPM_DIGEST_SIZE 20 |
---|
732 | | -#define TPM_RET_CODE_IDX 6 |
---|
733 | | -#define TPM_INTERNAL_RESULT_SIZE 200 |
---|
734 | | -#define TPM_ORD_GET_CAP 101 |
---|
735 | | -#define TPM_ORD_GET_RANDOM 70 |
---|
736 | | - |
---|
737 | | -static const struct tpm_input_header tpm_getcap_header = { |
---|
738 | | - .tag = cpu_to_be16(TPM_TAG_RQU_COMMAND), |
---|
739 | | - .length = cpu_to_be32(22), |
---|
740 | | - .ordinal = cpu_to_be32(TPM_ORD_GET_CAP) |
---|
741 | | -}; |
---|
742 | | - |
---|
743 | | -ssize_t tpm_getcap(struct tpm_chip *chip, u32 subcap_id, cap_t *cap, |
---|
744 | | - const char *desc, size_t min_cap_length) |
---|
745 | | -{ |
---|
746 | | - struct tpm_buf buf; |
---|
747 | | - int rc; |
---|
748 | | - |
---|
749 | | - rc = tpm_buf_init(&buf, TPM_TAG_RQU_COMMAND, TPM_ORD_GET_CAP); |
---|
750 | | - if (rc) |
---|
751 | | - return rc; |
---|
752 | | - |
---|
753 | | - if (subcap_id == TPM_CAP_VERSION_1_1 || |
---|
754 | | - subcap_id == TPM_CAP_VERSION_1_2) { |
---|
755 | | - tpm_buf_append_u32(&buf, subcap_id); |
---|
756 | | - tpm_buf_append_u32(&buf, 0); |
---|
757 | | - } else { |
---|
758 | | - if (subcap_id == TPM_CAP_FLAG_PERM || |
---|
759 | | - subcap_id == TPM_CAP_FLAG_VOL) |
---|
760 | | - tpm_buf_append_u32(&buf, TPM_CAP_FLAG); |
---|
761 | | - else |
---|
762 | | - tpm_buf_append_u32(&buf, TPM_CAP_PROP); |
---|
763 | | - |
---|
764 | | - tpm_buf_append_u32(&buf, 4); |
---|
765 | | - tpm_buf_append_u32(&buf, subcap_id); |
---|
766 | | - } |
---|
767 | | - rc = tpm_transmit_cmd(chip, NULL, buf.data, PAGE_SIZE, |
---|
768 | | - min_cap_length, 0, desc); |
---|
769 | | - if (!rc) |
---|
770 | | - *cap = *(cap_t *)&buf.data[TPM_HEADER_SIZE + 4]; |
---|
771 | | - |
---|
772 | | - tpm_buf_destroy(&buf); |
---|
773 | | - return rc; |
---|
774 | | -} |
---|
775 | | -EXPORT_SYMBOL_GPL(tpm_getcap); |
---|
776 | | - |
---|
777 | 239 | int tpm_get_timeouts(struct tpm_chip *chip) |
---|
778 | 240 | { |
---|
779 | | - cap_t cap; |
---|
780 | | - unsigned long timeout_old[4], timeout_chip[4], timeout_eff[4]; |
---|
781 | | - ssize_t rc; |
---|
782 | | - |
---|
783 | 241 | if (chip->flags & TPM_CHIP_FLAG_HAVE_TIMEOUTS) |
---|
784 | 242 | return 0; |
---|
785 | 243 | |
---|
786 | | - if (chip->flags & TPM_CHIP_FLAG_TPM2) { |
---|
787 | | - /* Fixed timeouts for TPM2 */ |
---|
788 | | - chip->timeout_a = msecs_to_jiffies(TPM2_TIMEOUT_A); |
---|
789 | | - chip->timeout_b = msecs_to_jiffies(TPM2_TIMEOUT_B); |
---|
790 | | - chip->timeout_c = msecs_to_jiffies(TPM2_TIMEOUT_C); |
---|
791 | | - chip->timeout_d = msecs_to_jiffies(TPM2_TIMEOUT_D); |
---|
792 | | - chip->duration[TPM_SHORT] = |
---|
793 | | - msecs_to_jiffies(TPM2_DURATION_SHORT); |
---|
794 | | - chip->duration[TPM_MEDIUM] = |
---|
795 | | - msecs_to_jiffies(TPM2_DURATION_MEDIUM); |
---|
796 | | - chip->duration[TPM_LONG] = |
---|
797 | | - msecs_to_jiffies(TPM2_DURATION_LONG); |
---|
798 | | - chip->duration[TPM_LONG_LONG] = |
---|
799 | | - msecs_to_jiffies(TPM2_DURATION_LONG_LONG); |
---|
800 | | - |
---|
801 | | - chip->flags |= TPM_CHIP_FLAG_HAVE_TIMEOUTS; |
---|
802 | | - return 0; |
---|
803 | | - } |
---|
804 | | - |
---|
805 | | - rc = tpm_getcap(chip, TPM_CAP_PROP_TIS_TIMEOUT, &cap, NULL, |
---|
806 | | - sizeof(cap.timeout)); |
---|
807 | | - if (rc == TPM_ERR_INVALID_POSTINIT) { |
---|
808 | | - if (tpm_startup(chip)) |
---|
809 | | - return rc; |
---|
810 | | - |
---|
811 | | - rc = tpm_getcap(chip, TPM_CAP_PROP_TIS_TIMEOUT, &cap, |
---|
812 | | - "attempting to determine the timeouts", |
---|
813 | | - sizeof(cap.timeout)); |
---|
814 | | - } |
---|
815 | | - |
---|
816 | | - if (rc) { |
---|
817 | | - dev_err(&chip->dev, |
---|
818 | | - "A TPM error (%zd) occurred attempting to determine the timeouts\n", |
---|
819 | | - rc); |
---|
820 | | - return rc; |
---|
821 | | - } |
---|
822 | | - |
---|
823 | | - timeout_old[0] = jiffies_to_usecs(chip->timeout_a); |
---|
824 | | - timeout_old[1] = jiffies_to_usecs(chip->timeout_b); |
---|
825 | | - timeout_old[2] = jiffies_to_usecs(chip->timeout_c); |
