2005-04-17 05:20:36 +07:00
|
|
|
/*
|
|
|
|
* Copyright (C) 2004 IBM Corporation
|
2014-12-13 02:46:34 +07:00
|
|
|
* Copyright (C) 2014 Intel Corporation
|
2005-04-17 05:20:36 +07:00
|
|
|
*
|
|
|
|
* Authors:
|
|
|
|
* Leendert van Doorn <leendert@watson.ibm.com>
|
|
|
|
* Dave Safford <safford@watson.ibm.com>
|
|
|
|
* Reiner Sailer <sailer@watson.ibm.com>
|
|
|
|
* Kylene Hall <kjhall@us.ibm.com>
|
|
|
|
*
|
2007-08-23 04:01:04 +07:00
|
|
|
* Maintained by: <tpmdd-devel@lists.sourceforge.net>
|
2005-04-17 05:20:36 +07:00
|
|
|
*
|
|
|
|
* Device driver for TCG/TCPA TPM (trusted platform module).
|
tpm: cleanup checkpatch warnings
before we rename the file it might be a good idea to cleanup the long
persisting checkpatch warnings.
Since everything is really trivial, splitting the patch up would only
result in noise.
For the interested reader - here the checkpatch warnings:
(regrouped for easer readability)
ERROR: trailing whitespace
+ * Specifications at www.trustedcomputinggroup.org^I $
+ * $
+^I/* $
+^I parameters (RSA 12->bytes: keybit, #primes, expbit) $
WARNING: unnecessary whitespace before a quoted newline
+ "invalid count value %x %zx \n", count, bufsiz);
ERROR: do not use assignment in if condition
+ if ((rc = chip->vendor.send(chip, (u8 *) buf, count)) < 0) {
ERROR: space required after that ',' (ctx:VxV)
+ len = tpm_transmit(chip,(u8 *) cmd, len);
^
ERROR: "foo * bar" should be "foo *bar"
+ssize_t tpm_show_enabled(struct device * dev, struct device_attribute * attr,
+ssize_t tpm_show_enabled(struct device * dev, struct device_attribute * attr,
+ssize_t tpm_show_active(struct device * dev, struct device_attribute * attr,
+ssize_t tpm_show_active(struct device * dev, struct device_attribute * attr,
+ssize_t tpm_show_owned(struct device * dev, struct device_attribute * attr,
+ssize_t tpm_show_owned(struct device * dev, struct device_attribute * attr,
+ssize_t tpm_show_temp_deactivated(struct device * dev,
+ struct device_attribute * attr, char *buf)
WARNING: please, no space before tabs
+ * @chip_num: ^Itpm idx # or ANY$
+ * @res_buf: ^ITPM_PCR value$
+ * ^I^Isize of res_buf is 20 bytes (or NULL if you don't care)$
+ * @chip_num: ^Itpm idx # or AN&$
+ * @hash: ^Ihash value used to extend pcr value$
ERROR: code indent should use tabs where possible
+^I TPM_ORD_CONTINUE_SELFTEST);$
WARNING: line over 80 characters
+static bool wait_for_tpm_stat_cond(struct tpm_chip *chip, u8 mask, bool check_cancel,
ERROR: trailing whitespace
+ * Called from tpm_<specific>.c probe function only for devices $
total: 16 errors, 7 warnings, 1554 lines checked
Signed-off-by: Peter Huewe <peterhuewe@gmx.de>
2013-10-22 05:29:14 +07:00
|
|
|
* Specifications at www.trustedcomputinggroup.org
|
2005-04-17 05:20:36 +07:00
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU General Public License as
|
|
|
|
* published by the Free Software Foundation, version 2 of the
|
|
|
|
* License.
|
tpm: cleanup checkpatch warnings
before we rename the file it might be a good idea to cleanup the long
persisting checkpatch warnings.
Since everything is really trivial, splitting the patch up would only
result in noise.
For the interested reader - here the checkpatch warnings:
(regrouped for easer readability)
ERROR: trailing whitespace
+ * Specifications at www.trustedcomputinggroup.org^I $
+ * $
+^I/* $
+^I parameters (RSA 12->bytes: keybit, #primes, expbit) $
WARNING: unnecessary whitespace before a quoted newline
+ "invalid count value %x %zx \n", count, bufsiz);
ERROR: do not use assignment in if condition
+ if ((rc = chip->vendor.send(chip, (u8 *) buf, count)) < 0) {
ERROR: space required after that ',' (ctx:VxV)
+ len = tpm_transmit(chip,(u8 *) cmd, len);
^
ERROR: "foo * bar" should be "foo *bar"
+ssize_t tpm_show_enabled(struct device * dev, struct device_attribute * attr,
+ssize_t tpm_show_enabled(struct device * dev, struct device_attribute * attr,
+ssize_t tpm_show_active(struct device * dev, struct device_attribute * attr,
+ssize_t tpm_show_active(struct device * dev, struct device_attribute * attr,
+ssize_t tpm_show_owned(struct device * dev, struct device_attribute * attr,
+ssize_t tpm_show_owned(struct device * dev, struct device_attribute * attr,
+ssize_t tpm_show_temp_deactivated(struct device * dev,
+ struct device_attribute * attr, char *buf)
WARNING: please, no space before tabs
+ * @chip_num: ^Itpm idx # or ANY$
+ * @res_buf: ^ITPM_PCR value$
+ * ^I^Isize of res_buf is 20 bytes (or NULL if you don't care)$
+ * @chip_num: ^Itpm idx # or AN&$
+ * @hash: ^Ihash value used to extend pcr value$
ERROR: code indent should use tabs where possible
+^I TPM_ORD_CONTINUE_SELFTEST);$
WARNING: line over 80 characters
+static bool wait_for_tpm_stat_cond(struct tpm_chip *chip, u8 mask, bool check_cancel,
ERROR: trailing whitespace
+ * Called from tpm_<specific>.c probe function only for devices $
total: 16 errors, 7 warnings, 1554 lines checked
Signed-off-by: Peter Huewe <peterhuewe@gmx.de>
2013-10-22 05:29:14 +07:00
|
|
|
*
|
2005-04-17 05:20:36 +07:00
|
|
|
* Note, the TPM chip is not interrupt driven (only polling)
|
|
|
|
* and can have very long timeouts (minutes!). Hence the unusual
|
2005-06-24 12:01:47 +07:00
|
|
|
* calls to msleep.
|
2005-04-17 05:20:36 +07:00
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <linux/poll.h>
|
include cleanup: Update gfp.h and slab.h includes to prepare for breaking implicit slab.h inclusion from percpu.h
percpu.h is included by sched.h and module.h and thus ends up being
included when building most .c files. percpu.h includes slab.h which
in turn includes gfp.h making everything defined by the two files
universally available and complicating inclusion dependencies.
percpu.h -> slab.h dependency is about to be removed. Prepare for
this change by updating users of gfp and slab facilities include those
headers directly instead of assuming availability. As this conversion
needs to touch large number of source files, the following script is
used as the basis of conversion.
http://userweb.kernel.org/~tj/misc/slabh-sweep.py
The script does the followings.
* Scan files for gfp and slab usages and update includes such that
only the necessary includes are there. ie. if only gfp is used,
gfp.h, if slab is used, slab.h.
* When the script inserts a new include, it looks at the include
blocks and try to put the new include such that its order conforms
to its surrounding. It's put in the include block which contains
core kernel includes, in the same order that the rest are ordered -
alphabetical, Christmas tree, rev-Xmas-tree or at the end if there
doesn't seem to be any matching order.
* If the script can't find a place to put a new include (mostly
because the file doesn't have fitting include block), it prints out
an error message indicating which .h file needs to be added to the
file.
The conversion was done in the following steps.
1. The initial automatic conversion of all .c files updated slightly
over 4000 files, deleting around 700 includes and adding ~480 gfp.h
and ~3000 slab.h inclusions. The script emitted errors for ~400
files.
2. Each error was manually checked. Some didn't need the inclusion,
some needed manual addition while adding it to implementation .h or
embedding .c file was more appropriate for others. This step added
inclusions to around 150 files.
3. The script was run again and the output was compared to the edits
from #2 to make sure no file was left behind.
4. Several build tests were done and a couple of problems were fixed.
e.g. lib/decompress_*.c used malloc/free() wrappers around slab
APIs requiring slab.h to be added manually.
5. The script was run on all .h files but without automatically
editing them as sprinkling gfp.h and slab.h inclusions around .h
files could easily lead to inclusion dependency hell. Most gfp.h
inclusion directives were ignored as stuff from gfp.h was usually
wildly available and often used in preprocessor macros. Each
slab.h inclusion directive was examined and added manually as
necessary.
6. percpu.h was updated not to include slab.h.
7. Build test were done on the following configurations and failures
were fixed. CONFIG_GCOV_KERNEL was turned off for all tests (as my
distributed build env didn't work with gcov compiles) and a few
more options had to be turned off depending on archs to make things
build (like ipr on powerpc/64 which failed due to missing writeq).
* x86 and x86_64 UP and SMP allmodconfig and a custom test config.
* powerpc and powerpc64 SMP allmodconfig
* sparc and sparc64 SMP allmodconfig
* ia64 SMP allmodconfig
* s390 SMP allmodconfig
* alpha SMP allmodconfig
* um on x86_64 SMP allmodconfig
8. percpu.h modifications were reverted so that it could be applied as
a separate patch and serve as bisection point.
Given the fact that I had only a couple of failures from tests on step
6, I'm fairly confident about the coverage of this conversion patch.
If there is a breakage, it's likely to be something in one of the arch
headers which should be easily discoverable easily on most builds of
the specific arch.
Signed-off-by: Tejun Heo <tj@kernel.org>
Guess-its-ok-by: Christoph Lameter <cl@linux-foundation.org>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: Lee Schermerhorn <Lee.Schermerhorn@hp.com>
2010-03-24 15:04:11 +07:00
|
|
|
#include <linux/slab.h>
|
2007-05-08 14:32:02 +07:00
|
|
|
#include <linux/mutex.h>
|
2005-04-17 05:20:36 +07:00
|
|
|
#include <linux/spinlock.h>
|
2011-09-17 00:39:40 +07:00
|
|
|
#include <linux/freezer.h>
|
2017-09-20 15:13:36 +07:00
|
|
|
#include <linux/tpm_eventlog.h>
|
2007-05-08 14:32:02 +07:00
|
|
|
|
2005-04-17 05:20:36 +07:00
|
|
|
#include "tpm.h"
|
|
|
|
|
2006-04-22 16:37:38 +07:00
|
|
|
#define TPM_MAX_ORDINAL 243
|
2012-11-16 06:31:29 +07:00
|
|
|
#define TSC_MAX_ORDINAL 12
|
|
|
|
#define TPM_PROTECTED_COMMAND 0x00
|
|
|
|
#define TPM_CONNECTION_COMMAND 0x40
|
2006-04-22 16:37:38 +07:00
|
|
|
|
2010-10-02 04:16:39 +07:00
|
|
|
/*
|
|
|
|
* Bug workaround - some TPM's don't flush the most
|
|
|
|
* recently changed pcr on suspend, so force the flush
|
|
|
|
* with an extend to the selected _unused_ non-volatile pcr.
|
|
|
|
*/
|
|
|
|
static int tpm_suspend_pcr;
|
|
|
|
module_param_named(suspend_pcr, tpm_suspend_pcr, uint, 0644);
|
|
|
|
MODULE_PARM_DESC(suspend_pcr,
|
2017-02-06 11:47:18 +07:00
|
|
|
"PCR to use for dummy writes to facilitate flush on suspend.");
|
2010-10-02 04:16:39 +07:00
|
|
|
|
2006-04-22 16:37:38 +07:00
|
|
|
/*
|
|
|
|
* Array with one entry per ordinal defining the maximum amount
|
|
|
|
* of time the chip could take to return the result. The ordinal
|
|
|
|
* designation of short, medium or long is defined in a table in
|
|
|
|
* TCG Specification TPM Main Part 2 TPM Structures Section 17. The
|
|
|
|
* values of the SHORT, MEDIUM, and LONG durations are retrieved
|
|
|
|
* from the chip during initialization with a call to tpm_get_timeouts.
