tpm.c revision 1.25 1 1.25 riastrad /* $NetBSD: tpm.c,v 1.25 2022/01/29 12:27:30 riastradh Exp $ */
2 1.13 maxv
3 1.13 maxv /*
4 1.13 maxv * Copyright (c) 2019 The NetBSD Foundation, Inc.
5 1.13 maxv * All rights reserved.
6 1.13 maxv *
7 1.13 maxv * This code is derived from software contributed to The NetBSD Foundation
8 1.13 maxv * by Maxime Villard.
9 1.13 maxv *
10 1.13 maxv * Redistribution and use in source and binary forms, with or without
11 1.13 maxv * modification, are permitted provided that the following conditions
12 1.13 maxv * are met:
13 1.13 maxv * 1. Redistributions of source code must retain the above copyright
14 1.13 maxv * notice, this list of conditions and the following disclaimer.
15 1.13 maxv * 2. Redistributions in binary form must reproduce the above copyright
16 1.13 maxv * notice, this list of conditions and the following disclaimer in the
17 1.13 maxv * documentation and/or other materials provided with the distribution.
18 1.13 maxv *
19 1.13 maxv * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
20 1.13 maxv * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
21 1.13 maxv * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
22 1.13 maxv * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
23 1.13 maxv * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
24 1.13 maxv * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
25 1.13 maxv * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
26 1.13 maxv * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
27 1.13 maxv * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
28 1.13 maxv * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
29 1.13 maxv * POSSIBILITY OF SUCH DAMAGE.
30 1.13 maxv */
31 1.13 maxv
32 1.1 christos /*
33 1.1 christos * Copyright (c) 2008, 2009 Michael Shalayeff
34 1.13 maxv * Copyright (c) 2009, 2010 Hans-Joerg Hoexer
35 1.1 christos * All rights reserved.
36 1.1 christos *
37 1.1 christos * Permission to use, copy, modify, and distribute this software for any
38 1.1 christos * purpose with or without fee is hereby granted, provided that the above
39 1.1 christos * copyright notice and this permission notice appear in all copies.
40 1.1 christos *
41 1.1 christos * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
42 1.1 christos * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
43 1.1 christos * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
44 1.1 christos * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
45 1.1 christos * WHATSOEVER RESULTING FROM LOSS OF MIND, USE, DATA OR PROFITS, WHETHER IN
46 1.1 christos * AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT
47 1.1 christos * OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
48 1.1 christos */
49 1.1 christos
50 1.1 christos #include <sys/cdefs.h>
51 1.25 riastrad __KERNEL_RCSID(0, "$NetBSD: tpm.c,v 1.25 2022/01/29 12:27:30 riastradh Exp $");
52 1.1 christos
53 1.1 christos #include <sys/param.h>
54 1.17 riastrad #include <sys/types.h>
55 1.17 riastrad
56 1.19 riastrad #include <sys/atomic.h>
57 1.17 riastrad #include <sys/bus.h>
58 1.17 riastrad #include <sys/conf.h>
59 1.17 riastrad #include <sys/device.h>
60 1.1 christos #include <sys/kernel.h>
61 1.1 christos #include <sys/malloc.h>
62 1.17 riastrad #include <sys/pmf.h>
63 1.1 christos #include <sys/proc.h>
64 1.17 riastrad #include <sys/systm.h>
65 1.19 riastrad #include <sys/workqueue.h>
66 1.1 christos
67 1.1 christos #include <dev/ic/tpmreg.h>
68 1.1 christos #include <dev/ic/tpmvar.h>
69 1.1 christos
70 1.12 riastrad #include "ioconf.h"
71 1.12 riastrad
72 1.15 maxv CTASSERT(sizeof(struct tpm_header) == 10);
73 1.15 maxv
74 1.13 maxv #define TPM_BUFSIZ 1024
75 1.14 maxv
76 1.13 maxv #define TPM_PARAM_SIZE 0x0001 /* that's a flag */
77 1.13 maxv
78 1.13 maxv /* Timeouts. */
79 1.13 maxv #define TPM_ACCESS_TMO 2000 /* 2sec */
80 1.13 maxv #define TPM_READY_TMO 2000 /* 2sec */
81 1.13 maxv #define TPM_READ_TMO 2000 /* 2sec */
82 1.13 maxv #define TPM_BURST_TMO 2000 /* 2sec */
83 1.13 maxv
84 1.13 maxv #define TPM_CAPS_REQUIRED \
85 1.13 maxv (TPM_INTF_DATA_AVAIL_INT|TPM_INTF_LOCALITY_CHANGE_INT| \
86 1.13 maxv TPM_INTF_INT_LEVEL_LOW)
87 1.1 christos
88 1.13 maxv static inline int
89 1.13 maxv tpm_tmotohz(int tmo)
90 1.1 christos {
91 1.13 maxv struct timeval tv;
92 1.1 christos
93 1.13 maxv tv.tv_sec = tmo / 1000;
94 1.13 maxv tv.tv_usec = 1000 * (tmo % 1000);
95 1.1 christos
96 1.13 maxv return tvtohz(&tv);
97 1.1 christos }
98 1.1 christos
99 1.13 maxv static int
100 1.1 christos tpm_getburst(struct tpm_softc *sc)
101 1.1 christos {
102 1.1 christos int burst, to, rv;
103 1.1 christos
104 1.1 christos to = tpm_tmotohz(TPM_BURST_TMO);
105 1.1 christos
106 1.13 maxv while (to--) {
107 1.1 christos /*
108 1.13 maxv * Burst count is in bits 23:8, so read the two higher bytes.