---|
826 | | - timeout_old[3] = jiffies_to_usecs(chip->timeout_d); |
---|
827 | | - timeout_chip[0] = be32_to_cpu(cap.timeout.a); |
---|
828 | | - timeout_chip[1] = be32_to_cpu(cap.timeout.b); |
---|
829 | | - timeout_chip[2] = be32_to_cpu(cap.timeout.c); |
---|
830 | | - timeout_chip[3] = be32_to_cpu(cap.timeout.d); |
---|
831 | | - memcpy(timeout_eff, timeout_chip, sizeof(timeout_eff)); |
---|
832 | | - |
---|
833 | | - /* |
---|
834 | | - * Provide ability for vendor overrides of timeout values in case |
---|
835 | | - * of misreporting. |
---|
836 | | - */ |
---|
837 | | - if (chip->ops->update_timeouts != NULL) |
---|
838 | | - chip->timeout_adjusted = |
---|
839 | | - chip->ops->update_timeouts(chip, timeout_eff); |
---|
840 | | - |
---|
841 | | - if (!chip->timeout_adjusted) { |
---|
842 | | - /* Restore default if chip reported 0 */ |
---|
843 | | - int i; |
---|
844 | | - |
---|
845 | | - for (i = 0; i < ARRAY_SIZE(timeout_eff); i++) { |
---|
846 | | - if (timeout_eff[i]) |
---|
847 | | - continue; |
---|
848 | | - |
---|
849 | | - timeout_eff[i] = timeout_old[i]; |
---|
850 | | - chip->timeout_adjusted = true; |
---|
851 | | - } |
---|
852 | | - |
---|
853 | | - if (timeout_eff[0] != 0 && timeout_eff[0] < 1000) { |
---|
854 | | - /* timeouts in msec rather usec */ |
---|
855 | | - for (i = 0; i != ARRAY_SIZE(timeout_eff); i++) |
---|
856 | | - timeout_eff[i] *= 1000; |
---|
857 | | - chip->timeout_adjusted = true; |
---|
858 | | - } |
---|
859 | | - } |
---|
860 | | - |
---|
861 | | - /* Report adjusted timeouts */ |
---|
862 | | - if (chip->timeout_adjusted) { |
---|
863 | | - dev_info(&chip->dev, |
---|
864 | | - HW_ERR "Adjusting reported timeouts: A %lu->%luus B %lu->%luus C %lu->%luus D %lu->%luus\n", |
---|
865 | | - timeout_chip[0], timeout_eff[0], |
---|
866 | | - timeout_chip[1], timeout_eff[1], |
---|
867 | | - timeout_chip[2], timeout_eff[2], |
---|
868 | | - timeout_chip[3], timeout_eff[3]); |
---|
869 | | - } |
---|
870 | | - |
---|
871 | | - chip->timeout_a = usecs_to_jiffies(timeout_eff[0]); |
---|
872 | | - chip->timeout_b = usecs_to_jiffies(timeout_eff[1]); |
---|
873 | | - chip->timeout_c = usecs_to_jiffies(timeout_eff[2]); |
---|
874 | | - chip->timeout_d = usecs_to_jiffies(timeout_eff[3]); |
---|
875 | | - |
---|
876 | | - rc = tpm_getcap(chip, TPM_CAP_PROP_TIS_DURATION, &cap, |
---|
877 | | - "attempting to determine the durations", |
---|
878 | | - sizeof(cap.duration)); |
---|
879 | | - if (rc) |
---|
880 | | - return rc; |
---|
881 | | - |
---|
882 | | - chip->duration[TPM_SHORT] = |
---|
883 | | - usecs_to_jiffies(be32_to_cpu(cap.duration.tpm_short)); |
---|
884 | | - chip->duration[TPM_MEDIUM] = |
---|
885 | | - usecs_to_jiffies(be32_to_cpu(cap.duration.tpm_medium)); |
---|
886 | | - chip->duration[TPM_LONG] = |
---|
887 | | - usecs_to_jiffies(be32_to_cpu(cap.duration.tpm_long)); |
---|
888 | | - chip->duration[TPM_LONG_LONG] = 0; /* not used under 1.2 */ |
---|
889 | | - |
---|
890 | | - /* The Broadcom BCM0102 chipset in a Dell Latitude D820 gets the above |
---|
891 | | - * value wrong and apparently reports msecs rather than usecs. So we |
---|
892 | | - * fix up the resulting too-small TPM_SHORT value to make things work. |
---|
893 | | - * We also scale the TPM_MEDIUM and -_LONG values by 1000. |
---|
894 | | - */ |
---|
895 | | - if (chip->duration[TPM_SHORT] < (HZ / 100)) { |
---|
896 | | - chip->duration[TPM_SHORT] = HZ; |
---|
897 | | - chip->duration[TPM_MEDIUM] *= 1000; |
---|
898 | | - chip->duration[TPM_LONG] *= 1000; |
---|
899 | | - chip->duration_adjusted = true; |
---|
900 | | - dev_info(&chip->dev, "Adjusting TPM timeout parameters."); |
---|
901 | | - } |
---|
902 | | - |
---|
903 | | - chip->flags |= TPM_CHIP_FLAG_HAVE_TIMEOUTS; |
---|
904 | | - return 0; |
---|
| 244 | + if (chip->flags & TPM_CHIP_FLAG_TPM2) |
---|
| 245 | + return tpm2_get_timeouts(chip); |
---|
| 246 | + else |
---|
| 247 | + return tpm1_get_timeouts(chip); |
---|
905 | 248 | } |
---|
906 | 249 | EXPORT_SYMBOL_GPL(tpm_get_timeouts); |