|
|
|
|
*/
|
|
|
|
static const u8 tpm_ordinal_duration[TPM_MAX_ORDINAL] = {
|
|
|
|
TPM_UNDEFINED, /* 0 */
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED, /* 5 */
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_SHORT, /* 10 */
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_MEDIUM,
|
|
|
|
TPM_LONG,
|
|
|
|
TPM_LONG,
|
|
|
|
TPM_MEDIUM, /* 15 */
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_MEDIUM,
|
|
|
|
TPM_LONG,
|
|
|
|
TPM_SHORT, /* 20 */
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_MEDIUM,
|
|
|
|
TPM_MEDIUM,
|
|
|
|
TPM_MEDIUM,
|
|
|
|
TPM_SHORT, /* 25 */
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_MEDIUM,
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_MEDIUM, /* 30 */
|
|
|
|
TPM_LONG,
|
|
|
|
TPM_MEDIUM,
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_SHORT, /* 35 */
|
|
|
|
TPM_MEDIUM,
|
|
|
|
TPM_MEDIUM,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_MEDIUM, /* 40 */
|
|
|
|
TPM_LONG,
|
|
|
|
TPM_MEDIUM,
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_SHORT, /* 45 */
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_LONG,
|
|
|
|
TPM_MEDIUM, /* 50 */
|
|
|
|
TPM_MEDIUM,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED, /* 55 */
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_MEDIUM, /* 60 */
|
|
|
|
TPM_MEDIUM,
|
|
|
|
TPM_MEDIUM,
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_MEDIUM, /* 65 */
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_SHORT, /* 70 */
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED, /* 75 */
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_LONG, /* 80 */
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_MEDIUM,
|
|
|
|
TPM_LONG,
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_UNDEFINED, /* 85 */
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_SHORT, /* 90 */
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_UNDEFINED, /* 95 */
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_MEDIUM, /* 100 */
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED, /* 105 */
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_SHORT, /* 110 */
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_SHORT, /* 115 */
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_LONG, /* 120 */
|
|
|
|
TPM_LONG,
|
|
|
|
TPM_MEDIUM,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_SHORT, /* 125 */
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_LONG,
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_SHORT, /* 130 */
|
|
|
|
TPM_MEDIUM,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_MEDIUM,
|
|
|
|
TPM_UNDEFINED, /* 135 */
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_SHORT, /* 140 */
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED, /* 145 */
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_SHORT, /* 150 */
|
|
|
|
TPM_MEDIUM,
|
|
|
|
TPM_MEDIUM,
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_UNDEFINED, /* 155 */
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_SHORT, /* 160 */
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED, /* 165 */
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_LONG, /* 170 */
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED, /* 175 */
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_MEDIUM, /* 180 */
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_MEDIUM,
|
|
|
|
TPM_MEDIUM,
|
|
|
|
TPM_MEDIUM,
|
|
|
|
TPM_MEDIUM, /* 185 */
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED, /* 190 */
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED, /* 195 */
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_SHORT, /* 200 */
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_SHORT, /* 205 */
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_MEDIUM, /* 210 */
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_MEDIUM,
|
|
|
|
TPM_MEDIUM,
|
|
|
|
TPM_MEDIUM,
|
|
|
|
TPM_UNDEFINED, /* 215 */
|
|
|
|
TPM_MEDIUM,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_SHORT, /* 220 */
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_SHORT,
|
|
|
|
TPM_UNDEFINED, /* 225 */
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_SHORT, /* 230 */
|
|
|
|
TPM_LONG,
|
|
|
|
TPM_MEDIUM,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED, /* 235 */
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_SHORT, /* 240 */
|
|
|
|
TPM_UNDEFINED,
|
|
|
|
TPM_MEDIUM,
|
|
|
|
};
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Returns max number of jiffies to wait
|
|
|
|
*/
|
|
|
|
unsigned long tpm_calc_ordinal_duration(struct tpm_chip *chip,
|
|
|
|
u32 ordinal)
|
|
|
|
{
|
|
|
|
int duration_idx = TPM_UNDEFINED;
|
|
|
|
int duration = 0;
|
|
|
|
|
2015-11-20 20:32:33 +07:00
|
|
|
/*
|
|
|
|
* We only have a duration table for protected commands, where the upper
|
|
|
|
* 16 bits are 0. For the few other ordinals the fallback will be used.
|
|
|
|
*/
|
|
|
|
if (ordinal < TPM_MAX_ORDINAL)
|
2006-04-22 16:37:38 +07:00
|
|
|
duration_idx = tpm_ordinal_duration[ordinal];
|
|
|
|
|
2011-03-02 04:23:27 +07:00
|
|
|
if (duration_idx != TPM_UNDEFINED)
|
2016-04-01 03:56:59 +07:00
|
|
|
duration = chip->duration[duration_idx];
|
2011-03-02 04:23:27 +07:00
|
|
|
if (duration <= 0)
|
2006-04-22 16:37:38 +07:00
|
|
|
return 2 * 60 * HZ;
|
2011-03-02 04:23:27 +07:00
|
|
|
else
|
|
|
|
return duration;
|
2006-04-22 16:37:38 +07:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(tpm_calc_ordinal_duration);
|
|
|
|
|
2017-11-30 14:39:07 +07:00
|
|
|
static int tpm_validate_command(struct tpm_chip *chip,
|
2017-01-06 19:03:45 +07:00
|
|
|
struct tpm_space *space,
|
|
|
|
const u8 *cmd,
|
2016-11-11 11:42:07 +07:00
|
|
|
size_t len)
|
|
|
|
{
|
|
|
|
const struct tpm_input_header *header = (const void *)cmd;
|
|
|
|
int i;
|
|
|
|
u32 cc;
|
|
|
|
u32 attrs;
|
|
|
|
unsigned int nr_handles;
|
|
|
|
|
|
|
|
if (len < TPM_HEADER_SIZE)
|
2017-11-30 14:39:07 +07:00
|
|
|
return -EINVAL;
|
2016-11-11 11:42:07 +07:00
|
|
|
|
2017-01-06 19:03:45 +07:00
|
|
|
if (!space)
|
2017-11-30 14:39:07 +07:00
|
|
|
return 0;
|
2017-01-06 19:03:45 +07:00
|
|
|
|
2016-11-11 11:42:07 +07:00
|
|
|
if (chip->flags & TPM_CHIP_FLAG_TPM2 && chip->nr_commands) {
|
|
|
|
cc = be32_to_cpu(header->ordinal);
|
|
|
|
|
|
|
|
i = tpm2_find_cc(chip, cc);
|
|
|
|
if (i < 0) {
|
|
|
|
dev_dbg(&chip->dev, "0x%04X is an invalid command\n",
|
|
|
|
cc);
|
2017-11-30 14:39:07 +07:00
|
|
|
return -EOPNOTSUPP;
|
2016-11-11 11:42:07 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
attrs = chip->cc_attrs_tbl[i];
|
|
|
|
nr_handles =
|
|
|
|
4 * ((attrs >> TPM2_CC_ATTR_CHANDLES) & GENMASK(2, 0));
|
|
|
|
if (len < TPM_HEADER_SIZE + 4 * nr_handles)
|
|
|
|
goto err_len;
|
|
|
|
}
|
|
|
|
|
2017-11-30 14:39:07 +07:00
|
|
|
return 0;
|
2016-11-11 11:42:07 +07:00
|
|
|
err_len:
|
|
|
|
dev_dbg(&chip->dev,
|
|
|
|
"%s: insufficient command length %zu", __func__, len);
|
2017-11-30 14:39:07 +07:00
|
|
|
return -EINVAL;
|
2016-11-11 11:42:07 +07:00
|
|
|
}
|
|
|
|
|
2018-06-28 22:13:33 +07:00
|
|
|
static int tpm_request_locality(struct tpm_chip *chip, unsigned int flags)
|
2018-03-05 18:34:49 +07:00
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
|
2018-06-29 19:24:50 +07:00
|
|
|
if (flags & TPM_TRANSMIT_NESTED)
|
2018-06-28 22:13:33 +07:00
|
|
|
return 0;
|
|
|
|
|
2018-03-05 18:34:49 +07:00
|
|
|
if (!chip->ops->request_locality)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
rc = chip->ops->request_locality(chip, 0);
|
|
|
|
if (rc < 0)
|
|
|
|
return rc;
|
|
|
|
|
|
|
|
chip->locality = rc;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2018-06-28 22:13:33 +07:00
|
|
|
static void tpm_relinquish_locality(struct tpm_chip *chip, unsigned int flags)
|
2018-03-05 18:34:49 +07:00
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
|
2018-06-29 19:24:50 +07:00
|
|
|
if (flags & TPM_TRANSMIT_NESTED)
|
2018-06-28 22:13:33 +07:00
|
|
|
return;
|
|
|
|
|
2018-03-05 18:34:49 +07:00
|
|
|
if (!chip->ops->relinquish_locality)
|
|
|
|
return;
|
|
|
|
|
|
|
|
rc = chip->ops->relinquish_locality(chip, chip->locality);
|
|
|
|
if (rc)
|
|
|
|
dev_err(&chip->dev, "%s: : error %d\n", __func__, rc);
|
|
|
|
|
|
|
|
chip->locality = -1;
|
|
|
|
}
|
|
|
|
|
2018-06-28 22:13:33 +07:00
|
|
|
static int tpm_cmd_ready(struct tpm_chip *chip, unsigned int flags)
|
|
|
|
{
|
2018-06-29 19:24:50 +07:00
|
|
|
if (flags & TPM_TRANSMIT_NESTED)
|
2018-06-28 22:13:33 +07:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (!chip->ops->cmd_ready)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
return chip->ops->cmd_ready(chip);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int tpm_go_idle(struct tpm_chip *chip, unsigned int flags)
|
|
|
|
{
|
2018-06-29 19:24:50 +07:00
|
|
|
if (flags & TPM_TRANSMIT_NESTED)
|
2018-06-28 22:13:33 +07:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (!chip->ops->go_idle)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
return chip->ops->go_idle(chip);
|
|
|
|
}
|
|
|
|
|
2018-03-22 01:43:48 +07:00
|
|
|
static ssize_t tpm_try_transmit(struct tpm_chip *chip,
|
|
|
|
struct tpm_space *space,
|
|
|
|
u8 *buf, size_t bufsiz,
|
|
|
|
unsigned int flags)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
2017-01-06 19:03:45 +07:00
|
|
|
struct tpm_output_header *header = (void *)buf;
|
|
|
|
int rc;
|
|
|
|
ssize_t len = 0;
|
2006-04-22 16:37:38 +07:00
|
|
|
u32 count, ordinal;
|
2005-06-24 12:01:47 +07:00
|
|
|
unsigned long stop;
|
2017-03-24 16:45:49 +07:00
|
|
|
bool need_locality;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2017-11-30 14:39:07 +07:00
|
|
|
rc = tpm_validate_command(chip, space, buf, bufsiz);
|
|
|
|
if (rc == -EINVAL)
|
|
|
|
return rc;
|
|
|
|
/*
|
|
|
|
* If the command is not implemented by the TPM, synthesize a
|
|
|
|
* response with a TPM2_RC_COMMAND_CODE return for user-space.
|
|
|
|
*/
|
|
|
|
if (rc == -EOPNOTSUPP) {
|
|
|
|
header->length = cpu_to_be32(sizeof(*header));
|
|
|
|
header->tag = cpu_to_be16(TPM2_ST_NO_SESSIONS);
|
|
|
|
header->return_code = cpu_to_be32(TPM2_RC_COMMAND_CODE |
|
|
|
|
TSS2_RESMGR_TPM_RC_LAYER);
|
2018-06-26 22:31:45 +07:00
|
|
|
return sizeof(*header);
|
2017-11-30 14:39:07 +07:00
|
|
|
}
|
2016-09-12 17:43:30 +07:00
|
|
|
|
2011-09-16 00:37:43 +07:00
|
|
|
if (bufsiz > TPM_BUFSIZE)
|
|
|
|
bufsiz = TPM_BUFSIZE;
|
|
|
|
|
2005-06-24 12:01:59 +07:00
|
|
|
count = be32_to_cpu(*((__be32 *) (buf + 2)));
|
2006-04-22 16:37:38 +07:00
|
|
|
ordinal = be32_to_cpu(*((__be32 *) (buf + 6)));
|
2005-04-17 05:20:36 +07:00
|
|
|
if (count == 0)
|
|
|
|
return -ENODATA;
|
|
|
|
if (count > bufsiz) {
|
2016-03-01 00:29:47 +07:00
|
|
|
dev_err(&chip->dev,
|
tpm: cleanup checkpatch warnings
before we rename the file it might be a good idea to cleanup the long
persisting checkpatch warnings.
Since everything is really trivial, splitting the patch up would only
result in noise.