109 1.1 christos */
110 1.1 christos burst = bus_space_read_1(sc->sc_bt, sc->sc_bh, TPM_STS + 1);
111 1.1 christos burst |= bus_space_read_1(sc->sc_bt, sc->sc_bh, TPM_STS + 2)
112 1.1 christos << 8;
113 1.13 maxv
114 1.1 christos if (burst)
115 1.1 christos return burst;
116 1.1 christos
117 1.14 maxv rv = tsleep(sc, PCATCH, "tpm_getburst", 1);
118 1.1 christos if (rv && rv != EWOULDBLOCK) {
119 1.1 christos return 0;
120 1.1 christos }
121 1.1 christos }
122 1.1 christos
123 1.1 christos return 0;
124 1.1 christos }
125 1.1 christos
126 1.13 maxv static inline uint8_t
127 1.1 christos tpm_status(struct tpm_softc *sc)
128 1.1 christos {
129 1.13 maxv return bus_space_read_1(sc->sc_bt, sc->sc_bh, TPM_STS) &
130 1.13 maxv TPM_STS_STATUS_BITS;
131 1.1 christos }
132 1.1 christos
133 1.13 maxv /* -------------------------------------------------------------------------- */
134 1.1 christos
135 1.15 maxv static bool
136 1.15 maxv tpm12_suspend(struct tpm_softc *sc)
137 1.15 maxv {
138 1.15 maxv static const uint8_t command[10] = {
139 1.15 maxv 0x00, 0xC1, /* TPM_TAG_RQU_COMMAND */
140 1.15 maxv 0x00, 0x00, 0x00, 10, /* Length in bytes */
141 1.15 maxv 0x00, 0x00, 0x00, 0x98 /* TPM_ORD_SaveState */
142 1.15 maxv };
143 1.15 maxv struct tpm_header response;
144 1.24 riastrad size_t nread;
145 1.24 riastrad bool endwrite = false, endread = false;
146 1.24 riastrad int error;
147 1.24 riastrad
148 1.24 riastrad /*
149 1.24 riastrad * Write the command.
150 1.24 riastrad */
151 1.24 riastrad error = (*sc->sc_intf->start)(sc, UIO_WRITE);
152 1.24 riastrad if (error) {
153 1.24 riastrad device_printf(sc->sc_dev, "start write failed: %d", error);
154 1.24 riastrad goto out;
155 1.24 riastrad }
156 1.24 riastrad
157 1.24 riastrad endwrite = true;
158 1.24 riastrad
159 1.24 riastrad error = (*sc->sc_intf->write)(sc, &command, sizeof(command));
160 1.24 riastrad if (error) {
161 1.24 riastrad device_printf(sc->sc_dev, "write TPM_ORD_SaveState failed: %d",
162 1.24 riastrad error);
163 1.24 riastrad goto out;
164 1.24 riastrad }
165 1.24 riastrad
166 1.24 riastrad endwrite = false;
167 1.24 riastrad
168 1.24 riastrad error = (*sc->sc_intf->end)(sc, UIO_WRITE, 0);
169 1.24 riastrad if (error) {
170 1.24 riastrad device_printf(sc->sc_dev, "end write failed: %d", error);
171 1.24 riastrad goto out;
172 1.24 riastrad }
173 1.24 riastrad
174 1.24 riastrad /*
175 1.24 riastrad * Read the response -- just the header; we don't expect a
176 1.24 riastrad * payload.
177 1.24 riastrad */
178 1.24 riastrad error = (*sc->sc_intf->start)(sc, UIO_READ);
179 1.24 riastrad if (error) {
180 1.24 riastrad device_printf(sc->sc_dev, "start read failed: %d", error);
181 1.24 riastrad goto out;
182 1.24 riastrad }
183 1.24 riastrad
184 1.24 riastrad endread = true;
185 1.24 riastrad
186 1.24 riastrad error = (*sc->sc_intf->read)(sc, &response, sizeof(response), &nread,
187 1.24 riastrad 0);
188 1.24 riastrad if (error) {
189 1.24 riastrad device_printf(sc->sc_dev, "read failed: %d", error);
190 1.24 riastrad goto out;
191 1.24 riastrad }
192 1.24 riastrad if (nread != sizeof(response)) {
193 1.24 riastrad device_printf(sc->sc_dev, "short header read: %zu", nread);
194 1.24 riastrad goto out;
195 1.24 riastrad }
196 1.24 riastrad
197 1.24 riastrad endread = false;
198 1.24 riastrad
199 1.24 riastrad error = (*sc->sc_intf->end)(sc, UIO_READ, 0);
200 1.24 riastrad if (error) {
201 1.24 riastrad device_printf(sc->sc_dev, "end read failed: %d", error);
202 1.24 riastrad goto out;
203 1.24 riastrad }
204 1.24 riastrad
205 1.24 riastrad /*
206 1.24 riastrad * Verify the response looks reasonable.