---|
907 | | - |
---|
908 | | -#define TPM_ORD_CONTINUE_SELFTEST 83 |
---|
909 | | -#define CONTINUE_SELFTEST_RESULT_SIZE 10 |
---|
910 | | - |
---|
911 | | -static const struct tpm_input_header continue_selftest_header = { |
---|
912 | | - .tag = cpu_to_be16(TPM_TAG_RQU_COMMAND), |
---|
913 | | - .length = cpu_to_be32(10), |
---|
914 | | - .ordinal = cpu_to_be32(TPM_ORD_CONTINUE_SELFTEST), |
---|
915 | | -}; |
---|
916 | | - |
---|
917 | | -/** |
---|
918 | | - * tpm_continue_selftest -- run TPM's selftest |
---|
919 | | - * @chip: TPM chip to use |
---|
920 | | - * |
---|
921 | | - * Returns 0 on success, < 0 in case of fatal error or a value > 0 representing |
---|
922 | | - * a TPM error code. |
---|
923 | | - */ |
---|
924 | | -static int tpm_continue_selftest(struct tpm_chip *chip) |
---|
925 | | -{ |
---|
926 | | - int rc; |
---|
927 | | - struct tpm_cmd_t cmd; |
---|
928 | | - |
---|
929 | | - cmd.header.in = continue_selftest_header; |
---|
930 | | - rc = tpm_transmit_cmd(chip, NULL, &cmd, CONTINUE_SELFTEST_RESULT_SIZE, |
---|
931 | | - 0, 0, "continue selftest"); |
---|
932 | | - return rc; |
---|
933 | | -} |
---|
934 | | - |
---|
935 | | -#define TPM_ORDINAL_PCRREAD 21 |
---|
936 | | -#define READ_PCR_RESULT_SIZE 30 |
---|
937 | | -#define READ_PCR_RESULT_BODY_SIZE 20 |
---|
938 | | -static const struct tpm_input_header pcrread_header = { |
---|
939 | | - .tag = cpu_to_be16(TPM_TAG_RQU_COMMAND), |
---|
940 | | - .length = cpu_to_be32(14), |
---|
941 | | - .ordinal = cpu_to_be32(TPM_ORDINAL_PCRREAD) |
---|
942 | | -}; |
---|
943 | | - |
---|
944 | | -int tpm_pcr_read_dev(struct tpm_chip *chip, int pcr_idx, u8 *res_buf) |
---|
945 | | -{ |
---|
946 | | - int rc; |
---|
947 | | - struct tpm_cmd_t cmd; |
---|
948 | | - |
---|
949 | | - cmd.header.in = pcrread_header; |
---|
950 | | - cmd.params.pcrread_in.pcr_idx = cpu_to_be32(pcr_idx); |
---|
951 | | - rc = tpm_transmit_cmd(chip, NULL, &cmd, READ_PCR_RESULT_SIZE, |
---|
952 | | - READ_PCR_RESULT_BODY_SIZE, 0, |
---|
953 | | - "attempting to read a pcr value"); |
---|
954 | | - |
---|
955 | | - if (rc == 0) |
---|
956 | | - memcpy(res_buf, cmd.params.pcrread_out.pcr_result, |
---|
957 | | - TPM_DIGEST_SIZE); |
---|
958 | | - return rc; |
---|
959 | | -} |
---|
960 | 250 | |
---|
961 | 251 | /** |
---|
962 | 252 | * tpm_is_tpm2 - do we a have a TPM2 chip? |
---|
.. | .. |
---|
987 | 277 | * tpm_pcr_read - read a PCR value from SHA1 bank |
---|
988 | 278 | * @chip: a &struct tpm_chip instance, %NULL for the default chip |
---|
989 | 279 | * @pcr_idx: the PCR to be retrieved |
---|
990 | | - * @res_buf: the value of the PCR |
---|
| 280 | + * @digest: the PCR bank and buffer current PCR value is written to |
---|
991 | 281 | * |
---|
992 | 282 | * Return: same as with tpm_transmit_cmd() |
---|
993 | 283 | */ |
---|
994 | | -int tpm_pcr_read(struct tpm_chip *chip, int pcr_idx, u8 *res_buf) |
---|
| 284 | +int tpm_pcr_read(struct tpm_chip *chip, u32 pcr_idx, |
---|
| 285 | + struct tpm_digest *digest) |
---|
995 | 286 | { |
---|
996 | 287 | int rc; |
---|
997 | 288 | |
---|
998 | 289 | chip = tpm_find_get_ops(chip); |
---|
999 | 290 | if (!chip) |
---|
1000 | 291 | return -ENODEV; |
---|
| 292 | + |
---|
1001 | 293 | if (chip->flags & TPM_CHIP_FLAG_TPM2) |
---|
1002 | | - rc = tpm2_pcr_read(chip, pcr_idx, res_buf); |
---|
| 294 | + rc = tpm2_pcr_read(chip, pcr_idx, digest, NULL); |
---|
1003 | 295 | else |
---|
1004 | | - rc = tpm_pcr_read_dev(chip, pcr_idx, res_buf); |
---|
| 296 | + rc = tpm1_pcr_read(chip, pcr_idx, digest->digest); |
---|
| 297 | + |
---|
1005 | 298 | tpm_put_ops(chip); |
---|
1006 | 299 | return rc; |
---|
1007 | 300 | } |
---|
1008 | 301 | EXPORT_SYMBOL_GPL(tpm_pcr_read); |
---|
1009 | 302 | |
---|
1010 | | -#define TPM_ORD_PCR_EXTEND 20 |
---|
1011 | | -#define EXTEND_PCR_RESULT_SIZE 34 |
---|
1012 | | -#define EXTEND_PCR_RESULT_BODY_SIZE 20 |
---|
1013 | | -static const struct tpm_input_header pcrextend_header = { |
---|
1014 | | - .tag = cpu_to_be16(TPM_TAG_RQU_COMMAND), |
---|