For the interested reader - here the checkpatch warnings:
(regrouped for easer readability)
ERROR: trailing whitespace
+ * Specifications at www.trustedcomputinggroup.org^I $
+ * $
+^I/* $
+^I parameters (RSA 12->bytes: keybit, #primes, expbit) $
WARNING: unnecessary whitespace before a quoted newline
+ "invalid count value %x %zx \n", count, bufsiz);
ERROR: do not use assignment in if condition
+ if ((rc = chip->vendor.send(chip, (u8 *) buf, count)) < 0) {
ERROR: space required after that ',' (ctx:VxV)
+ len = tpm_transmit(chip,(u8 *) cmd, len);
^
ERROR: "foo * bar" should be "foo *bar"
+ssize_t tpm_show_enabled(struct device * dev, struct device_attribute * attr,
+ssize_t tpm_show_enabled(struct device * dev, struct device_attribute * attr,
+ssize_t tpm_show_active(struct device * dev, struct device_attribute * attr,
+ssize_t tpm_show_active(struct device * dev, struct device_attribute * attr,
+ssize_t tpm_show_owned(struct device * dev, struct device_attribute * attr,
+ssize_t tpm_show_owned(struct device * dev, struct device_attribute * attr,
+ssize_t tpm_show_temp_deactivated(struct device * dev,
+ struct device_attribute * attr, char *buf)
WARNING: please, no space before tabs
+ * @chip_num: ^Itpm idx # or ANY$
+ * @res_buf: ^ITPM_PCR value$
+ * ^I^Isize of res_buf is 20 bytes (or NULL if you don't care)$
+ * @chip_num: ^Itpm idx # or AN&$
+ * @hash: ^Ihash value used to extend pcr value$
ERROR: code indent should use tabs where possible
+^I TPM_ORD_CONTINUE_SELFTEST);$
WARNING: line over 80 characters
+static bool wait_for_tpm_stat_cond(struct tpm_chip *chip, u8 mask, bool check_cancel,
ERROR: trailing whitespace
+ * Called from tpm_<specific>.c probe function only for devices $
total: 16 errors, 7 warnings, 1554 lines checked
Signed-off-by: Peter Huewe <peterhuewe@gmx.de>
2013-10-22 05:29:14 +07:00
|
|
|
"invalid count value %x %zx\n", count, bufsiz);
|
2005-04-17 05:20:36 +07:00
|
|
|
return -E2BIG;
|
|
|
|
}
|
|
|
|
|
2018-06-29 19:24:50 +07:00
|
|
|
if (!(flags & TPM_TRANSMIT_UNLOCKED) && !(flags & TPM_TRANSMIT_NESTED))
|
2016-08-17 02:00:38 +07:00
|
|
|
mutex_lock(&chip->tpm_mutex);
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2017-12-23 03:13:44 +07:00
|
|
|
if (chip->ops->clk_enable != NULL)
|
|
|
|
chip->ops->clk_enable(chip, true);
|
|
|
|
|
2017-03-24 16:45:49 +07:00
|
|
|
/* Store the decision as chip->locality will be changed. */
|
|
|
|
need_locality = chip->locality == -1;
|
|
|
|
|
2018-06-28 22:13:33 +07:00
|
|
|
if (need_locality) {
|
|
|
|
rc = tpm_request_locality(chip, flags);
|
2017-03-24 16:45:49 +07:00
|
|
|
if (rc < 0)
|
|
|
|
goto out_no_locality;
|
|
|
|
}
|
|
|
|
|
2018-06-28 22:13:33 +07:00
|
|
|
rc = tpm_cmd_ready(chip, flags);
|
|
|
|
if (rc)
|
|
|
|
goto out;
|
2018-03-05 18:34:49 +07:00
|
|
|
|
2017-01-06 19:03:45 +07:00
|
|
|
rc = tpm2_prepare_space(chip, space, ordinal, buf);
|
|
|
|
if (rc)
|
|
|
|
goto out;
|
|
|
|
|
2018-03-05 19:48:26 +07:00
|
|
|
rc = chip->ops->send(chip, buf, count);
|
tpm: cleanup checkpatch warnings
before we rename the file it might be a good idea to cleanup the long
persisting checkpatch warnings.
Since everything is really trivial, splitting the patch up would only
result in noise.
For the interested reader - here the checkpatch warnings:
(regrouped for easer readability)
ERROR: trailing whitespace
+ * Specifications at www.trustedcomputinggroup.org^I $
+ * $
+^I/* $
+^I parameters (RSA 12->bytes: keybit, #primes, expbit) $
WARNING: unnecessary whitespace before a quoted newline
+ "invalid count value %x %zx \n", count, bufsiz);
ERROR: do not use assignment in if condition
+ if ((rc = chip->vendor.send(chip, (u8 *) buf, count)) < 0) {
ERROR: space required after that ',' (ctx:VxV)
+ len = tpm_transmit(chip,(u8 *) cmd, len);
^
ERROR: "foo * bar" should be "foo *bar"
+ssize_t tpm_show_enabled(struct device * dev, struct device_attribute * attr,
+ssize_t tpm_show_enabled(struct device * dev, struct device_attribute * attr,
+ssize_t tpm_show_active(struct device * dev, struct device_attribute * attr,
+ssize_t tpm_show_active(struct device * dev, struct device_attribute * attr,
+ssize_t tpm_show_owned(struct device * dev, struct device_attribute * attr,
+ssize_t tpm_show_owned(struct device * dev, struct device_attribute * attr,
+ssize_t tpm_show_temp_deactivated(struct device * dev,
+ struct device_attribute * attr, char *buf)
WARNING: please, no space before tabs
+ * @chip_num: ^Itpm idx # or ANY$
+ * @res_buf: ^ITPM_PCR value$
+ * ^I^Isize of res_buf is 20 bytes (or NULL if you don't care)$
+ * @chip_num: ^Itpm idx # or AN&$
+ * @hash: ^Ihash value used to extend pcr value$
ERROR: code indent should use tabs where possible
+^I TPM_ORD_CONTINUE_SELFTEST);$
WARNING: line over 80 characters
+static bool wait_for_tpm_stat_cond(struct tpm_chip *chip, u8 mask, bool check_cancel,
ERROR: trailing whitespace
+ * Called from tpm_<specific>.c probe function only for devices $
total: 16 errors, 7 warnings, 1554 lines checked
Signed-off-by: Peter Huewe <peterhuewe@gmx.de>
2013-10-22 05:29:14 +07:00
|
|
|
if (rc < 0) {
|
2017-05-26 05:29:13 +07:00
|
|
|
if (rc != -EPIPE)
|
|
|
|
dev_err(&chip->dev,
|
|
|
|
"%s: tpm_send: error %d\n", __func__, rc);
|
2005-06-24 12:02:02 +07:00
|
|
|
goto out;
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
2016-04-01 03:56:56 +07:00
|
|
|
if (chip->flags & TPM_CHIP_FLAG_IRQ)
|
2006-04-22 16:38:03 +07:00
|
|
|
goto out_recv;
|
|
|
|
|
2014-12-13 02:46:38 +07:00
|
|
|
if (chip->flags & TPM_CHIP_FLAG_TPM2)
|
|
|
|
stop = jiffies + tpm2_calc_ordinal_duration(chip, ordinal);
|
|
|
|
else
|
|
|
|
stop = jiffies + tpm_calc_ordinal_duration(chip, ordinal);
|
2005-04-17 05:20:36 +07:00
|
|
|
do {
|
2013-11-27 03:30:44 +07:00
|
|
|
u8 status = chip->ops->status(chip);
|
|
|
|
if ((status & chip->ops->req_complete_mask) ==
|
|
|
|
chip->ops->req_complete_val)
|
2005-04-17 05:20:36 +07:00
|
|
|
goto out_recv;
|
2005-06-24 12:02:02 +07:00
|
|
|
|
2013-11-27 03:30:44 +07:00
|
|
|
if (chip->ops->req_canceled(chip, status)) {
|
2016-03-01 00:29:47 +07:00
|
|
|
dev_err(&chip->dev, "Operation Canceled\n");
|
2005-06-24 12:02:02 +07:00
|
|
|
rc = -ECANCELED;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2018-05-07 23:07:32 +07:00
|
|
|
tpm_msleep(TPM_TIMEOUT_POLL);
|
2005-04-17 05:20:36 +07:00
|
|
|
rmb();
|
2005-06-24 12:01:47 +07:00
|
|
|
} while (time_before(jiffies, stop));
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2013-11-27 03:30:44 +07:00
|
|
|
chip->ops->cancel(chip);
|
2016-03-01 00:29:47 +07:00
|
|
|
dev_err(&chip->dev, "Operation Timed out\n");
|
2005-06-24 12:02:02 +07:00
|
|
|
rc = -ETIME;
|
|
|
|
goto out;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
|
|
|
out_recv:
|
2018-03-05 19:48:26 +07:00
|
|
|
len = chip->ops->recv(chip, buf, bufsiz);
|
2017-01-06 19:03:45 +07:00
|
|
|
if (len < 0) {
|
|
|
|
rc = len;
|
2016-03-01 00:29:47 +07:00
|
|
|
dev_err(&chip->dev,
|
2017-01-06 19:03:45 +07:00
|
|
|
"tpm_transmit: tpm_recv: error %d\n", rc);
|
2017-02-15 02:57:42 +07:00
|
|
|
goto out;
|
2017-01-06 19:03:45 +07:00
|
|
|
} else if (len < TPM_HEADER_SIZE) {
|
2017-02-15 02:57:42 +07:00
|
|
|
rc = -EFAULT;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2017-01-06 19:03:45 +07:00
|
|
|
if (len != be32_to_cpu(header->length)) {
|
|
|
|
rc = -EFAULT;
|
2017-02-15 02:57:42 +07:00
|
|
|
goto out;
|
2017-01-06 19:03:45 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
rc = tpm2_commit_space(chip, space, ordinal, buf, &len);
|
2018-06-28 22:13:33 +07:00
|
|
|
if (rc)
|
|
|
|
dev_err(&chip->dev, "tpm2_commit_space: error %d\n", rc);
|
2017-02-15 02:57:42 +07:00
|
|
|
|
2005-06-24 12:02:02 +07:00
|
|
|
out:
|
2018-06-28 22:13:33 +07:00
|
|
|
rc = tpm_go_idle(chip, flags);
|
|
|
|
if (rc)
|
|
|
|
goto out;
|
2018-03-05 18:34:49 +07:00
|
|
|
|
|
|
|
if (need_locality)
|
2018-06-28 22:13:33 +07:00
|
|
|
tpm_relinquish_locality(chip, flags);
|
2018-03-05 18:34:49 +07:00
|
|
|
|
2017-03-24 16:45:49 +07:00
|
|
|
out_no_locality:
|
2017-12-23 03:13:44 +07:00
|
|
|
if (chip->ops->clk_enable != NULL)
|
|
|
|
chip->ops->clk_enable(chip, false);
|
|
|
|
|
2018-06-29 19:24:50 +07:00
|
|
|
if (!(flags & TPM_TRANSMIT_UNLOCKED) && !(flags & TPM_TRANSMIT_NESTED))
|
2016-08-17 02:00:38 +07:00
|
|
|
mutex_unlock(&chip->tpm_mutex);
|
2017-01-06 19:03:45 +07:00
|
|
|
return rc ? rc : len;
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
2018-03-22 01:43:48 +07:00
|
|
|
/**
|
|
|
|
* tpm_transmit - Internal kernel interface to transmit TPM commands.
|
|
|
|
*
|
|
|
|
* @chip: TPM chip to use
|
|
|
|
* @space: tpm space
|
|
|
|
* @buf: TPM command buffer
|
|
|
|
* @bufsiz: length of the TPM command buffer
|
|
|
|
* @flags: tpm transmit flags - bitmap
|
|
|
|
*
|
|
|
|
* A wrapper around tpm_try_transmit that handles TPM2_RC_RETRY
|
|
|
|
* returns from the TPM and retransmits the command after a delay up
|
|
|
|
* to a maximum wait of TPM2_DURATION_LONG.
|
|
|
|
*
|
|
|
|
* Note: TPM1 never returns TPM2_RC_RETRY so the retry logic is TPM2
|
|
|
|
* only
|
|
|
|
*
|
|
|
|
* Return:
|
|
|
|
* the length of the return when the operation is successful.
|
|
|
|
* A negative number for system errors (errno).