207 1.24 riastrad */
208 1.25 riastrad if (be16toh(response.tag) != TPM_TAG_RSP_COMMAND ||
209 1.25 riastrad be32toh(response.length) != sizeof(response) ||
210 1.25 riastrad be32toh(response.code) != 0) {
211 1.24 riastrad device_printf(sc->sc_dev,
212 1.24 riastrad "TPM_ORD_SaveState failed: tag=0x%x length=0x%x code=0x%x",
213 1.25 riastrad be16toh(response.tag),
214 1.25 riastrad be32toh(response.length),
215 1.25 riastrad be32toh(response.code));
216 1.24 riastrad error = EIO;
217 1.24 riastrad goto out;
218 1.24 riastrad }
219 1.24 riastrad
220 1.24 riastrad /* Success! */
221 1.24 riastrad error = 0;
222 1.15 maxv
223 1.24 riastrad out: if (endwrite)
224 1.24 riastrad error = (*sc->sc_intf->end)(sc, UIO_WRITE, error);
225 1.24 riastrad if (endread)
226 1.24 riastrad error = (*sc->sc_intf->end)(sc, UIO_READ, error);
227 1.24 riastrad if (error)
228 1.15 maxv return false;
229 1.15 maxv return true;
230 1.15 maxv }
231 1.1 christos
232 1.15 maxv static bool
233 1.15 maxv tpm20_suspend(struct tpm_softc *sc)
234 1.1 christos {
235 1.15 maxv static const uint8_t command[12] = {
236 1.15 maxv 0x80, 0x01, /* TPM_ST_NO_SESSIONS */
237 1.15 maxv 0x00, 0x00, 0x00, 12, /* Length in bytes */
238 1.15 maxv 0x00, 0x00, 0x01, 0x45, /* TPM_CC_Shutdown */
239 1.15 maxv 0x00, 0x01 /* TPM_SU_STATE */
240 1.1 christos };
241 1.15 maxv struct tpm_header response;
242 1.24 riastrad size_t nread;
243 1.24 riastrad bool endwrite = false, endread = false;
244 1.24 riastrad int error;
245 1.24 riastrad
246 1.24 riastrad /*
247 1.24 riastrad * Write the command.
248 1.24 riastrad */
249 1.24 riastrad error = (*sc->sc_intf->start)(sc, UIO_WRITE);
250 1.24 riastrad if (error) {
251 1.24 riastrad device_printf(sc->sc_dev, "start write failed: %d", error);
252 1.24 riastrad goto out;
253 1.24 riastrad }
254 1.24 riastrad
255 1.24 riastrad endwrite = true;
256 1.24 riastrad
257 1.24 riastrad error = (*sc->sc_intf->write)(sc, &command, sizeof(command));
258 1.24 riastrad if (error) {
259 1.24 riastrad device_printf(sc->sc_dev, "write TPM_ORD_SaveState failed: %d",
260 1.24 riastrad error);
261 1.24 riastrad goto out;
262 1.24 riastrad }
263 1.1 christos
264 1.24 riastrad endwrite = false;
265 1.24 riastrad
266 1.24 riastrad error = (*sc->sc_intf->end)(sc, UIO_WRITE, 0);
267 1.24 riastrad if (error) {
268 1.24 riastrad device_printf(sc->sc_dev, "end write failed: %d", error);
269 1.24 riastrad goto out;
270 1.24 riastrad }
271 1.24 riastrad
272 1.24 riastrad /*
273 1.24 riastrad * Read the response -- just the header; we don't expect a
274 1.24 riastrad * payload.
275 1.24 riastrad */
276 1.24 riastrad error = (*sc->sc_intf->start)(sc, UIO_READ);
277 1.24 riastrad if (error) {
278 1.24 riastrad device_printf(sc->sc_dev, "start read failed: %d", error);
279 1.24 riastrad goto out;
280 1.24 riastrad }
281 1.24 riastrad
282 1.24 riastrad endread = true;
283 1.24 riastrad
284 1.24 riastrad error = (*sc->sc_intf->read)(sc, &response, sizeof(response), &nread,
285 1.24 riastrad 0);
286 1.24 riastrad if (error) {
287 1.24 riastrad device_printf(sc->sc_dev, "read failed: %d", error);
288 1.24 riastrad goto out;
289 1.24 riastrad }
290 1.24 riastrad if (nread != sizeof(response)) {
291 1.24 riastrad device_printf(sc->sc_dev, "short header read: %zu", nread);
292 1.24 riastrad goto out;
293 1.24 riastrad }
294 1.24 riastrad
295 1.24 riastrad endread = false;
296 1.24 riastrad
297 1.24 riastrad error = (*sc->sc_intf->end)(sc, UIO_READ, 0);
298 1.24 riastrad if (error) {
299 1.24 riastrad device_printf(sc->sc_dev, "end read failed: %d", error);
300 1.24 riastrad goto out;
301 1.24 riastrad }
302 1.24 riastrad
303 1.24 riastrad /*
304 1.24 riastrad * Verify the response looks reasonable.