1015 | | - .length = cpu_to_be32(34), |
---|
1016 | | - .ordinal = cpu_to_be32(TPM_ORD_PCR_EXTEND) |
---|
1017 | | -}; |
---|
1018 | | - |
---|
1019 | | -static int tpm1_pcr_extend(struct tpm_chip *chip, int pcr_idx, const u8 *hash, |
---|
1020 | | - char *log_msg) |
---|
1021 | | -{ |
---|
1022 | | - struct tpm_buf buf; |
---|
1023 | | - int rc; |
---|
1024 | | - |
---|
1025 | | - rc = tpm_buf_init(&buf, TPM_TAG_RQU_COMMAND, TPM_ORD_PCR_EXTEND); |
---|
1026 | | - if (rc) |
---|
1027 | | - return rc; |
---|
1028 | | - |
---|
1029 | | - tpm_buf_append_u32(&buf, pcr_idx); |
---|
1030 | | - tpm_buf_append(&buf, hash, TPM_DIGEST_SIZE); |
---|
1031 | | - |
---|
1032 | | - rc = tpm_transmit_cmd(chip, NULL, buf.data, EXTEND_PCR_RESULT_SIZE, |
---|
1033 | | - EXTEND_PCR_RESULT_BODY_SIZE, 0, log_msg); |
---|
1034 | | - tpm_buf_destroy(&buf); |
---|
1035 | | - return rc; |
---|
1036 | | -} |
---|
1037 | | - |
---|
1038 | 303 | /** |
---|
1039 | 304 | * tpm_pcr_extend - extend a PCR value in SHA1 bank. |
---|
1040 | 305 | * @chip: a &struct tpm_chip instance, %NULL for the default chip |
---|
1041 | 306 | * @pcr_idx: the PCR to be retrieved |
---|
1042 | | - * @hash: the hash value used to extend the PCR value |
---|
| 307 | + * @digests: array of tpm_digest structures used to extend PCRs |
---|
1043 | 308 | * |
---|
1044 | | - * Note: with TPM 2.0 extends also those banks with a known digest size to the |
---|
1045 | | - * cryto subsystem in order to prevent malicious use of those PCR banks. In the |
---|
1046 | | - * future we should dynamically determine digest sizes. |
---|
| 309 | + * Note: callers must pass a digest for every allocated PCR bank, in the same |
---|
| 310 | + * order of the banks in chip->allocated_banks. |
---|
1047 | 311 | * |
---|
1048 | 312 | * Return: same as with tpm_transmit_cmd() |
---|
1049 | 313 | */ |
---|
1050 | | -int tpm_pcr_extend(struct tpm_chip *chip, int pcr_idx, const u8 *hash) |
---|
| 314 | +int tpm_pcr_extend(struct tpm_chip *chip, u32 pcr_idx, |
---|
| 315 | + struct tpm_digest *digests) |
---|
1051 | 316 | { |
---|
1052 | 317 | int rc; |
---|
1053 | | - struct tpm2_digest digest_list[ARRAY_SIZE(chip->active_banks)]; |
---|
1054 | | - u32 count = 0; |
---|
1055 | 318 | int i; |
---|
1056 | 319 | |
---|
1057 | 320 | chip = tpm_find_get_ops(chip); |
---|
1058 | 321 | if (!chip) |
---|
1059 | 322 | return -ENODEV; |
---|
1060 | 323 | |
---|
1061 | | - if (chip->flags & TPM_CHIP_FLAG_TPM2) { |
---|
1062 | | - memset(digest_list, 0, sizeof(digest_list)); |
---|
1063 | | - |
---|
1064 | | - for (i = 0; i < ARRAY_SIZE(chip->active_banks) && |
---|
1065 | | - chip->active_banks[i] != TPM2_ALG_ERROR; i++) { |
---|
1066 | | - digest_list[i].alg_id = chip->active_banks[i]; |
---|
1067 | | - memcpy(digest_list[i].digest, hash, TPM_DIGEST_SIZE); |
---|
1068 | | - count++; |
---|
| 324 | + for (i = 0; i < chip->nr_allocated_banks; i++) { |
---|
| 325 | + if (digests[i].alg_id != chip->allocated_banks[i].alg_id) { |
---|
| 326 | + rc = -EINVAL; |
---|
| 327 | + goto out; |
---|
1069 | 328 | } |
---|
1070 | | - |
---|
1071 | | - rc = tpm2_pcr_extend(chip, pcr_idx, count, digest_list); |
---|
1072 | | - tpm_put_ops(chip); |
---|
1073 | | - return rc; |
---|
1074 | 329 | } |
---|
1075 | 330 | |
---|
1076 | | - rc = tpm1_pcr_extend(chip, pcr_idx, hash, |
---|
| 331 | + if (chip->flags & TPM_CHIP_FLAG_TPM2) { |
---|
| 332 | + rc = tpm2_pcr_extend(chip, pcr_idx, digests); |
---|
| 333 | + goto out; |
---|
| 334 | + } |
---|
| 335 | + |
---|
| 336 | + rc = tpm1_pcr_extend(chip, pcr_idx, digests[0].digest, |
---|
1077 | 337 | "attempting extend a PCR value"); |
---|
| 338 | + |
---|
| 339 | +out: |
---|
1078 | 340 | tpm_put_ops(chip); |
---|
1079 | 341 | return rc; |
---|
1080 | 342 | } |
---|
1081 | 343 | EXPORT_SYMBOL_GPL(tpm_pcr_extend); |
---|
1082 | | - |
---|
1083 | | -/** |
---|
1084 | | - * tpm_do_selftest - have the TPM continue its selftest and wait until it |
---|
1085 | | - * can receive further commands |
---|
1086 | | - * @chip: TPM chip to use |