|
|
|
|
*/
|
|
|
|
ssize_t tpm_transmit(struct tpm_chip *chip, struct tpm_space *space,
|
|
|
|
u8 *buf, size_t bufsiz, unsigned int flags)
|
|
|
|
{
|
|
|
|
struct tpm_output_header *header = (struct tpm_output_header *)buf;
|
|
|
|
/* space for header and handles */
|
|
|
|
u8 save[TPM_HEADER_SIZE + 3*sizeof(u32)];
|
|
|
|
unsigned int delay_msec = TPM2_DURATION_SHORT;
|
|
|
|
u32 rc = 0;
|
|
|
|
ssize_t ret;
|
|
|
|
const size_t save_size = min(space ? sizeof(save) : TPM_HEADER_SIZE,
|
|
|
|
bufsiz);
|
2018-03-22 22:32:20 +07:00
|
|
|
/* the command code is where the return code will be */
|
|
|
|
u32 cc = be32_to_cpu(header->return_code);
|
2018-03-22 01:43:48 +07:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Subtlety here: if we have a space, the handles will be
|
|
|
|
* transformed, so when we restore the header we also have to
|
|
|
|
* restore the handles.
|
|
|
|
*/
|
|
|
|
memcpy(save, buf, save_size);
|
|
|
|
|
|
|
|
for (;;) {
|
|
|
|
ret = tpm_try_transmit(chip, space, buf, bufsiz, flags);
|
|
|
|
if (ret < 0)
|
|
|
|
break;
|
|
|
|
rc = be32_to_cpu(header->return_code);
|
2018-03-22 22:32:20 +07:00
|
|
|
if (rc != TPM2_RC_RETRY && rc != TPM2_RC_TESTING)
|
|
|
|
break;
|
|
|
|
/*
|
|
|
|
* return immediately if self test returns test
|
|
|
|
* still running to shorten boot time.
|
|
|
|
*/
|
|
|
|
if (rc == TPM2_RC_TESTING && cc == TPM2_CC_SELF_TEST)
|
2018-03-22 01:43:48 +07:00
|
|
|
break;
|
2018-04-02 23:20:06 +07:00
|
|
|
|
2018-03-22 01:43:48 +07:00
|
|
|
if (delay_msec > TPM2_DURATION_LONG) {
|
2018-03-22 22:32:20 +07:00
|
|
|
if (rc == TPM2_RC_RETRY)
|
|
|
|
dev_err(&chip->dev, "in retry loop\n");
|
|
|
|
else
|
|
|
|
dev_err(&chip->dev,
|
|
|
|
"self test is still running\n");
|
2018-03-22 01:43:48 +07:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
tpm_msleep(delay_msec);
|
2018-04-02 23:20:06 +07:00
|
|
|
delay_msec *= 2;
|
2018-03-22 01:43:48 +07:00
|
|
|
memcpy(buf, save, save_size);
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
2016-11-23 17:04:11 +07:00
|
|
|
/**
|
2018-03-05 19:48:25 +07:00
|
|
|
* tpm_transmit_cmd - send a tpm command to the device
|
2016-11-23 17:04:11 +07:00
|
|
|
* The function extracts tpm out header return code
|
|
|
|
*
|
|
|
|
* @chip: TPM chip to use
|
2018-03-05 19:48:25 +07:00
|
|
|
* @space: tpm space
|
2017-01-19 19:19:12 +07:00
|
|
|
* @buf: TPM command buffer
|
|
|
|
* @bufsiz: length of the buffer
|
|
|
|
* @min_rsp_body_length: minimum expected length of response body
|
2016-11-23 17:04:11 +07:00
|
|
|
* @flags: tpm transmit flags - bitmap
|
|
|
|
* @desc: command description used in the error message
|
|
|
|
*
|
|
|
|
* Return:
|
|
|
|
* 0 when the operation is successful.
|
|
|
|
* A negative number for system errors (errno).
|
|
|
|
* A positive number for a TPM error.
|
|
|
|
*/
|
2017-01-06 19:03:45 +07:00
|
|
|
ssize_t tpm_transmit_cmd(struct tpm_chip *chip, struct tpm_space *space,
|
2018-03-05 19:48:26 +07:00
|
|
|
void *buf, size_t bufsiz,
|
2017-01-06 19:03:45 +07:00
|
|
|
size_t min_rsp_body_length, unsigned int flags,
|
|
|
|
const char *desc)
|
2006-04-22 16:37:05 +07:00
|
|
|
{
|
2017-02-15 02:57:42 +07:00
|
|
|
const struct tpm_output_header *header = buf;
|
2006-04-22 16:37:05 +07:00
|
|
|
int err;
|
2017-01-19 19:19:12 +07:00
|
|
|
ssize_t len;
|
2006-04-22 16:37:05 +07:00
|
|
|
|
2018-03-05 19:48:26 +07:00
|
|
|
len = tpm_transmit(chip, space, buf, bufsiz, flags);
|
2006-04-22 16:37:05 +07:00
|
|
|
if (len < 0)
|
|
|
|
return len;
|
2014-12-13 02:46:33 +07:00
|
|
|
|
|
|
|
err = be32_to_cpu(header->return_code);
|
tpm: suppress transmit cmd error logs when TPM 1.2 is disabled/deactivated
For TPM 1.2 chips the system setup utility allows to set the TPM device in
one of the following states:
* Active: Security chip is functional
* Inactive: Security chip is visible, but is not functional
* Disabled: Security chip is hidden and is not functional
When choosing the "Inactive" state, the TPM 1.2 device is enumerated and
registered, but sending TPM commands fail with either TPM_DEACTIVATED or
TPM_DISABLED depending if the firmware deactivated or disabled the TPM.
Since these TPM 1.2 error codes don't have special treatment, inactivating
the TPM leads to a very noisy kernel log buffer that shows messages like
the following:
tpm_tis 00:05: 1.2 TPM (device-id 0x0, rev-id 78)
tpm tpm0: A TPM error (6) occurred attempting to read a pcr value
tpm tpm0: TPM is disabled/deactivated (0x6)
tpm tpm0: A TPM error (6) occurred attempting get random
tpm tpm0: A TPM error (6) occurred attempting to read a pcr value
ima: No TPM chip found, activating TPM-bypass! (rc=6)
tpm tpm0: A TPM error (6) occurred attempting get random
tpm tpm0: A TPM error (6) occurred attempting get random
tpm tpm0: A TPM error (6) occurred attempting get random
tpm tpm0: A TPM error (6) occurred attempting get random
Let's just suppress error log messages for the TPM_{DEACTIVATED,DISABLED}
return codes, since this is expected when the TPM 1.2 is set to Inactive.
In that case the kernel log is cleaner and less confusing for users, i.e:
tpm_tis 00:05: 1.2 TPM (device-id 0x0, rev-id 78)
tpm tpm0: TPM is disabled/deactivated (0x6)
ima: No TPM chip found, activating TPM-bypass! (rc=6)
Reported-by: Hans de Goede <hdegoede@redhat.com>
Signed-off-by: Javier Martinez Canillas <javierm@redhat.com>
Reviewed-by: Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com>
Signed-off-by: Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com>
2018-08-30 21:40:05 +07:00
|
|
|
if (err != 0 && err != TPM_ERR_DISABLED && err != TPM_ERR_DEACTIVATED
|
|
|
|
&& desc)
|
2016-03-01 00:29:47 +07:00
|
|
|
dev_err(&chip->dev, "A TPM error (%d) occurred %s\n", err,
|
2014-12-13 02:46:36 +07:00
|
|
|
desc);
|
2017-01-19 19:19:12 +07:00
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
|
|
|
|
if (len < min_rsp_body_length + TPM_HEADER_SIZE)
|
|
|
|
return -EFAULT;
|
2011-11-02 02:00:52 +07:00
|
|
|
|
2017-01-19 19:19:12 +07:00
|
|
|
return 0;
|
2006-04-22 16:37:05 +07:00
|
|
|
}
|
2017-05-25 04:39:40 +07:00
|
|
|
EXPORT_SYMBOL_GPL(tpm_transmit_cmd);
|
2006-04-22 16:37:05 +07:00
|
|
|
|
2017-06-21 14:31:34 +07:00
|
|
|
#define TPM_ORD_STARTUP 153
|
|
|
|
#define TPM_ST_CLEAR 1
|
|
|
|
|
|
|
|
/**
|
|
|
|
* tpm_startup - turn on the TPM
|
|
|
|
* @chip: TPM chip to use
|
|
|
|
*
|
|
|
|
* Normally the firmware should start the TPM. This function is provided as a
|
|
|
|
* workaround if this does not happen. A legal case for this could be for
|
|
|
|
* example when a TPM emulator is used.
|
|
|
|
*
|
|
|
|
* Return: same as tpm_transmit_cmd()
|
|
|
|
*/
|
|
|
|
int tpm_startup(struct tpm_chip *chip)
|
|
|
|
{
|
|
|
|
struct tpm_buf buf;
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
dev_info(&chip->dev, "starting up the TPM manually\n");
|
|
|
|
|
|
|
|
if (chip->flags & TPM_CHIP_FLAG_TPM2) {
|
|
|
|
rc = tpm_buf_init(&buf, TPM2_ST_NO_SESSIONS, TPM2_CC_STARTUP);
|
|
|
|
if (rc < 0)
|
|
|
|
return rc;
|
|
|
|
|
|
|
|
tpm_buf_append_u16(&buf, TPM2_SU_CLEAR);
|
|
|
|
} else {
|
|
|
|
rc = tpm_buf_init(&buf, TPM_TAG_RQU_COMMAND, TPM_ORD_STARTUP);
|
|
|
|
if (rc < 0)
|
|
|
|
return rc;
|
|
|
|
|
|
|
|
tpm_buf_append_u16(&buf, TPM_ST_CLEAR);
|
|
|
|
}
|
|
|
|
|
|
|
|
rc = tpm_transmit_cmd(chip, NULL, buf.data, PAGE_SIZE, 0, 0,
|
|
|
|
"attempting to start the TPM");
|
|
|
|
|
|
|
|
tpm_buf_destroy(&buf);
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2016-11-23 17:04:11 +07:00
|
|
|
#define TPM_DIGEST_SIZE 20
|
|
|
|
#define TPM_RET_CODE_IDX 6
|
2009-02-03 00:23:43 +07:00
|
|
|
#define TPM_INTERNAL_RESULT_SIZE 200
|
2017-05-03 23:19:10 +07:00
|
|
|
#define TPM_ORD_GET_CAP 101
|
|
|
|
#define TPM_ORD_GET_RANDOM 70
|
2009-02-03 00:23:43 +07:00
|
|
|
|
|
|
|
static const struct tpm_input_header tpm_getcap_header = {
|
2017-05-03 23:19:09 +07:00
|
|
|
.tag = cpu_to_be16(TPM_TAG_RQU_COMMAND),
|
2009-02-03 00:23:43 +07:00
|
|
|
.length = cpu_to_be32(22),
|
2017-05-03 23:19:10 +07:00
|
|
|
.ordinal = cpu_to_be32(TPM_ORD_GET_CAP)
|
2009-02-03 00:23:43 +07:00
|
|
|
};
|
|
|
|
|
2016-09-20 03:22:09 +07:00
|
|
|
ssize_t tpm_getcap(struct tpm_chip *chip, u32 subcap_id, cap_t *cap,
|
2017-01-19 19:19:12 +07:00
|
|
|
const char *desc, size_t min_cap_length)
|
2009-02-03 00:23:43 +07:00
|
|
|
{
|
2017-05-08 00:50:02 +07:00
|
|
|
struct tpm_buf buf;
|
2009-02-03 00:23:43 +07:00
|
|
|
int rc;
|
|
|
|
|
2017-05-08 00:50:02 +07:00
|
|
|
rc = tpm_buf_init(&buf, TPM_TAG_RQU_COMMAND, TPM_ORD_GET_CAP);
|
|
|
|
if (rc)
|
|
|
|
return rc;
|
|
|
|
|
2016-09-20 03:22:09 +07:00
|
|
|
if (subcap_id == TPM_CAP_VERSION_1_1 ||
|
|
|
|