305 1.24 riastrad */
306 1.25 riastrad if (be16toh(response.tag) != TPM2_ST_NO_SESSIONS ||
307 1.25 riastrad be32toh(response.length) != sizeof(response) ||
308 1.25 riastrad be32toh(response.code) != TPM2_RC_SUCCESS) {
309 1.24 riastrad device_printf(sc->sc_dev,
310 1.24 riastrad "TPM_CC_Shutdown failed: tag=0x%x length=0x%x code=0x%x",
311 1.25 riastrad be16toh(response.tag),
312 1.25 riastrad be32toh(response.length),
313 1.25 riastrad be32toh(response.code));
314 1.24 riastrad error = EIO;
315 1.24 riastrad goto out;
316 1.24 riastrad }
317 1.24 riastrad
318 1.24 riastrad /* Success! */
319 1.24 riastrad error = 0;
320 1.24 riastrad
321 1.24 riastrad out: if (endwrite)
322 1.24 riastrad error = (*sc->sc_intf->end)(sc, UIO_WRITE, error);
323 1.24 riastrad if (endread)
324 1.24 riastrad error = (*sc->sc_intf->end)(sc, UIO_READ, error);
325 1.24 riastrad if (error)
326 1.15 maxv return false;
327 1.7 christos return true;
328 1.1 christos }
329 1.1 christos
330 1.1 christos bool
331 1.15 maxv tpm_suspend(device_t dev, const pmf_qual_t *qual)
332 1.1 christos {
333 1.15 maxv struct tpm_softc *sc = device_private(dev);
334 1.15 maxv
335 1.15 maxv switch (sc->sc_ver) {
336 1.15 maxv case TPM_1_2:
337 1.15 maxv return tpm12_suspend(sc);
338 1.15 maxv case TPM_2_0:
339 1.15 maxv return tpm20_suspend(sc);
340 1.15 maxv default:
341 1.15 maxv panic("%s: impossible", __func__);
342 1.15 maxv }
343 1.15 maxv }
344 1.15 maxv
345 1.15 maxv bool
346 1.15 maxv tpm_resume(device_t dev, const pmf_qual_t *qual)
347 1.15 maxv {
348 1.15 maxv /*
349 1.15 maxv * Don't do anything, the BIOS is supposed to restore the previously
350 1.15 maxv * saved state.
351 1.15 maxv */
352 1.7 christos return true;
353 1.1 christos }
354 1.1 christos
355 1.13 maxv /* -------------------------------------------------------------------------- */
356 1.13 maxv
357 1.13 maxv static int
358 1.14 maxv tpm_poll(struct tpm_softc *sc, uint8_t mask, int to, wchan_t chan)
359 1.1 christos {
360 1.1 christos int rv;
361 1.1 christos
362 1.13 maxv while (((sc->sc_status = tpm_status(sc)) & mask) != mask && to--) {
363 1.14 maxv rv = tsleep(chan, PCATCH, "tpm_poll", 1);
364 1.1 christos if (rv && rv != EWOULDBLOCK) {
365 1.1 christos return rv;
366 1.1 christos }
367 1.1 christos }
368 1.1 christos
369 1.1 christos return 0;
370 1.1 christos }
371 1.1 christos
372 1.13 maxv static int
373 1.13 maxv tpm_waitfor(struct tpm_softc *sc, uint8_t bits, int tmo, wchan_t chan)
374 1.1 christos {
375 1.13 maxv int retry, to, rv;
376 1.13 maxv uint8_t todo;
377 1.1 christos
378 1.14 maxv to = tpm_tmotohz(tmo);
379 1.13 maxv retry = 3;
380 1.13 maxv
381 1.1 christos restart:
382 1.14 maxv todo = bits;
383 1.14 maxv
384 1.1 christos /*
385 1.14 maxv * TPM_STS_VALID has priority over the others.
386 1.1 christos */
387 1.14 maxv if (todo & TPM_STS_VALID) {
388 1.14 maxv if ((rv = tpm_poll(sc, TPM_STS_VALID, to+1, chan)) != 0)
389 1.14 maxv return rv;
390 1.14 maxv todo &= ~TPM_STS_VALID;
391 1.14 maxv }
392 1.14 maxv
393 1.14 maxv if ((rv = tpm_poll(sc, todo, to, chan)) != 0)
394 1.1 christos return rv;
395 1.1 christos
396 1.13 maxv if ((todo & sc->sc_status) != todo) {
397 1.14 maxv if ((retry-- > 0) && (bits & TPM_STS_VALID)) {
398 1.1 christos bus_space_write_1(sc->sc_bt, sc->sc_bh, TPM_STS,
399 1.1 christos TPM_STS_RESP_RETRY);
400 1.1 christos goto restart;
401 1.1 christos }
402 1.1 christos return EIO;
403 1.1 christos }
404 1.1 christos
405 1.1 christos return 0;
406 1.1 christos }
407 1.1 christos
408 1.13 maxv /* -------------------------------------------------------------------------- */
409 1.13 maxv
410 1.13 maxv /*
411 1.16 maxv * TPM using the TIS 1.2 interface.