---|
1087 | | - * |
---|
1088 | | - * Returns 0 on success, < 0 in case of fatal error or a value > 0 representing |
---|
1089 | | - * a TPM error code. |
---|
1090 | | - */ |
---|
1091 | | -int tpm_do_selftest(struct tpm_chip *chip) |
---|
1092 | | -{ |
---|
1093 | | - int rc; |
---|
1094 | | - unsigned int loops; |
---|
1095 | | - unsigned int delay_msec = 100; |
---|
1096 | | - unsigned long duration; |
---|
1097 | | - u8 dummy[TPM_DIGEST_SIZE]; |
---|
1098 | | - |
---|
1099 | | - duration = tpm_calc_ordinal_duration(chip, TPM_ORD_CONTINUE_SELFTEST); |
---|
1100 | | - |
---|
1101 | | - loops = jiffies_to_msecs(duration) / delay_msec; |
---|
1102 | | - |
---|
1103 | | - rc = tpm_continue_selftest(chip); |
---|
1104 | | - if (rc == TPM_ERR_INVALID_POSTINIT) { |
---|
1105 | | - chip->flags |= TPM_CHIP_FLAG_ALWAYS_POWERED; |
---|
1106 | | - dev_info(&chip->dev, "TPM not ready (%d)\n", rc); |
---|
1107 | | - } |
---|
1108 | | - /* This may fail if there was no TPM driver during a suspend/resume |
---|
1109 | | - * cycle; some may return 10 (BAD_ORDINAL), others 28 (FAILEDSELFTEST) |
---|
1110 | | - */ |
---|
1111 | | - if (rc) |
---|
1112 | | - return rc; |
---|
1113 | | - |
---|
1114 | | - do { |
---|
1115 | | - /* Attempt to read a PCR value */ |
---|
1116 | | - rc = tpm_pcr_read_dev(chip, 0, dummy); |
---|
1117 | | - |
---|
1118 | | - /* Some buggy TPMs will not respond to tpm_tis_ready() for |
---|
1119 | | - * around 300ms while the self test is ongoing, keep trying |
---|
1120 | | - * until the self test duration expires. */ |
---|
1121 | | - if (rc == -ETIME) { |
---|
1122 | | - dev_info( |
---|
1123 | | - &chip->dev, HW_ERR |
---|
1124 | | - "TPM command timed out during continue self test"); |
---|
1125 | | - tpm_msleep(delay_msec); |
---|
1126 | | - continue; |
---|
1127 | | - } |
---|
1128 | | - |
---|
1129 | | - if (rc == TPM_ERR_DISABLED || rc == TPM_ERR_DEACTIVATED) { |
---|
1130 | | - dev_info(&chip->dev, |
---|
1131 | | - "TPM is disabled/deactivated (0x%X)\n", rc); |
---|
1132 | | - /* TPM is disabled and/or deactivated; driver can |
---|
1133 | | - * proceed and TPM does handle commands for |
---|
1134 | | - * suspend/resume correctly |
---|
1135 | | - */ |
---|
1136 | | - return 0; |
---|
1137 | | - } |
---|
1138 | | - if (rc != TPM_WARN_DOING_SELFTEST) |
---|
1139 | | - return rc; |
---|
1140 | | - tpm_msleep(delay_msec); |
---|
1141 | | - } while (--loops > 0); |
---|
1142 | | - |
---|
1143 | | - return rc; |
---|
1144 | | -} |
---|
1145 | | -EXPORT_SYMBOL_GPL(tpm_do_selftest); |
---|
1146 | | - |
---|
1147 | | -/** |
---|
1148 | | - * tpm1_auto_startup - Perform the standard automatic TPM initialization |
---|
1149 | | - * sequence |
---|
1150 | | - * @chip: TPM chip to use |
---|
1151 | | - * |
---|
1152 | | - * Returns 0 on success, < 0 in case of fatal error. |
---|
1153 | | - */ |
---|
1154 | | -int tpm1_auto_startup(struct tpm_chip *chip) |
---|
1155 | | -{ |
---|
1156 | | - int rc; |
---|
1157 | | - |
---|
1158 | | - rc = tpm_get_timeouts(chip); |
---|
1159 | | - if (rc) |
---|
1160 | | - goto out; |
---|
1161 | | - rc = tpm_do_selftest(chip); |
---|
1162 | | - if (rc) { |
---|
1163 | | - dev_err(&chip->dev, "TPM self test failed\n"); |
---|
1164 | | - goto out; |
---|
1165 | | - } |
---|
1166 | | - |
---|
1167 | | - return rc; |
---|
1168 | | -out: |
---|
1169 | | - if (rc > 0) |
---|
1170 | | - rc = -ENODEV; |
---|
1171 | | - return rc; |
---|
1172 | | -} |
---|
1173 | 344 | |
---|
1174 | 345 | /** |
---|
1175 | 346 | * tpm_send - send a TPM command |
---|
.. | .. |
---|
1181 | 352 | */ |
---|
1182 | 353 | int tpm_send(struct tpm_chip *chip, void *cmd, size_t buflen) |
---|
1183 | 354 | { |
---|
| 355 | + struct tpm_buf buf; |
---|
1184 | 356 | int rc; |
---|
1185 | 357 | |
---|
1186 | 358 | chip = tpm_find_get_ops(chip); |
---|
1187 | 359 | if (!chip) |
---|
1188 | 360 | return -ENODEV; |
---|
1189 | 361 | |
---|
1190 | | - rc = tpm_transmit_cmd(chip, NULL, cmd, buflen, 0, 0, |
---|
1191 | | - "attempting to a send a command"); |
---|