subcap_id == TPM_CAP_VERSION_1_2) {
|
2017-05-08 00:50:02 +07:00
|
|
|
tpm_buf_append_u32(&buf, subcap_id);
|
|
|
|
tpm_buf_append_u32(&buf, 0);
|
2009-02-03 00:23:43 +07:00
|
|
|
} else {
|
|
|
|
if (subcap_id == TPM_CAP_FLAG_PERM ||
|
|
|
|
subcap_id == TPM_CAP_FLAG_VOL)
|
2017-05-08 00:50:02 +07:00
|
|
|
tpm_buf_append_u32(&buf, TPM_CAP_FLAG);
|
2009-02-03 00:23:43 +07:00
|
|
|
else
|
2017-05-08 00:50:02 +07:00
|
|
|
tpm_buf_append_u32(&buf, TPM_CAP_PROP);
|
|
|
|
|
|
|
|
tpm_buf_append_u32(&buf, 4);
|
|
|
|
tpm_buf_append_u32(&buf, subcap_id);
|
2009-02-03 00:23:43 +07:00
|
|
|
}
|
2017-05-08 00:50:02 +07:00
|
|
|
rc = tpm_transmit_cmd(chip, NULL, buf.data, PAGE_SIZE,
|
2017-01-19 19:19:12 +07:00
|
|
|
min_cap_length, 0, desc);
|
2009-02-03 00:23:43 +07:00
|
|
|
if (!rc)
|
2017-05-08 00:50:02 +07:00
|
|
|
*cap = *(cap_t *)&buf.data[TPM_HEADER_SIZE + 4];
|
|
|
|
|
|
|
|
tpm_buf_destroy(&buf);
|
2009-02-03 00:23:43 +07:00
|
|
|
return rc;
|
|
|
|
}
|
2016-06-12 20:42:09 +07:00
|
|
|
EXPORT_SYMBOL_GPL(tpm_getcap);
|
2006-04-22 16:37:50 +07:00
|
|
|
|
2011-11-12 00:57:02 +07:00
|
|
|
int tpm_get_timeouts(struct tpm_chip *chip)
|
2006-04-22 16:37:50 +07:00
|
|
|
{
|
2016-09-20 03:22:08 +07:00
|
|
|
cap_t cap;
|
2017-01-14 04:37:00 +07:00
|
|
|
unsigned long timeout_old[4], timeout_chip[4], timeout_eff[4];
|
2006-04-22 16:37:50 +07:00
|
|
|
ssize_t rc;
|
|
|
|
|
2016-10-27 05:28:44 +07:00
|
|
|
if (chip->flags & TPM_CHIP_FLAG_HAVE_TIMEOUTS)
|
|
|
|
return 0;
|
|
|
|
|
2015-11-26 04:05:32 +07:00
|
|
|
if (chip->flags & TPM_CHIP_FLAG_TPM2) {
|
|
|
|
/* Fixed timeouts for TPM2 */
|
2016-04-01 03:56:59 +07:00
|
|
|
chip->timeout_a = msecs_to_jiffies(TPM2_TIMEOUT_A);
|
|
|
|
chip->timeout_b = msecs_to_jiffies(TPM2_TIMEOUT_B);
|
|
|
|
chip->timeout_c = msecs_to_jiffies(TPM2_TIMEOUT_C);
|
|
|
|
chip->timeout_d = msecs_to_jiffies(TPM2_TIMEOUT_D);
|
|
|
|
chip->duration[TPM_SHORT] =
|
2015-11-26 04:05:32 +07:00
|
|
|
msecs_to_jiffies(TPM2_DURATION_SHORT);
|
2016-04-01 03:56:59 +07:00
|
|
|
chip->duration[TPM_MEDIUM] =
|
2015-11-26 04:05:32 +07:00
|
|
|
msecs_to_jiffies(TPM2_DURATION_MEDIUM);
|
2016-04-01 03:56:59 +07:00
|
|
|
chip->duration[TPM_LONG] =
|
2015-11-26 04:05:32 +07:00
|
|
|
msecs_to_jiffies(TPM2_DURATION_LONG);
|
2018-03-10 22:15:45 +07:00
|
|
|
chip->duration[TPM_LONG_LONG] =
|
|
|
|
msecs_to_jiffies(TPM2_DURATION_LONG_LONG);
|
2016-10-27 05:28:44 +07:00
|
|
|
|
|
|
|
chip->flags |= TPM_CHIP_FLAG_HAVE_TIMEOUTS;
|
2015-11-26 04:05:32 +07:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2017-01-19 19:19:12 +07:00
|
|
|
rc = tpm_getcap(chip, TPM_CAP_PROP_TIS_TIMEOUT, &cap, NULL,
|
|
|
|
sizeof(cap.timeout));
|
2012-11-22 03:54:33 +07:00
|
|
|
if (rc == TPM_ERR_INVALID_POSTINIT) {
|
2017-06-21 14:31:34 +07:00
|
|
|
if (tpm_startup(chip))
|
2012-11-22 03:54:33 +07:00
|
|
|
return rc;
|
|
|
|
|
2016-09-20 03:22:08 +07:00
|
|
|
rc = tpm_getcap(chip, TPM_CAP_PROP_TIS_TIMEOUT, &cap,
|
2017-01-19 19:19:12 +07:00
|
|
|
"attempting to determine the timeouts",
|
|
|
|
sizeof(cap.timeout));
|
2012-11-22 03:54:33 +07:00
|
|
|
}
|
2017-01-19 19:19:12 +07:00
|
|
|
|
2016-11-22 01:31:09 +07:00
|
|
|
if (rc) {
|
|
|
|
dev_err(&chip->dev,
|
|
|
|
"A TPM error (%zd) occurred attempting to determine the timeouts\n",
|
|
|
|
rc);
|
2016-09-20 03:22:08 +07:00
|
|
|
return rc;
|
2016-11-22 01:31:09 +07:00
|
|
|
}
|
2006-04-22 16:37:50 +07:00
|
|
|
|
2017-01-14 04:37:00 +07:00
|
|
|
timeout_old[0] = jiffies_to_usecs(chip->timeout_a);
|
|
|
|
timeout_old[1] = jiffies_to_usecs(chip->timeout_b);
|
|
|
|
timeout_old[2] = jiffies_to_usecs(chip->timeout_c);
|
|
|
|
timeout_old[3] = jiffies_to_usecs(chip->timeout_d);
|
|
|
|
timeout_chip[0] = be32_to_cpu(cap.timeout.a);
|
|
|
|
timeout_chip[1] = be32_to_cpu(cap.timeout.b);
|
|
|
|
timeout_chip[2] = be32_to_cpu(cap.timeout.c);
|
|
|
|
timeout_chip[3] = be32_to_cpu(cap.timeout.d);
|
|
|
|
memcpy(timeout_eff, timeout_chip, sizeof(timeout_eff));
|
2014-05-22 07:26:44 +07:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Provide ability for vendor overrides of timeout values in case
|
|
|
|
* of misreporting.
|
|
|
|
*/
|
|
|
|
if (chip->ops->update_timeouts != NULL)
|
2016-04-01 03:56:59 +07:00
|
|
|
chip->timeout_adjusted =
|
2017-01-14 04:37:00 +07:00
|
|
|
chip->ops->update_timeouts(chip, timeout_eff);
|
2014-05-22 07:26:44 +07:00
|
|
|
|
2016-04-01 03:56:59 +07:00
|
|
|
if (!chip->timeout_adjusted) {
|
2017-01-14 04:37:00 +07:00
|
|
|
/* Restore default if chip reported 0 */
|
|
|
|
int i;
|
2014-05-22 07:26:44 +07:00
|
|
|
|
2017-01-14 04:37:00 +07:00
|
|
|
for (i = 0; i < ARRAY_SIZE(timeout_eff); i++) {
|
|
|
|
if (timeout_eff[i])
|
|
|
|
continue;
|
|
|
|
|
|
|
|
timeout_eff[i] = timeout_old[i];
|
|
|
|
chip->timeout_adjusted = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (timeout_eff[0] != 0 && timeout_eff[0] < 1000) {
|
2014-05-22 07:26:44 +07:00
|
|
|
/* timeouts in msec rather usec */
|
2017-01-14 04:37:00 +07:00
|
|
|
for (i = 0; i != ARRAY_SIZE(timeout_eff); i++)
|
|
|
|
timeout_eff[i] *= 1000;
|
2016-04-01 03:56:59 +07:00
|
|
|
chip->timeout_adjusted = true;
|
2014-05-22 07:26:44 +07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Report adjusted timeouts */
|
2016-04-01 03:56:59 +07:00
|
|
|
if (chip->timeout_adjusted) {
|
2016-03-01 00:29:47 +07:00
|
|
|
dev_info(&chip->dev,
|
2014-05-22 07:26:44 +07:00
|
|
|
HW_ERR "Adjusting reported timeouts: A %lu->%luus B %lu->%luus C %lu->%luus D %lu->%luus\n",
|
2017-01-14 04:37:00 +07:00
|
|
|
timeout_chip[0], timeout_eff[0],
|
|
|
|
timeout_chip[1], timeout_eff[1],
|
|
|
|
timeout_chip[2], timeout_eff[2],
|
|
|
|
timeout_chip[3], timeout_eff[3]);
|
2011-03-30 23:13:27 +07:00
|
|
|
}
|
2014-05-22 07:26:44 +07:00
|
|
|
|
2017-01-14 04:37:00 +07:00
|
|
|
chip->timeout_a = usecs_to_jiffies(timeout_eff[0]);
|
|
|
|
chip->timeout_b = usecs_to_jiffies(timeout_eff[1]);
|
|
|
|
chip->timeout_c = usecs_to_jiffies(timeout_eff[2]);
|
|
|
|
chip->timeout_d = usecs_to_jiffies(timeout_eff[3]);
|
2006-04-22 16:37:50 +07:00
|
|
|
|
2016-09-20 03:22:08 +07:00
|
|
|
rc = tpm_getcap(chip, TPM_CAP_PROP_TIS_DURATION, &cap,
|
2017-01-19 19:19:12 +07:00
|
|
|
"attempting to determine the durations",
|
|
|
|
sizeof(cap.duration));
|
2006-04-22 16:37:50 +07:00
|
|
|
if (rc)
|
2011-11-12 00:57:02 +07:00
|
|
|
return rc;
|
2006-04-22 16:37:50 +07:00
|
|
|
|
2016-04-01 03:56:59 +07:00
|
|
|
chip->duration[TPM_SHORT] =
|
2016-09-20 03:22:08 +07:00
|
|
|
usecs_to_jiffies(be32_to_cpu(cap.duration.tpm_short));
|
2016-04-01 03:56:59 +07:00
|
|
|
chip->duration[TPM_MEDIUM] =
|
2016-09-20 03:22:08 +07:00
|
|
|
usecs_to_jiffies(be32_to_cpu(cap.duration.tpm_medium));
|
2016-04-01 03:56:59 +07:00
|
|
|
chip->duration[TPM_LONG] =
|
2016-09-20 03:22:08 +07:00
|
|
|
usecs_to_jiffies(be32_to_cpu(cap.duration.tpm_long));
|
2018-03-10 22:15:45 +07:00
|
|
|
chip->duration[TPM_LONG_LONG] = 0; /* not used under 1.2 */
|
2011-03-30 23:13:24 +07:00
|
|
|
|
2008-10-16 12:04:35 +07:00
|
|
|
/* The Broadcom BCM0102 chipset in a Dell Latitude D820 gets the above
|
|
|
|
* value wrong and apparently reports msecs rather than usecs. So we
|
|
|
|
* fix up the resulting too-small TPM_SHORT value to make things work.
|
2011-03-30 23:13:24 +07:00
|
|
|
* We also scale the TPM_MEDIUM and -_LONG values by 1000.
|
2008-10-16 12:04:35 +07:00
|
|
|
*/
|
2016-04-01 03:56:59 +07:00
|
|
|
if (chip->duration[TPM_SHORT] < (HZ / 100)) {
|
|
|
|
chip->duration[TPM_SHORT] = HZ;
|
|
|
|
chip->duration[TPM_MEDIUM] *= 1000;
|
|
|
|
chip->duration[TPM_LONG] *= 1000;
|
|
|
|
chip->duration_adjusted = true;
|
2016-03-01 00:29:47 +07:00
|
|
|
dev_info(&chip->dev, "Adjusting TPM timeout parameters.");
|
2011-03-30 23:13:24 +07:00
|
|
|
}
|
2016-10-27 05:28:44 +07:00
|
|
|
|
|
|
|
chip->flags |= TPM_CHIP_FLAG_HAVE_TIMEOUTS;
|
2011-11-12 00:57:02 +07:00
|
|
|
return 0;
|
2006-04-22 16:37:50 +07:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(tpm_get_timeouts);
|
|
|
|
|
2011-11-12 00:57:03 +07:00
|
|
|
#define TPM_ORD_CONTINUE_SELFTEST 83
|
|
|
|
#define CONTINUE_SELFTEST_RESULT_SIZE 10
|
|
|
|
|
2016-09-11 20:05:52 +07:00
|
|
|
static const struct tpm_input_header continue_selftest_header = {
|
2017-05-03 23:19:09 +07:00
|
|
|
.tag = cpu_to_be16(TPM_TAG_RQU_COMMAND),
|
2011-11-12 00:57:03 +07:00
|
|
|
.length = cpu_to_be32(10),
|
|
|
|
.ordinal = cpu_to_be32(TPM_ORD_CONTINUE_SELFTEST),
|
|
|
|
};
|
|
|
|
|
|
|
|
/**
|
|
|
|
* tpm_continue_selftest -- run TPM's selftest
|
|
|
|
* @chip: TPM chip to use
|
|
|
|
*
|
|
|
|
* Returns 0 on success, < 0 in case of fatal error or a value > 0 representing
|
|
|
|
* a TPM error code.