412 1.13 maxv */
413 1.13 maxv
414 1.16 maxv static int
415 1.16 maxv tpm12_request_locality(struct tpm_softc *sc, int l)
416 1.16 maxv {
417 1.16 maxv uint32_t r;
418 1.16 maxv int to, rv;
419 1.16 maxv
420 1.16 maxv if (l != 0)
421 1.16 maxv return EINVAL;
422 1.16 maxv
423 1.16 maxv if ((bus_space_read_1(sc->sc_bt, sc->sc_bh, TPM_ACCESS) &
424 1.16 maxv (TPM_ACCESS_VALID | TPM_ACCESS_ACTIVE_LOCALITY)) ==
425 1.16 maxv (TPM_ACCESS_VALID | TPM_ACCESS_ACTIVE_LOCALITY))
426 1.16 maxv return 0;
427 1.16 maxv
428 1.16 maxv bus_space_write_1(sc->sc_bt, sc->sc_bh, TPM_ACCESS,
429 1.16 maxv TPM_ACCESS_REQUEST_USE);
430 1.16 maxv
431 1.16 maxv to = tpm_tmotohz(TPM_ACCESS_TMO);
432 1.16 maxv
433 1.16 maxv while ((r = bus_space_read_1(sc->sc_bt, sc->sc_bh, TPM_ACCESS) &
434 1.16 maxv (TPM_ACCESS_VALID | TPM_ACCESS_ACTIVE_LOCALITY)) !=
435 1.16 maxv (TPM_ACCESS_VALID | TPM_ACCESS_ACTIVE_LOCALITY) && to--) {
436 1.16 maxv rv = tsleep(sc->sc_intf->init, PCATCH, "tpm_locality", 1);
437 1.16 maxv if (rv && rv != EWOULDBLOCK) {
438 1.16 maxv return rv;
439 1.16 maxv }
440 1.16 maxv }
441 1.16 maxv
442 1.16 maxv if ((r & (TPM_ACCESS_VALID | TPM_ACCESS_ACTIVE_LOCALITY)) !=
443 1.16 maxv (TPM_ACCESS_VALID | TPM_ACCESS_ACTIVE_LOCALITY)) {
444 1.16 maxv return EBUSY;
445 1.16 maxv }
446 1.16 maxv
447 1.16 maxv return 0;
448 1.16 maxv }
449 1.16 maxv
450 1.16 maxv static int
451 1.13 maxv tpm_tis12_probe(bus_space_tag_t bt, bus_space_handle_t bh)
452 1.13 maxv {
453 1.13 maxv uint32_t cap;
454 1.13 maxv uint8_t reg;
455 1.13 maxv int tmo;
456 1.13 maxv
457 1.13 maxv cap = bus_space_read_4(bt, bh, TPM_INTF_CAPABILITY);
458 1.13 maxv if (cap == 0xffffffff)
459 1.16 maxv return EINVAL;
460 1.13 maxv if ((cap & TPM_CAPS_REQUIRED) != TPM_CAPS_REQUIRED)
461 1.16 maxv return ENOTSUP;
462 1.13 maxv
463 1.13 maxv /* Request locality 0. */
464 1.13 maxv bus_space_write_1(bt, bh, TPM_ACCESS, TPM_ACCESS_REQUEST_USE);
465 1.13 maxv
466 1.13 maxv /* Wait for it to become active. */
467 1.13 maxv tmo = TPM_ACCESS_TMO; /* Milliseconds. */
468 1.13 maxv while ((reg = bus_space_read_1(bt, bh, TPM_ACCESS) &
469 1.13 maxv (TPM_ACCESS_VALID | TPM_ACCESS_ACTIVE_LOCALITY)) !=
470 1.13 maxv (TPM_ACCESS_VALID | TPM_ACCESS_ACTIVE_LOCALITY) && tmo--) {
471 1.13 maxv DELAY(1000); /* 1 millisecond. */
472 1.13 maxv }
473 1.13 maxv if ((reg & (TPM_ACCESS_VALID | TPM_ACCESS_ACTIVE_LOCALITY)) !=
474 1.13 maxv (TPM_ACCESS_VALID | TPM_ACCESS_ACTIVE_LOCALITY)) {
475 1.16 maxv return ETIMEDOUT;
476 1.13 maxv }
477 1.13 maxv
478 1.13 maxv if (bus_space_read_4(bt, bh, TPM_ID) == 0xffffffff)
479 1.16 maxv return EINVAL;
480 1.13 maxv
481 1.16 maxv return 0;
482 1.13 maxv }
483 1.13 maxv
484 1.21 riastrad static int
485 1.21 riastrad tpm12_rng(struct tpm_softc *sc, unsigned *entropybitsp)
486 1.19 riastrad {
487 1.19 riastrad /*
488 1.19 riastrad * TPM Specification Version 1.2, Main Part 3: Commands,
489 1.19 riastrad * Sec. 13.6 TPM_GetRandom
490 1.19 riastrad */
491 1.19 riastrad struct {
492 1.19 riastrad struct tpm_header hdr;
493 1.19 riastrad uint32_t bytesRequested;
494 1.19 riastrad } __packed command;