| 362 | + buf.data = cmd; |
---|
| 363 | + rc = tpm_transmit_cmd(chip, &buf, 0, "attempting to a send a command"); |
---|
| 364 | + |
---|
1192 | 365 | tpm_put_ops(chip); |
---|
1193 | 366 | return rc; |
---|
1194 | 367 | } |
---|
1195 | 368 | EXPORT_SYMBOL_GPL(tpm_send); |
---|
1196 | 369 | |
---|
1197 | | -#define TPM_ORD_SAVESTATE 152 |
---|
1198 | | -#define SAVESTATE_RESULT_SIZE 10 |
---|
| 370 | +int tpm_auto_startup(struct tpm_chip *chip) |
---|
| 371 | +{ |
---|
| 372 | + int rc; |
---|
1199 | 373 | |
---|
1200 | | -static const struct tpm_input_header savestate_header = { |
---|
1201 | | - .tag = cpu_to_be16(TPM_TAG_RQU_COMMAND), |
---|
1202 | | - .length = cpu_to_be32(10), |
---|
1203 | | - .ordinal = cpu_to_be32(TPM_ORD_SAVESTATE) |
---|
1204 | | -}; |
---|
| 374 | + if (!(chip->ops->flags & TPM_OPS_AUTO_STARTUP)) |
---|
| 375 | + return 0; |
---|
| 376 | + |
---|
| 377 | + if (chip->flags & TPM_CHIP_FLAG_TPM2) |
---|
| 378 | + rc = tpm2_auto_startup(chip); |
---|
| 379 | + else |
---|
| 380 | + rc = tpm1_auto_startup(chip); |
---|
| 381 | + |
---|
| 382 | + return rc; |
---|
| 383 | +} |
---|
1205 | 384 | |
---|
1206 | 385 | /* |
---|
1207 | 386 | * We are about to suspend. Save the TPM state |
---|
.. | .. |
---|
1210 | 389 | int tpm_pm_suspend(struct device *dev) |
---|
1211 | 390 | { |
---|
1212 | 391 | struct tpm_chip *chip = dev_get_drvdata(dev); |
---|
1213 | | - struct tpm_cmd_t cmd; |
---|
1214 | | - int rc, try; |
---|
| 392 | + int rc = 0; |
---|
1215 | 393 | |
---|
1216 | | - u8 dummy_hash[TPM_DIGEST_SIZE] = { 0 }; |
---|
1217 | | - |
---|
1218 | | - if (chip == NULL) |
---|
| 394 | + if (!chip) |
---|
1219 | 395 | return -ENODEV; |
---|
1220 | 396 | |
---|
1221 | 397 | if (chip->flags & TPM_CHIP_FLAG_ALWAYS_POWERED) |
---|
1222 | | - return 0; |
---|
| 398 | + goto suspended; |
---|
1223 | 399 | |
---|
1224 | | - if (chip->flags & TPM_CHIP_FLAG_TPM2) { |
---|
1225 | | - tpm2_shutdown(chip, TPM2_SU_STATE); |
---|
1226 | | - return 0; |
---|
| 400 | + if ((chip->flags & TPM_CHIP_FLAG_FIRMWARE_POWER_MANAGED) && |
---|
| 401 | + !pm_suspend_via_firmware()) |
---|
| 402 | + goto suspended; |
---|
| 403 | + |
---|
| 404 | + rc = tpm_try_get_ops(chip); |
---|
| 405 | + if (!rc) { |
---|
| 406 | + if (chip->flags & TPM_CHIP_FLAG_TPM2) |
---|
| 407 | + tpm2_shutdown(chip, TPM2_SU_STATE); |
---|
| 408 | + else |
---|
| 409 | + rc = tpm1_pm_suspend(chip, tpm_suspend_pcr); |
---|
| 410 | + |
---|
| 411 | + tpm_put_ops(chip); |
---|
1227 | 412 | } |
---|
1228 | 413 | |
---|
1229 | | - /* for buggy tpm, flush pcrs with extend to selected dummy */ |
---|
1230 | | - if (tpm_suspend_pcr) |
---|
1231 | | - rc = tpm1_pcr_extend(chip, tpm_suspend_pcr, dummy_hash, |
---|
1232 | | - "extending dummy pcr before suspend"); |
---|
1233 | | - |
---|
1234 | | - /* now do the actual savestate */ |
---|
1235 | | - for (try = 0; try < TPM_RETRY; try++) { |
---|
1236 | | - cmd.header.in = savestate_header; |
---|
1237 | | - rc = tpm_transmit_cmd(chip, NULL, &cmd, SAVESTATE_RESULT_SIZE, |
---|
1238 | | - 0, 0, NULL); |
---|
1239 | | - |
---|
1240 | | - /* |
---|
1241 | | - * If the TPM indicates that it is too busy to respond to |
---|
1242 | | - * this command then retry before giving up. It can take |
---|
1243 | | - * several seconds for this TPM to be ready. |
---|
1244 | | - * |
---|
1245 | | - * This can happen if the TPM has already been sent the |
---|
1246 | | - * SaveState command before the driver has loaded. TCG 1.2 |
---|
1247 | | - * specification states that any communication after SaveState |
---|
1248 | | - * may cause the TPM to invalidate previously saved state. |
---|
1249 | | - */ |
---|
1250 | | - if (rc != TPM_WARN_RETRY) |
---|
1251 | | - break; |
---|
1252 | | - tpm_msleep(TPM_TIMEOUT_RETRY); |
---|
1253 | | - } |
---|
1254 | | - |
---|
1255 | | - if (rc) |
---|
1256 | | - dev_err(&chip->dev, |
---|
1257 | | - "Error (%d) sending savestate before suspend\n", rc); |
---|
1258 | | - else if (try > 0) |
---|
1259 | | - dev_warn(&chip->dev, "TPM savestate took %dms\n", |