|
|
|
|
*/
|
2011-11-12 00:57:04 +07:00
|
|
|
static int tpm_continue_selftest(struct tpm_chip *chip)
|
2006-04-22 16:37:50 +07:00
|
|
|
{
|
2011-11-12 00:57:03 +07:00
|
|
|
int rc;
|
|
|
|
struct tpm_cmd_t cmd;
|
2006-04-22 16:37:50 +07:00
|
|
|
|
2011-11-12 00:57:03 +07:00
|
|
|
cmd.header.in = continue_selftest_header;
|
2017-01-06 19:03:45 +07:00
|
|
|
rc = tpm_transmit_cmd(chip, NULL, &cmd, CONTINUE_SELFTEST_RESULT_SIZE,
|
|
|
|
0, 0, "continue selftest");
|
2011-11-12 00:57:03 +07:00
|
|
|
return rc;
|
2006-04-22 16:37:50 +07:00
|
|
|
}
|
|
|
|
|
2017-05-03 23:19:10 +07:00
|
|
|
#define TPM_ORDINAL_PCRREAD 21
|
2009-02-03 00:23:44 +07:00
|
|
|
#define READ_PCR_RESULT_SIZE 30
|
2017-01-19 19:19:12 +07:00
|
|
|
#define READ_PCR_RESULT_BODY_SIZE 20
|
2016-09-11 20:05:52 +07:00
|
|
|
static const struct tpm_input_header pcrread_header = {
|
2017-05-03 23:19:09 +07:00
|
|
|
.tag = cpu_to_be16(TPM_TAG_RQU_COMMAND),
|
2009-02-03 00:23:44 +07:00
|
|
|
.length = cpu_to_be32(14),
|
2017-05-03 23:19:10 +07:00
|
|
|
.ordinal = cpu_to_be32(TPM_ORDINAL_PCRREAD)
|
2005-04-17 05:20:36 +07:00
|
|
|
};
|
|
|
|
|
2013-11-27 03:30:41 +07:00
|
|
|
int tpm_pcr_read_dev(struct tpm_chip *chip, int pcr_idx, u8 *res_buf)
|
2009-02-03 00:23:44 +07:00
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
struct tpm_cmd_t cmd;
|
|
|
|
|
|
|
|
cmd.header.in = pcrread_header;
|
|
|
|
cmd.params.pcrread_in.pcr_idx = cpu_to_be32(pcr_idx);
|
2017-01-06 19:03:45 +07:00
|
|
|
rc = tpm_transmit_cmd(chip, NULL, &cmd, READ_PCR_RESULT_SIZE,
|
2017-01-19 19:19:12 +07:00
|
|
|
READ_PCR_RESULT_BODY_SIZE, 0,
|
2014-12-13 02:46:33 +07:00
|
|
|
"attempting to read a pcr value");
|
2009-02-03 00:23:44 +07:00
|
|
|
|
|
|
|
if (rc == 0)
|
|
|
|
memcpy(res_buf, cmd.params.pcrread_out.pcr_result,
|
|
|
|
TPM_DIGEST_SIZE);
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2015-05-30 12:09:04 +07:00
|
|
|
/**
|
2017-11-05 18:16:26 +07:00
|
|
|
* tpm_is_tpm2 - do we a have a TPM2 chip?
|
|
|
|
* @chip: a &struct tpm_chip instance, %NULL for the default chip
|
2015-05-30 12:09:04 +07:00
|
|
|
*
|
2017-11-05 18:16:26 +07:00
|
|
|
* Return:
|
|
|
|
* 1 if we have a TPM2 chip.
|
|
|
|
* 0 if we don't have a TPM2 chip.
|
|
|
|
* A negative number for system errors (errno).
|
2015-05-30 12:09:04 +07:00
|
|
|
*/
|
2017-11-05 18:16:26 +07:00
|
|
|
int tpm_is_tpm2(struct tpm_chip *chip)
|
2015-05-30 12:09:04 +07:00
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
|
2018-06-26 18:06:15 +07:00
|
|
|
chip = tpm_find_get_ops(chip);
|
2017-11-05 18:16:26 +07:00
|
|
|
if (!chip)
|
2015-05-30 12:09:04 +07:00
|
|
|
return -ENODEV;
|
|
|
|
|
|
|
|
rc = (chip->flags & TPM_CHIP_FLAG_TPM2) != 0;
|
|
|
|
|
2016-02-13 10:29:53 +07:00
|
|
|
tpm_put_ops(chip);
|
2015-05-30 12:09:04 +07:00
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(tpm_is_tpm2);
|
|
|
|
|
2009-02-03 00:23:44 +07:00
|
|
|
/**
|
2017-11-05 18:16:26 +07:00
|
|
|
* tpm_pcr_read - read a PCR value from SHA1 bank
|
|
|
|
* @chip: a &struct tpm_chip instance, %NULL for the default chip
|
|
|
|
* @pcr_idx: the PCR to be retrieved
|
|
|
|
* @res_buf: the value of the PCR
|
2009-02-03 00:23:44 +07:00
|
|
|
*
|
2017-11-05 18:16:26 +07:00
|
|
|
* Return: same as with tpm_transmit_cmd()
|
2009-02-03 00:23:44 +07:00
|
|
|
*/
|
2017-11-05 18:16:26 +07:00
|
|
|
int tpm_pcr_read(struct tpm_chip *chip, int pcr_idx, u8 *res_buf)
|
2009-02-03 00:23:44 +07:00
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
|
2018-06-26 18:06:15 +07:00
|
|
|
chip = tpm_find_get_ops(chip);
|
2017-11-05 18:16:26 +07:00
|
|
|
if (!chip)
|
2009-02-03 00:23:44 +07:00
|
|
|
return -ENODEV;
|
2014-12-13 02:46:38 +07:00
|
|
|
if (chip->flags & TPM_CHIP_FLAG_TPM2)
|
|
|
|
rc = tpm2_pcr_read(chip, pcr_idx, res_buf);
|
|
|
|
else
|
|
|
|
rc = tpm_pcr_read_dev(chip, pcr_idx, res_buf);
|
2016-02-13 10:29:53 +07:00
|
|
|
tpm_put_ops(chip);
|
2009-02-03 00:23:44 +07:00
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(tpm_pcr_read);
|
|
|
|
|
2017-05-03 23:19:10 +07:00
|
|
|
#define TPM_ORD_PCR_EXTEND 20
|
2016-11-01 08:05:13 +07:00
|
|
|
#define EXTEND_PCR_RESULT_SIZE 34
|
2017-02-15 23:56:23 +07:00
|
|
|
#define EXTEND_PCR_RESULT_BODY_SIZE 20
|
2016-11-01 08:05:13 +07:00
|
|
|
static const struct tpm_input_header pcrextend_header = {
|
2017-05-03 23:19:09 +07:00
|
|
|
.tag = cpu_to_be16(TPM_TAG_RQU_COMMAND),
|
2016-11-01 08:05:13 +07:00
|
|
|
.length = cpu_to_be32(34),
|
2017-05-03 23:19:10 +07:00
|
|
|
.ordinal = cpu_to_be32(TPM_ORD_PCR_EXTEND)
|
2016-11-01 08:05:13 +07:00
|
|
|
};
|
|
|
|
|
2017-05-04 18:16:47 +07:00
|
|
|
static int tpm1_pcr_extend(struct tpm_chip *chip, int pcr_idx, const u8 *hash,
|
|
|
|
char *log_msg)
|
|
|
|
{
|
|
|
|
struct tpm_buf buf;
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
rc = tpm_buf_init(&buf, TPM_TAG_RQU_COMMAND, TPM_ORD_PCR_EXTEND);
|
|
|
|
if (rc)
|
|
|
|
return rc;
|
|
|
|
|
|
|
|
tpm_buf_append_u32(&buf, pcr_idx);
|
|
|
|
tpm_buf_append(&buf, hash, TPM_DIGEST_SIZE);
|
|
|
|
|
|
|
|
rc = tpm_transmit_cmd(chip, NULL, buf.data, EXTEND_PCR_RESULT_SIZE,
|
|
|
|
EXTEND_PCR_RESULT_BODY_SIZE, 0, log_msg);
|
|
|
|
tpm_buf_destroy(&buf);
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2009-02-03 00:23:44 +07:00
|
|
|
/**
|
2017-11-05 18:16:26 +07:00
|
|
|
* tpm_pcr_extend - extend a PCR value in SHA1 bank.
|
|
|
|
* @chip: a &struct tpm_chip instance, %NULL for the default chip
|
|
|
|
* @pcr_idx: the PCR to be retrieved
|
|
|
|
* @hash: the hash value used to extend the PCR value
|
2009-02-03 00:23:44 +07:00
|
|
|
*
|
2017-11-05 18:16:26 +07:00
|
|
|
* Note: with TPM 2.0 extends also those banks with a known digest size to the
|
|
|
|
* cryto subsystem in order to prevent malicious use of those PCR banks. In the
|
|
|
|
* future we should dynamically determine digest sizes.
|
|
|
|
*
|
|
|
|
* Return: same as with tpm_transmit_cmd()
|
2009-02-03 00:23:44 +07:00
|
|
|
*/
|
2017-11-05 18:16:26 +07:00
|
|
|
int tpm_pcr_extend(struct tpm_chip *chip, int pcr_idx, const u8 *hash)
|
2009-02-03 00:23:44 +07:00
|
|
|
{
|
|
|
|
int rc;
|
2017-01-30 16:59:41 +07:00
|
|
|
struct tpm2_digest digest_list[ARRAY_SIZE(chip->active_banks)];
|
|
|
|
u32 count = 0;
|
|
|
|
int i;
|
2009-02-03 00:23:44 +07:00
|
|
|
|
2018-06-26 18:06:15 +07:00
|
|
|
chip = tpm_find_get_ops(chip);
|
2017-11-05 18:16:26 +07:00
|
|
|
if (!chip)
|
2009-02-03 00:23:44 +07:00
|
|
|
return -ENODEV;
|
|
|
|
|
2014-12-13 02:46:38 +07:00
|
|
|
if (chip->flags & TPM_CHIP_FLAG_TPM2) {
|
2017-01-30 16:59:41 +07:00
|
|
|
memset(digest_list, 0, sizeof(digest_list));
|
|
|
|
|
2017-02-03 17:30:40 +07:00
|
|
|
for (i = 0; i < ARRAY_SIZE(chip->active_banks) &&
|
|
|
|
chip->active_banks[i] != TPM2_ALG_ERROR; i++) {
|
2017-01-30 16:59:41 +07:00
|
|
|
digest_list[i].alg_id = chip->active_banks[i];
|
|
|
|
memcpy(digest_list[i].digest, hash, TPM_DIGEST_SIZE);
|
|
|
|
count++;
|
|
|
|
}
|
|
|
|
|
|
|
|
rc = tpm2_pcr_extend(chip, pcr_idx, count, digest_list);
|
2016-02-13 10:29:53 +07:00
|
|
|
tpm_put_ops(chip);
|
2014-12-13 02:46:38 +07:00
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2017-05-04 18:16:47 +07:00
|
|
|
rc = tpm1_pcr_extend(chip, pcr_idx, hash,
|
|
|
|
"attempting extend a PCR value");
|
2016-02-13 10:29:53 +07:00
|
|
|
tpm_put_ops(chip);
|
2009-02-03 00:23:44 +07:00
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(tpm_pcr_extend);
|
|
|
|
|
2011-11-12 00:57:04 +07:00
|
|
|
/**
|
|
|
|
* tpm_do_selftest - have the TPM continue its selftest and wait until it
|
|
|
|
* can receive further commands
|
|
|
|
* @chip: TPM chip to use
|
|
|
|
*
|
|
|
|
* Returns 0 on success, < 0 in case of fatal error or a value > 0 representing
|
|
|
|
* a TPM error code.
|
|
|
|
*/
|
|
|
|
int tpm_do_selftest(struct tpm_chip *chip)
|
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
unsigned int loops;
|
2012-11-22 04:15:54 +07:00
|
|
|
unsigned int delay_msec = 100;
|
2011-11-12 00:57:04 +07:00
|
|
|
unsigned long duration;
|
2016-06-17 18:12:20 +07:00
|
|
|
u8 dummy[TPM_DIGEST_SIZE];
|
2011-11-12 00:57:04 +07:00
|
|
|
|
tpm: cleanup checkpatch warnings
before we rename the file it might be a good idea to cleanup the long
persisting checkpatch warnings.