495 1.19 riastrad struct response {
496 1.19 riastrad struct tpm_header hdr;
497 1.19 riastrad uint32_t randomBytesSize;
498 1.19 riastrad uint8_t bytes[64];
499 1.19 riastrad } __packed response;
500 1.21 riastrad bool endwrite = false, endread = false;
501 1.19 riastrad size_t nread;
502 1.19 riastrad uint16_t tag;
503 1.21 riastrad uint32_t pktlen, code, nbytes, entropybits = 0;
504 1.19 riastrad int rv;
505 1.19 riastrad
506 1.19 riastrad /* Encode the command. */
507 1.19 riastrad memset(&command, 0, sizeof(command));
508 1.19 riastrad command.hdr.tag = htobe16(TPM_TAG_RQU_COMMAND);
509 1.19 riastrad command.hdr.length = htobe32(sizeof(command));
510 1.19 riastrad command.hdr.code = htobe32(TPM_ORD_GetRandom);
511 1.19 riastrad command.bytesRequested = htobe32(sizeof(response.bytes));
512 1.19 riastrad
513 1.19 riastrad /* Write the command. */
514 1.19 riastrad if ((rv = (*sc->sc_intf->start)(sc, UIO_WRITE)) != 0) {
515 1.19 riastrad device_printf(sc->sc_dev, "start write failed, error=%d\n",
516 1.19 riastrad rv);
517 1.19 riastrad goto out;
518 1.19 riastrad }
519 1.19 riastrad endwrite = true;
520 1.19 riastrad if ((rv = (*sc->sc_intf->write)(sc, &command, sizeof(command))) != 0) {
521 1.19 riastrad device_printf(sc->sc_dev, "write failed, error=%d\n", rv);
522 1.19 riastrad goto out;
523 1.19 riastrad }
524 1.19 riastrad rv = (*sc->sc_intf->end)(sc, UIO_WRITE, 0);
525 1.19 riastrad endwrite = false;
526 1.19 riastrad if (rv) {
527 1.19 riastrad device_printf(sc->sc_dev, "end write failed, error=%d\n", rv);
528 1.19 riastrad goto out;
529 1.19 riastrad }
530 1.19 riastrad
531 1.19 riastrad /* Read the response header. */
532 1.19 riastrad if ((rv = (*sc->sc_intf->start)(sc, UIO_READ)) != 0) {
533 1.19 riastrad device_printf(sc->sc_dev, "start write failed, error=%d\n",
534 1.19 riastrad rv);
535 1.19 riastrad goto out;
536 1.19 riastrad }
537 1.19 riastrad endread = true;
538 1.19 riastrad if ((rv = (*sc->sc_intf->read)(sc, &response.hdr, sizeof(response.hdr),
539 1.19 riastrad &nread, 0)) != 0) {
540 1.19 riastrad device_printf(sc->sc_dev, "read failed, error=%d\n", rv);
541 1.19 riastrad goto out;
542 1.19 riastrad }
543 1.19 riastrad
544 1.19 riastrad /* Verify the response header looks sensible. */
545 1.19 riastrad if (nread != sizeof(response.hdr)) {
546 1.19 riastrad device_printf(sc->sc_dev, "read %zu bytes, expected %zu",
547 1.19 riastrad nread, sizeof(response.hdr));
548 1.19 riastrad goto out;
549 1.19 riastrad }
550 1.19 riastrad tag = be16toh(response.hdr.tag);
551 1.19 riastrad pktlen = be32toh(response.hdr.length);
552 1.19 riastrad code = be32toh(response.hdr.code);
553 1.19 riastrad if (tag != TPM_TAG_RSP_COMMAND ||
554 1.19 riastrad pktlen < offsetof(struct response, bytes) ||
555 1.19 riastrad pktlen > sizeof(response) ||
556 1.19 riastrad code != 0) {
557 1.19 riastrad /*
558 1.19 riastrad * If the tpm itself is busy (e.g., it has yet to run a
559 1.19 riastrad * self-test, or it's in a timeout period to defend
560 1.19 riastrad * against brute force attacks), then we can try again
561 1.19 riastrad * later. Otherwise, give up.