---|
1260 | | - try * TPM_TIMEOUT_RETRY); |
---|
1261 | | - |
---|
| 414 | +suspended: |
---|
1262 | 415 | return rc; |
---|
1263 | 416 | } |
---|
1264 | 417 | EXPORT_SYMBOL_GPL(tpm_pm_suspend); |
---|
.. | .. |
---|
1278 | 431 | } |
---|
1279 | 432 | EXPORT_SYMBOL_GPL(tpm_pm_resume); |
---|
1280 | 433 | |
---|
1281 | | -#define TPM_GETRANDOM_RESULT_SIZE 18 |
---|
1282 | | -static const struct tpm_input_header tpm_getrandom_header = { |
---|
1283 | | - .tag = cpu_to_be16(TPM_TAG_RQU_COMMAND), |
---|
1284 | | - .length = cpu_to_be32(14), |
---|
1285 | | - .ordinal = cpu_to_be32(TPM_ORD_GET_RANDOM) |
---|
1286 | | -}; |
---|
1287 | | - |
---|
1288 | 434 | /** |
---|
1289 | 435 | * tpm_get_random() - get random bytes from the TPM's RNG |
---|
1290 | 436 | * @chip: a &struct tpm_chip instance, %NULL for the default chip |
---|
1291 | 437 | * @out: destination buffer for the random bytes |
---|
1292 | 438 | * @max: the max number of bytes to write to @out |
---|
1293 | 439 | * |
---|
1294 | | - * Return: same as with tpm_transmit_cmd() |
---|
| 440 | + * Return: number of random bytes read or a negative error value. |
---|
1295 | 441 | */ |
---|
1296 | 442 | int tpm_get_random(struct tpm_chip *chip, u8 *out, size_t max) |
---|
1297 | 443 | { |
---|
1298 | | - struct tpm_cmd_t tpm_cmd; |
---|
1299 | | - u32 recd, num_bytes = min_t(u32, max, TPM_MAX_RNG_DATA), rlength; |
---|
1300 | | - int err, total = 0, retries = 5; |
---|
1301 | | - u8 *dest = out; |
---|
| 444 | + int rc; |
---|
1302 | 445 | |
---|
1303 | | - if (!out || !num_bytes || max > TPM_MAX_RNG_DATA) |
---|
| 446 | + if (!out || max > TPM_MAX_RNG_DATA) |
---|
1304 | 447 | return -EINVAL; |
---|
1305 | 448 | |
---|
1306 | 449 | chip = tpm_find_get_ops(chip); |
---|
1307 | 450 | if (!chip) |
---|
1308 | 451 | return -ENODEV; |
---|
1309 | 452 | |
---|
1310 | | - if (chip->flags & TPM_CHIP_FLAG_TPM2) { |
---|
1311 | | - err = tpm2_get_random(chip, out, max); |
---|
1312 | | - tpm_put_ops(chip); |
---|
1313 | | - return err; |
---|
1314 | | - } |
---|
1315 | | - |
---|
1316 | | - do { |
---|
1317 | | - tpm_cmd.header.in = tpm_getrandom_header; |
---|
1318 | | - tpm_cmd.params.getrandom_in.num_bytes = cpu_to_be32(num_bytes); |
---|
1319 | | - |
---|
1320 | | - err = tpm_transmit_cmd(chip, NULL, &tpm_cmd, |
---|
1321 | | - TPM_GETRANDOM_RESULT_SIZE + num_bytes, |
---|
1322 | | - offsetof(struct tpm_getrandom_out, |
---|
1323 | | - rng_data), |
---|
1324 | | - 0, "attempting get random"); |
---|
1325 | | - if (err) |
---|
1326 | | - break; |
---|
1327 | | - |
---|
1328 | | - recd = be32_to_cpu(tpm_cmd.params.getrandom_out.rng_data_len); |
---|
1329 | | - if (recd > num_bytes) { |
---|
1330 | | - total = -EFAULT; |
---|
1331 | | - break; |
---|
1332 | | - } |
---|
1333 | | - |
---|
1334 | | - rlength = be32_to_cpu(tpm_cmd.header.out.length); |
---|
1335 | | - if (rlength < TPM_HEADER_SIZE + |
---|
1336 | | - offsetof(struct tpm_getrandom_out, rng_data) + |
---|
1337 | | - recd) { |
---|
1338 | | - total = -EFAULT; |
---|
1339 | | - break; |
---|
1340 | | - } |
---|
1341 | | - memcpy(dest, tpm_cmd.params.getrandom_out.rng_data, recd); |
---|
1342 | | - |
---|
1343 | | - dest += recd; |
---|
1344 | | - total += recd; |
---|
1345 | | - num_bytes -= recd; |
---|
1346 | | - } while (retries-- && total < max); |
---|
| 453 | + if (chip->flags & TPM_CHIP_FLAG_TPM2) |
---|
| 454 | + rc = tpm2_get_random(chip, out, max); |
---|
| 455 | + else |
---|
| 456 | + rc = tpm1_get_random(chip, out, max); |
---|
1347 | 457 | |
---|
1348 | 458 | tpm_put_ops(chip); |
---|
1349 | | - return total ? total : -EIO; |
---|
| 459 | + return rc; |
---|
1350 | 460 | } |
---|
1351 | 461 | EXPORT_SYMBOL_GPL(tpm_get_random); |
---|
1352 | | - |
---|
1353 | | -/** |
---|
1354 | | - * tpm_seal_trusted() - seal a trusted key payload |
---|
1355 | | - * @chip: a &struct tpm_chip instance, %NULL for the default chip |
---|
1356 | | - * @options: authentication values and other options |
---|
1357 | | - * @payload: the key data in clear and encrypted form |