Since everything is really trivial, splitting the patch up would only
result in noise.
For the interested reader - here the checkpatch warnings:
(regrouped for easer readability)
ERROR: trailing whitespace
+ * Specifications at www.trustedcomputinggroup.org^I $
+ * $
+^I/* $
+^I parameters (RSA 12->bytes: keybit, #primes, expbit) $
WARNING: unnecessary whitespace before a quoted newline
+ "invalid count value %x %zx \n", count, bufsiz);
ERROR: do not use assignment in if condition
+ if ((rc = chip->vendor.send(chip, (u8 *) buf, count)) < 0) {
ERROR: space required after that ',' (ctx:VxV)
+ len = tpm_transmit(chip,(u8 *) cmd, len);
^
ERROR: "foo * bar" should be "foo *bar"
+ssize_t tpm_show_enabled(struct device * dev, struct device_attribute * attr,
+ssize_t tpm_show_enabled(struct device * dev, struct device_attribute * attr,
+ssize_t tpm_show_active(struct device * dev, struct device_attribute * attr,
+ssize_t tpm_show_active(struct device * dev, struct device_attribute * attr,
+ssize_t tpm_show_owned(struct device * dev, struct device_attribute * attr,
+ssize_t tpm_show_owned(struct device * dev, struct device_attribute * attr,
+ssize_t tpm_show_temp_deactivated(struct device * dev,
+ struct device_attribute * attr, char *buf)
WARNING: please, no space before tabs
+ * @chip_num: ^Itpm idx # or ANY$
+ * @res_buf: ^ITPM_PCR value$
+ * ^I^Isize of res_buf is 20 bytes (or NULL if you don't care)$
+ * @chip_num: ^Itpm idx # or AN&$
+ * @hash: ^Ihash value used to extend pcr value$
ERROR: code indent should use tabs where possible
+^I TPM_ORD_CONTINUE_SELFTEST);$
WARNING: line over 80 characters
+static bool wait_for_tpm_stat_cond(struct tpm_chip *chip, u8 mask, bool check_cancel,
ERROR: trailing whitespace
+ * Called from tpm_<specific>.c probe function only for devices $
total: 16 errors, 7 warnings, 1554 lines checked
Signed-off-by: Peter Huewe <peterhuewe@gmx.de>
2013-10-22 05:29:14 +07:00
|
|
|
duration = tpm_calc_ordinal_duration(chip, TPM_ORD_CONTINUE_SELFTEST);
|
2011-11-12 00:57:04 +07:00
|
|
|
|
|
|
|
loops = jiffies_to_msecs(duration) / delay_msec;
|
|
|
|
|
|
|
|
rc = tpm_continue_selftest(chip);
|
2018-03-20 14:36:40 +07:00
|
|
|
if (rc == TPM_ERR_INVALID_POSTINIT) {
|
|
|
|
chip->flags |= TPM_CHIP_FLAG_ALWAYS_POWERED;
|
|
|
|
dev_info(&chip->dev, "TPM not ready (%d)\n", rc);
|
|
|
|
}
|
2011-11-12 00:57:04 +07:00
|
|
|
/* This may fail if there was no TPM driver during a suspend/resume
|
|
|
|
* cycle; some may return 10 (BAD_ORDINAL), others 28 (FAILEDSELFTEST)
|
|
|
|
*/
|
|
|
|
if (rc)
|
|
|
|
return rc;
|
|
|
|
|
|
|
|
do {
|
2012-04-25 03:38:17 +07:00
|
|
|
/* Attempt to read a PCR value */
|
2016-06-17 18:12:20 +07:00
|
|
|
rc = tpm_pcr_read_dev(chip, 0, dummy);
|
|
|
|
|
2012-11-22 04:15:54 +07:00
|
|
|
/* Some buggy TPMs will not respond to tpm_tis_ready() for
|
|
|
|
* around 300ms while the self test is ongoing, keep trying
|
|
|
|
* until the self test duration expires. */
|
|
|
|
if (rc == -ETIME) {
|
2016-03-01 00:29:47 +07:00
|
|
|
dev_info(
|
|
|
|
&chip->dev, HW_ERR
|
|
|
|
"TPM command timed out during continue self test");
|
2017-08-15 01:09:16 +07:00
|
|
|
tpm_msleep(delay_msec);
|
2012-11-22 04:15:54 +07:00
|
|
|
continue;
|
|
|
|
}
|
2012-04-25 03:38:17 +07:00
|
|
|
|
2012-01-18 10:07:30 +07:00
|
|
|
if (rc == TPM_ERR_DISABLED || rc == TPM_ERR_DEACTIVATED) {
|
2016-03-01 00:29:47 +07:00
|
|
|
dev_info(&chip->dev,
|
2012-01-18 10:07:30 +07:00
|
|
|
"TPM is disabled/deactivated (0x%X)\n", rc);
|
|
|
|
/* TPM is disabled and/or deactivated; driver can
|
|
|
|
* proceed and TPM does handle commands for
|
|
|
|
* suspend/resume correctly
|
|
|
|
*/
|
|
|
|
return 0;
|
|
|
|
}
|
2011-11-12 00:57:04 +07:00
|
|
|
if (rc != TPM_WARN_DOING_SELFTEST)
|
|
|
|
return rc;
|
2017-08-15 01:09:16 +07:00
|
|
|
tpm_msleep(delay_msec);
|
2011-11-12 00:57:04 +07:00
|
|
|
} while (--loops > 0);
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(tpm_do_selftest);
|
|
|
|
|
2016-07-13 00:41:49 +07:00
|
|
|
/**
|
|
|
|
* tpm1_auto_startup - Perform the standard automatic TPM initialization
|
|
|
|
* sequence
|
|
|
|
* @chip: TPM chip to use
|
|
|
|
*
|
|
|
|
* Returns 0 on success, < 0 in case of fatal error.
|
|
|
|
*/
|
|
|
|
int tpm1_auto_startup(struct tpm_chip *chip)
|
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
rc = tpm_get_timeouts(chip);
|
|
|
|
if (rc)
|
|
|
|
goto out;
|
|
|
|
rc = tpm_do_selftest(chip);
|
|
|
|
if (rc) {
|
|
|
|
dev_err(&chip->dev, "TPM self test failed\n");
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
out:
|
|
|
|
if (rc > 0)
|
|
|
|
rc = -ENODEV;
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2017-11-05 18:16:26 +07:00
|
|
|
/**
|
|
|
|
* tpm_send - send a TPM command
|
|
|
|
* @chip: a &struct tpm_chip instance, %NULL for the default chip
|
|
|
|
* @cmd: a TPM command buffer
|
|
|
|
* @buflen: the length of the TPM command buffer
|
|
|
|
*
|
|
|
|
* Return: same as with tpm_transmit_cmd()
|
|
|
|
*/
|
|
|
|
int tpm_send(struct tpm_chip *chip, void *cmd, size_t buflen)
|
2010-11-24 06:54:16 +07:00
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
|
2018-06-26 18:06:15 +07:00
|
|
|
chip = tpm_find_get_ops(chip);
|
2017-11-05 18:16:26 +07:00
|
|
|
if (!chip)
|
2010-11-24 06:54:16 +07:00
|
|
|
return -ENODEV;
|
|
|
|
|
2017-01-06 19:03:45 +07:00
|
|
|
rc = tpm_transmit_cmd(chip, NULL, cmd, buflen, 0, 0,
|
2017-11-05 18:16:26 +07:00
|
|
|
"attempting to a send a command");
|
2016-02-13 10:29:53 +07:00
|
|
|
tpm_put_ops(chip);
|
2010-11-24 06:54:16 +07:00
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(tpm_send);
|
|
|
|
|
2017-05-03 23:19:10 +07:00
|
|
|
#define TPM_ORD_SAVESTATE 152
|
2010-03-25 10:55:32 +07:00
|
|
|
#define SAVESTATE_RESULT_SIZE 10
|
|
|
|
|
2016-09-11 20:05:52 +07:00
|
|
|
static const struct tpm_input_header savestate_header = {
|
2017-05-03 23:19:09 +07:00
|
|
|
.tag = cpu_to_be16(TPM_TAG_RQU_COMMAND),
|
2010-03-25 10:55:32 +07:00
|
|
|
.length = cpu_to_be32(10),
|
2017-05-03 23:19:10 +07:00
|
|
|
.ordinal = cpu_to_be32(TPM_ORD_SAVESTATE)
|
2010-03-25 10:55:32 +07:00
|
|
|
};
|
|
|
|
|
2005-04-17 05:20:36 +07:00
|
|
|
/*
|
|
|
|
* We are about to suspend. Save the TPM state
|
|
|
|
* so that it can be restored.
|
|
|
|
*/
|
2012-07-07 00:09:01 +07:00
|
|
|
int tpm_pm_suspend(struct device *dev)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
2016-05-11 22:28:27 +07:00
|
|
|
struct tpm_chip *chip = dev_get_drvdata(dev);
|
2010-03-25 10:55:32 +07:00
|
|
|
struct tpm_cmd_t cmd;
|
2013-03-18 04:56:39 +07:00
|
|
|
int rc, try;
|
2010-03-25 10:55:32 +07:00
|
|
|
|
|
|
|
u8 dummy_hash[TPM_DIGEST_SIZE] = { 0 };
|
2008-01-14 15:55:12 +07:00
|
|
|
|
2005-04-17 05:20:36 +07:00
|
|
|
if (chip == NULL)
|
|
|
|
return -ENODEV;
|
|
|
|
|
2017-06-27 17:27:24 +07:00
|
|
|
if (chip->flags & TPM_CHIP_FLAG_ALWAYS_POWERED)
|
|
|
|
return 0;
|
|
|
|
|
2015-01-29 12:43:47 +07:00
|
|
|
if (chip->flags & TPM_CHIP_FLAG_TPM2) {
|
|
|
|
tpm2_shutdown(chip, TPM2_SU_STATE);
|
|
|
|
return 0;
|
|
|
|
}
|
2014-12-13 02:46:39 +07:00
|
|
|
|
2010-03-25 10:55:32 +07:00
|
|
|
/* for buggy tpm, flush pcrs with extend to selected dummy */
|
2017-05-04 18:16:47 +07:00
|
|
|
if (tpm_suspend_pcr)
|
|
|
|
rc = tpm1_pcr_extend(chip, tpm_suspend_pcr, dummy_hash,
|
|
|
|
"extending dummy pcr before suspend");
|
2010-03-25 10:55:32 +07:00
|
|
|
|
|
|
|
/* now do the actual savestate */
|
2013-03-18 04:56:39 +07:00
|
|
|
for (try = 0; try < TPM_RETRY; try++) {
|
|
|
|
cmd.header.in = savestate_header;
|
2017-01-06 19:03:45 +07:00
|
|
|
rc = tpm_transmit_cmd(chip, NULL, &cmd, SAVESTATE_RESULT_SIZE,
|
|
|
|
0, 0, NULL);
|
2013-03-18 04:56:39 +07:00
|
|
|
|
|
|
|
/*
|
|
|
|
* If the TPM indicates that it is too busy to respond to
|
|
|
|
* this command then retry before giving up. It can take
|
|
|
|
* several seconds for this TPM to be ready.
|
|
|
|
*
|
|
|
|
* This can happen if the TPM has already been sent the
|
|
|
|
* SaveState command before the driver has loaded. TCG 1.2
|
|
|
|
* specification states that any communication after SaveState
|
|
|
|
* may cause the TPM to invalidate previously saved state.
|
|
|
|
*/
|
|
|
|
if (rc != TPM_WARN_RETRY)
|
|
|
|
break;
|
2017-08-15 01:09:16 +07:00
|
|
|
tpm_msleep(TPM_TIMEOUT_RETRY);
|
2013-03-18 04:56:39 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
if (rc)
|
2016-03-01 00:29:47 +07:00
|
|
|
dev_err(&chip->dev,
|
2013-03-18 04:56:39 +07:00
|
|
|
"Error (%d) sending savestate before suspend\n", rc);
|
|
|
|
else if (try > 0)
|
2016-03-01 00:29:47 +07:00
|
|
|
dev_warn(&chip->dev, "TPM savestate took %dms\n",
|
2013-03-18 04:56:39 +07:00
|
|
|
try * TPM_TIMEOUT_RETRY);
|
|
|
|
|
2010-03-25 10:55:32 +07:00
|
|
|
return rc;
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(tpm_pm_suspend);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Resume from a power safe. The BIOS already restored
|
|
|
|
* the TPM state.