562 1.19 riastrad */
563 1.19 riastrad if (code & TPM_NON_FATAL) {
564 1.19 riastrad aprint_debug_dev(sc->sc_dev, "%s: tpm busy, code=%u\n",
565 1.19 riastrad __func__, code & ~TPM_NON_FATAL);
566 1.19 riastrad rv = 0;
567 1.19 riastrad } else if (code == TPM_DEACTIVATED) {
568 1.19 riastrad device_printf(sc->sc_dev, "tpm is deactivated\n");
569 1.19 riastrad rv = ENXIO;
570 1.19 riastrad } else {
571 1.19 riastrad device_printf(sc->sc_dev, "bad tpm response:"
572 1.19 riastrad " tag=%u len=%u code=%u\n", tag, pktlen, code);
573 1.19 riastrad hexdump(aprint_debug, "tpm response header",
574 1.19 riastrad (const void *)&response.hdr,
575 1.19 riastrad sizeof(response.hdr));
576 1.19 riastrad rv = EIO;
577 1.19 riastrad }
578 1.19 riastrad goto out;
579 1.19 riastrad }
580 1.19 riastrad
581 1.19 riastrad /* Read the response payload. */
582 1.19 riastrad if ((rv = (*sc->sc_intf->read)(sc,
583 1.19 riastrad (char *)&response + nread, pktlen - nread,
584 1.19 riastrad NULL, TPM_PARAM_SIZE)) != 0) {
585 1.19 riastrad device_printf(sc->sc_dev, "read failed, error=%d\n", rv);
586 1.19 riastrad goto out;
587 1.19 riastrad }
588 1.19 riastrad endread = false;
589 1.19 riastrad if ((rv = (*sc->sc_intf->end)(sc, UIO_READ, 0)) != 0) {
590 1.19 riastrad device_printf(sc->sc_dev, "end read failed, error=%d\n", rv);
591 1.19 riastrad goto out;
592 1.19 riastrad }
593 1.19 riastrad
594 1.19 riastrad /* Verify the number of bytes read looks sensible. */
595 1.19 riastrad nbytes = be32toh(response.randomBytesSize);
596 1.19 riastrad if (nbytes > pktlen - offsetof(struct response, bytes)) {
597 1.19 riastrad device_printf(sc->sc_dev, "overlong GetRandom length:"
598 1.19 riastrad " %u, max %zu\n",
599 1.19 riastrad nbytes, pktlen - offsetof(struct response, bytes));
600 1.19 riastrad nbytes = pktlen - offsetof(struct response, bytes);
601 1.19 riastrad }
602 1.19 riastrad
603 1.19 riastrad /*
604 1.19 riastrad * Enter the data into the entropy pool. Conservatively (or,
605 1.19 riastrad * perhaps, cargocultily) estimate half a bit of entropy per
606 1.19 riastrad * bit of data.
607 1.19 riastrad */
608 1.21 riastrad CTASSERT(sizeof(response.bytes) <= UINT_MAX/(NBBY/2));
609 1.21 riastrad entropybits = (NBBY/2)*nbytes;
610 1.21 riastrad rnd_add_data(&sc->sc_rnd, response.bytes, nbytes, entropybits);
611 1.21 riastrad
612 1.21 riastrad out: /* End the read or write if still ongoing. */
613 1.21 riastrad if (endread)
614 1.21 riastrad rv = (*sc->sc_intf->end)(sc, UIO_READ, rv);
615 1.21 riastrad if (endwrite)
616 1.21 riastrad rv = (*sc->sc_intf->end)(sc, UIO_WRITE, rv);
617 1.21 riastrad
618 1.21 riastrad *entropybitsp = entropybits;
619 1.21 riastrad return rv;
620 1.21 riastrad }
621 1.21 riastrad
622 1.21 riastrad static int
623 1.21 riastrad tpm20_rng(struct tpm_softc *sc, unsigned *entropybitsp)
624 1.21 riastrad {
625 1.21 riastrad /*
626 1.21 riastrad * Trusted Platform Module Library, Family "2.0", Level 00
627 1.21 riastrad * Revision 01.38, Part 3: Commands, Sec. 16.1 `TPM2_GetRandom'
628 1.21 riastrad *
629 1.21 riastrad * https://trustedcomputinggroup.org/wp-content/uploads/TPM-Rev-2.0-Part-3-Commands-01.38.pdf#page=133
630 1.21 riastrad */
631 1.21 riastrad struct {
632 1.21 riastrad struct tpm_header hdr;
633 1.21 riastrad uint16_t bytesRequested;
634 1.21 riastrad } __packed command;
635 1.21 riastrad struct response {
636 1.21 riastrad struct tpm_header hdr;
637 1.21 riastrad uint16_t randomBytesSize;
638 1.21 riastrad uint8_t bytes[64];
639 1.21 riastrad } __packed response;
640 1.21 riastrad bool endwrite = false, endread = false;
641 1.21 riastrad size_t nread;
642 1.21 riastrad uint16_t tag;
643 1.21 riastrad uint32_t pktlen, code, nbytes, entropybits = 0;
644 1.21 riastrad int rv;
645 1.21 riastrad
646 1.21 riastrad /* Encode the command. */
647 1.21 riastrad memset(&command, 0, sizeof(command));
648 1.21 riastrad command.hdr.tag = htobe16(TPM2_ST_NO_SESSIONS);
649 1.21 riastrad command.hdr.length = htobe32(sizeof(command));
650 1.21 riastrad command.hdr.code = htobe32(TPM2_CC_GetRandom);