---|
1358 | | - * |
---|
1359 | | - * Note: only TPM 2.0 chip are supported. TPM 1.x implementation is located in |
---|
1360 | | - * the keyring subsystem. |
---|
1361 | | - * |
---|
1362 | | - * Return: same as with tpm_transmit_cmd() |
---|
1363 | | - */ |
---|
1364 | | -int tpm_seal_trusted(struct tpm_chip *chip, struct trusted_key_payload *payload, |
---|
1365 | | - struct trusted_key_options *options) |
---|
1366 | | -{ |
---|
1367 | | - int rc; |
---|
1368 | | - |
---|
1369 | | - chip = tpm_find_get_ops(chip); |
---|
1370 | | - if (!chip || !(chip->flags & TPM_CHIP_FLAG_TPM2)) |
---|
1371 | | - return -ENODEV; |
---|
1372 | | - |
---|
1373 | | - rc = tpm2_seal_trusted(chip, payload, options); |
---|
1374 | | - |
---|
1375 | | - tpm_put_ops(chip); |
---|
1376 | | - return rc; |
---|
1377 | | -} |
---|
1378 | | -EXPORT_SYMBOL_GPL(tpm_seal_trusted); |
---|
1379 | | - |
---|
1380 | | -/** |
---|
1381 | | - * tpm_unseal_trusted() - unseal a trusted key |
---|
1382 | | - * @chip: a &struct tpm_chip instance, %NULL for the default chip |
---|
1383 | | - * @options: authentication values and other options |
---|
1384 | | - * @payload: the key data in clear and encrypted form |
---|
1385 | | - * |
---|
1386 | | - * Note: only TPM 2.0 chip are supported. TPM 1.x implementation is located in |
---|
1387 | | - * the keyring subsystem. |
---|
1388 | | - * |
---|
1389 | | - * Return: same as with tpm_transmit_cmd() |
---|
1390 | | - */ |
---|
1391 | | -int tpm_unseal_trusted(struct tpm_chip *chip, |
---|
1392 | | - struct trusted_key_payload *payload, |
---|
1393 | | - struct trusted_key_options *options) |
---|
1394 | | -{ |
---|
1395 | | - int rc; |
---|
1396 | | - |
---|
1397 | | - chip = tpm_find_get_ops(chip); |
---|
1398 | | - if (!chip || !(chip->flags & TPM_CHIP_FLAG_TPM2)) |
---|
1399 | | - return -ENODEV; |
---|
1400 | | - |
---|
1401 | | - rc = tpm2_unseal_trusted(chip, payload, options); |
---|
1402 | | - |
---|
1403 | | - tpm_put_ops(chip); |
---|
1404 | | - |
---|
1405 | | - return rc; |
---|
1406 | | -} |
---|
1407 | | -EXPORT_SYMBOL_GPL(tpm_unseal_trusted); |
---|
1408 | 462 | |
---|
1409 | 463 | static int __init tpm_init(void) |
---|
1410 | 464 | { |
---|
.. | .. |
---|
1419 | 473 | tpmrm_class = class_create(THIS_MODULE, "tpmrm"); |
---|
1420 | 474 | if (IS_ERR(tpmrm_class)) { |
---|
1421 | 475 | pr_err("couldn't create tpmrm class\n"); |
---|
1422 | | - class_destroy(tpm_class); |
---|
1423 | | - return PTR_ERR(tpmrm_class); |
---|
| 476 | + rc = PTR_ERR(tpmrm_class); |
---|
| 477 | + goto out_destroy_tpm_class; |
---|
1424 | 478 | } |
---|
1425 | 479 | |
---|
1426 | 480 | rc = alloc_chrdev_region(&tpm_devt, 0, 2*TPM_NUM_DEVICES, "tpm"); |
---|
1427 | 481 | if (rc < 0) { |
---|
1428 | 482 | pr_err("tpm: failed to allocate char dev region\n"); |
---|
1429 | | - class_destroy(tpmrm_class); |
---|
1430 | | - class_destroy(tpm_class); |
---|
1431 | | - return rc; |
---|
| 483 | + goto out_destroy_tpmrm_class; |
---|
| 484 | + } |
---|
| 485 | + |
---|
| 486 | + rc = tpm_dev_common_init(); |
---|
| 487 | + if (rc) { |
---|
| 488 | + pr_err("tpm: failed to allocate char dev region\n"); |
---|
| 489 | + goto out_unreg_chrdev; |
---|
1432 | 490 | } |
---|
1433 | 491 | |
---|
1434 | 492 | return 0; |
---|
| 493 | + |
---|
| 494 | +out_unreg_chrdev: |
---|
| 495 | + unregister_chrdev_region(tpm_devt, 2 * TPM_NUM_DEVICES); |
---|
| 496 | +out_destroy_tpmrm_class: |
---|
| 497 | + class_destroy(tpmrm_class); |
---|
| 498 | +out_destroy_tpm_class: |
---|
| 499 | + class_destroy(tpm_class); |
---|
| 500 | + |
---|
| 501 | + return rc; |
---|
1435 | 502 | } |
---|
1436 | 503 | |
---|
1437 | 504 | static void __exit tpm_exit(void) |
---|
.. | .. |
---|
1440 | 507 | class_destroy(tpm_class); |
---|
1441 | 508 | class_destroy(tpmrm_class); |
---|
1442 | 509 | unregister_chrdev_region(tpm_devt, 2*TPM_NUM_DEVICES); |
---|
| 510 | + tpm_dev_common_exit(); |
---|
1443 | 511 | } |
---|
1444 | 512 | |
---|
1445 | 513 | subsys_initcall(tpm_init); |
---|