|
|
|
|
*/
|
2005-10-31 06:03:25 +07:00
|
|
|
int tpm_pm_resume(struct device *dev)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
2016-05-11 22:28:27 +07:00
|
|
|
struct tpm_chip *chip = dev_get_drvdata(dev);
|
2005-04-17 05:20:36 +07:00
|
|
|
|
|
|
|
if (chip == NULL)
|
|
|
|
return -ENODEV;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(tpm_pm_resume);
|
|
|
|
|
2012-06-08 01:47:14 +07:00
|
|
|
#define TPM_GETRANDOM_RESULT_SIZE 18
|
2016-09-11 20:05:52 +07:00
|
|
|
static const struct tpm_input_header tpm_getrandom_header = {
|
2017-05-03 23:19:09 +07:00
|
|
|
.tag = cpu_to_be16(TPM_TAG_RQU_COMMAND),
|
2012-06-08 01:47:14 +07:00
|
|
|
.length = cpu_to_be32(14),
|
2017-05-03 23:19:10 +07:00
|
|
|
.ordinal = cpu_to_be32(TPM_ORD_GET_RANDOM)
|
2012-06-08 01:47:14 +07:00
|
|
|
};
|
|
|
|
|
|
|
|
/**
|
2017-11-05 18:16:26 +07:00
|
|
|
* tpm_get_random() - get random bytes from the TPM's RNG
|
|
|
|
* @chip: a &struct tpm_chip instance, %NULL for the default chip
|
|
|
|
* @out: destination buffer for the random bytes
|
|
|
|
* @max: the max number of bytes to write to @out
|
2012-06-08 01:47:14 +07:00
|
|
|
*
|
2017-11-05 18:16:26 +07:00
|
|
|
* Return: same as with tpm_transmit_cmd()
|
2012-06-08 01:47:14 +07:00
|
|
|
*/
|
2017-11-05 18:16:26 +07:00
|
|
|
int tpm_get_random(struct tpm_chip *chip, u8 *out, size_t max)
|
2012-06-08 01:47:14 +07:00
|
|
|
{
|
|
|
|
struct tpm_cmd_t tpm_cmd;
|
2017-01-19 19:19:12 +07:00
|
|
|
u32 recd, num_bytes = min_t(u32, max, TPM_MAX_RNG_DATA), rlength;
|
2012-06-08 01:47:14 +07:00
|
|
|
int err, total = 0, retries = 5;
|
|
|
|
u8 *dest = out;
|
|
|
|
|
2014-05-09 18:23:10 +07:00
|
|
|
if (!out || !num_bytes || max > TPM_MAX_RNG_DATA)
|
|
|
|
return -EINVAL;
|
|
|
|
|
2018-06-26 18:06:15 +07:00
|
|
|
chip = tpm_find_get_ops(chip);
|
2017-11-05 18:16:26 +07:00
|
|
|
if (!chip)
|
2012-06-08 01:47:14 +07:00
|
|
|
return -ENODEV;
|
|
|
|
|
2014-12-13 02:46:38 +07:00
|
|
|
if (chip->flags & TPM_CHIP_FLAG_TPM2) {
|
|
|
|
err = tpm2_get_random(chip, out, max);
|
2016-02-13 10:29:53 +07:00
|
|
|
tpm_put_ops(chip);
|
2014-12-13 02:46:38 +07:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2012-06-08 01:47:14 +07:00
|
|
|
do {
|
|
|
|
tpm_cmd.header.in = tpm_getrandom_header;
|
|
|
|
tpm_cmd.params.getrandom_in.num_bytes = cpu_to_be32(num_bytes);
|
|
|
|
|
2017-01-06 19:03:45 +07:00
|
|
|
err = tpm_transmit_cmd(chip, NULL, &tpm_cmd,
|
2016-08-17 02:00:38 +07:00
|
|
|
TPM_GETRANDOM_RESULT_SIZE + num_bytes,
|
2017-01-19 19:19:12 +07:00
|
|
|
offsetof(struct tpm_getrandom_out,
|
|
|
|
rng_data),
|
2016-08-17 02:00:38 +07:00
|
|
|
0, "attempting get random");
|
2012-06-08 01:47:14 +07:00
|
|
|
if (err)
|
|
|
|
break;
|
|
|
|
|
|
|
|
recd = be32_to_cpu(tpm_cmd.params.getrandom_out.rng_data_len);
|
2018-02-09 03:28:08 +07:00
|
|
|
if (recd > num_bytes) {
|
|
|
|
total = -EFAULT;
|
|
|
|
break;
|
|
|
|
}
|
2017-01-19 19:19:12 +07:00
|
|
|
|
|
|
|
rlength = be32_to_cpu(tpm_cmd.header.out.length);
|
2018-09-03 08:01:26 +07:00
|
|
|
if (rlength < TPM_HEADER_SIZE +
|
|
|
|
offsetof(struct tpm_getrandom_out, rng_data) +
|
2017-01-19 19:19:12 +07:00
|
|
|
recd) {
|
|
|
|
total = -EFAULT;
|
|
|
|
break;
|
|
|
|
}
|
2012-06-08 01:47:14 +07:00
|
|
|
memcpy(dest, tpm_cmd.params.getrandom_out.rng_data, recd);
|
|
|
|
|
|
|
|
dest += recd;
|
|
|
|
total += recd;
|
|
|
|
num_bytes -= recd;
|
|
|
|
} while (retries-- && total < max);
|
|
|
|
|
2016-02-13 10:29:53 +07:00
|
|
|
tpm_put_ops(chip);
|
2012-06-08 01:47:14 +07:00
|
|
|
return total ? total : -EIO;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(tpm_get_random);
|
|
|
|
|
2015-05-30 12:09:04 +07:00
|
|
|
/**
|
2017-11-05 18:16:26 +07:00
|
|
|
* tpm_seal_trusted() - seal a trusted key payload
|
|
|
|
* @chip: a &struct tpm_chip instance, %NULL for the default chip
|
|
|
|
* @options: authentication values and other options
|
|
|
|
* @payload: the key data in clear and encrypted form
|
|
|
|
*
|
|
|
|
* Note: only TPM 2.0 chip are supported. TPM 1.x implementation is located in
|
|
|
|
* the keyring subsystem.
|
2015-05-30 12:09:04 +07:00
|
|
|
*
|
2017-11-05 18:16:26 +07:00
|
|
|
* Return: same as with tpm_transmit_cmd()
|
2015-05-30 12:09:04 +07:00
|
|
|
*/
|
2017-11-05 18:16:26 +07:00
|
|
|
int tpm_seal_trusted(struct tpm_chip *chip, struct trusted_key_payload *payload,
|
2015-05-30 12:09:04 +07:00
|
|
|
struct trusted_key_options *options)
|
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
|
2018-06-26 18:06:15 +07:00
|
|
|
chip = tpm_find_get_ops(chip);
|
2017-11-05 18:16:26 +07:00
|
|
|
if (!chip || !(chip->flags & TPM_CHIP_FLAG_TPM2))
|
2015-05-30 12:09:04 +07:00
|
|
|
return -ENODEV;
|
|
|
|
|
|
|
|
rc = tpm2_seal_trusted(chip, payload, options);
|
|
|
|
|
2016-02-13 10:29:53 +07:00
|
|
|
tpm_put_ops(chip);
|
2015-05-30 12:09:04 +07:00
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(tpm_seal_trusted);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* tpm_unseal_trusted() - unseal a trusted key
|
2017-11-05 18:16:26 +07:00
|
|
|
* @chip: a &struct tpm_chip instance, %NULL for the default chip
|
|
|
|
* @options: authentication values and other options
|
|
|
|
* @payload: the key data in clear and encrypted form
|
|
|
|
*
|
|
|
|
* Note: only TPM 2.0 chip are supported. TPM 1.x implementation is located in
|
|
|
|
* the keyring subsystem.
|
2015-05-30 12:09:04 +07:00
|
|
|
*
|
2017-11-05 18:16:26 +07:00
|
|
|
* Return: same as with tpm_transmit_cmd()
|
2015-05-30 12:09:04 +07:00
|
|
|
*/
|
2017-11-05 18:16:26 +07:00
|
|
|
int tpm_unseal_trusted(struct tpm_chip *chip,
|
|
|
|
struct trusted_key_payload *payload,
|
2015-05-30 12:09:04 +07:00
|
|
|
struct trusted_key_options *options)
|
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
|
2018-06-26 18:06:15 +07:00
|
|
|
chip = tpm_find_get_ops(chip);
|
2017-11-05 18:16:26 +07:00
|
|
|
if (!chip || !(chip->flags & TPM_CHIP_FLAG_TPM2))
|
2015-05-30 12:09:04 +07:00
|
|
|
return -ENODEV;
|
|
|
|
|
|
|
|
rc = tpm2_unseal_trusted(chip, payload, options);
|
|
|
|
|
2016-02-13 10:29:53 +07:00
|
|
|
tpm_put_ops(chip);
|
|
|
|
|
2015-05-30 12:09:04 +07:00
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(tpm_unseal_trusted);
|
|
|
|
|
2014-12-13 02:46:37 +07:00
|
|
|
static int __init tpm_init(void)
|
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
tpm_class = class_create(THIS_MODULE, "tpm");
|
|
|
|
if (IS_ERR(tpm_class)) {
|
|
|
|
pr_err("couldn't create tpm class\n");
|
|
|
|
return PTR_ERR(tpm_class);
|
|
|
|
}
|
|
|
|
|
2017-01-04 00:07:32 +07:00
|
|
|
tpmrm_class = class_create(THIS_MODULE, "tpmrm");
|
|
|
|
if (IS_ERR(tpmrm_class)) {
|
|
|
|
pr_err("couldn't create tpmrm class\n");
|
2018-09-11 00:18:33 +07:00
|
|
|
rc = PTR_ERR(tpmrm_class);
|
|
|
|
goto out_destroy_tpm_class;
|
2017-01-04 00:07:32 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
rc = alloc_chrdev_region(&tpm_devt, 0, 2*TPM_NUM_DEVICES, "tpm");
|
2014-12-13 02:46:37 +07:00
|
|
|
if (rc < 0) {
|
|
|
|
pr_err("tpm: failed to allocate char dev region\n");
|
2018-09-11 00:18:33 +07:00
|
|
|
goto out_destroy_tpmrm_class;
|
|
|
|
}
|
|
|
|
|
|
|
|
rc = tpm_dev_common_init();
|
|
|
|
if (rc) {
|
|
|
|
pr_err("tpm: failed to allocate char dev region\n");
|
|
|
|
goto out_unreg_chrdev;
|
2014-12-13 02:46:37 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
2018-09-11 00:18:33 +07:00
|
|
|
|
|
|
|
out_unreg_chrdev:
|
|
|
|
unregister_chrdev_region(tpm_devt, 2 * TPM_NUM_DEVICES);
|
|
|
|
out_destroy_tpmrm_class:
|
|
|
|
class_destroy(tpmrm_class);
|
|
|
|
out_destroy_tpm_class:
|
|
|
|
class_destroy(tpm_class);
|
|
|
|
|
|
|
|
return rc;
|
2014-12-13 02:46:37 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
static void __exit tpm_exit(void)
|
|
|
|
{
|
2016-02-29 20:53:02 +07:00
|
|
|
idr_destroy(&dev_nums_idr);
|
2014-12-13 02:46:37 +07:00
|
|
|
class_destroy(tpm_class);
|
2017-01-04 00:07:32 +07:00
|
|
|
class_destroy(tpmrm_class);
|
|
|
|
unregister_chrdev_region(tpm_devt, 2*TPM_NUM_DEVICES);
|
2018-09-11 00:18:33 +07:00
|
|
|
tpm_dev_common_exit();
|
2014-12-13 02:46:37 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
subsys_initcall(tpm_init);
|
|
|
|
module_exit(tpm_exit);
|
|
|
|
|
2005-04-17 05:20:36 +07:00
|
|
|
MODULE_AUTHOR("Leendert van Doorn (leendert@watson.ibm.com)");
|
|
|
|
MODULE_DESCRIPTION("TPM Driver");
|
|
|
|
MODULE_VERSION("2.0");
|
|
|
|
MODULE_LICENSE("GPL");
|