651 1.21 riastrad command.bytesRequested = htobe16(sizeof(response.bytes));
652 1.21 riastrad
653 1.21 riastrad /* Write the command. */
654 1.21 riastrad if ((rv = (*sc->sc_intf->start)(sc, UIO_WRITE)) != 0) {
655 1.21 riastrad device_printf(sc->sc_dev, "start write failed, error=%d\n",
656 1.21 riastrad rv);
657 1.21 riastrad goto out;
658 1.21 riastrad }
659 1.21 riastrad endwrite = true;
660 1.21 riastrad if ((rv = (*sc->sc_intf->write)(sc, &command, sizeof(command))) != 0) {
661 1.21 riastrad device_printf(sc->sc_dev, "write failed, error=%d\n", rv);
662 1.21 riastrad goto out;
663 1.21 riastrad }
664 1.21 riastrad rv = (*sc->sc_intf->end)(sc, UIO_WRITE, 0);
665 1.21 riastrad endwrite = false;
666 1.21 riastrad if (rv) {
667 1.21 riastrad device_printf(sc->sc_dev, "end write failed, error=%d\n", rv);
668 1.21 riastrad goto out;
669 1.21 riastrad }
670 1.21 riastrad
671 1.21 riastrad /* Read the response header. */
672 1.21 riastrad if ((rv = (*sc->sc_intf->start)(sc, UIO_READ)) != 0) {
673 1.21 riastrad device_printf(sc->sc_dev, "start write failed, error=%d\n",
674 1.21 riastrad rv);
675 1.21 riastrad goto out;
676 1.21 riastrad }
677 1.21 riastrad endread = true;
678 1.21 riastrad if ((rv = (*sc->sc_intf->read)(sc, &response.hdr, sizeof(response.hdr),
679 1.21 riastrad &nread, 0)) != 0) {
680 1.21 riastrad device_printf(sc->sc_dev, "read failed, error=%d\n", rv);
681 1.21 riastrad goto out;
682 1.21 riastrad }
683 1.21 riastrad
684 1.21 riastrad /* Verify the response header looks sensible. */
685 1.21 riastrad if (nread != sizeof(response.hdr)) {
686 1.21 riastrad device_printf(sc->sc_dev, "read %zu bytes, expected %zu",
687 1.21 riastrad nread, sizeof(response.hdr));
688 1.21 riastrad goto out;
689 1.21 riastrad }
690 1.21 riastrad tag = be16toh(response.hdr.tag);
691 1.21 riastrad pktlen = be32toh(response.hdr.length);
692 1.21 riastrad code = be32toh(response.hdr.code);
693 1.21 riastrad if (tag != TPM2_ST_NO_SESSIONS ||
694 1.21 riastrad pktlen < offsetof(struct response, bytes) ||
695 1.21 riastrad pktlen > sizeof(response) ||
696 1.21 riastrad code != 0) {
697 1.21 riastrad /*
698 1.21 riastrad * If the tpm itself is busy (e.g., it has yet to run a
699 1.21 riastrad * self-test, or it's in a timeout period to defend
700 1.21 riastrad * against brute force attacks), then we can try again
701 1.21 riastrad * later. Otherwise, give up.
702 1.21 riastrad */
703 1.21 riastrad if (code & TPM2_RC_WARN) {
704 1.21 riastrad aprint_debug_dev(sc->sc_dev, "%s: tpm busy,"
705 1.21 riastrad " code=TPM_RC_WARN+0x%x\n",
706 1.21 riastrad __func__, code & ~TPM2_RC_WARN);
707 1.21 riastrad rv = 0;
708 1.21 riastrad } else {
709 1.21 riastrad device_printf(sc->sc_dev, "bad tpm response:"
710 1.21 riastrad " tag=%u len=%u code=0x%x\n", tag, pktlen, code);
711 1.21 riastrad hexdump(aprint_debug, "tpm response header",
712 1.21 riastrad (const void *)&response.hdr,
713 1.21 riastrad sizeof(response.hdr));
714 1.21 riastrad rv = EIO;
715 1.21 riastrad }
716 1.21 riastrad goto out;
717 1.21 riastrad }
718 1.21 riastrad
719 1.21 riastrad /* Read the response payload. */
720 1.21 riastrad if ((rv = (*sc->sc_intf->read)(sc,
721 1.21 riastrad (char *)&response + nread, pktlen - nread,
722 1.21 riastrad NULL, TPM_PARAM_SIZE)) != 0) {
723 1.21 riastrad device_printf(sc->sc_dev, "read failed, error=%d\n", rv);
724 1.21 riastrad goto out;
725 1.21 riastrad }
726 1.21 riastrad endread = false;
727 1.21 riastrad if ((rv = (*sc->sc_intf->end)(sc, UIO_READ, 0)) != 0) {
728 1.21 riastrad device_printf(sc->sc_dev, "end read failed, error=%d\n", rv);
729 1.21 riastrad goto out;
730 1.21 riastrad }
731 1.21 riastrad
732 1.21 riastrad /* Verify the number of bytes read looks sensible. */
733 1.21 riastrad nbytes = be16toh(response.randomBytesSize);
734 1.21 riastrad if (nbytes > pktlen - offsetof(struct response, bytes)) {
735 1.21 riastrad device_printf(sc->sc_dev, "overlong GetRandom length:"
736 1.21 riastrad " %u, max %zu\n",
737 1.21 riastrad nbytes, pktlen - offsetof(struct response, bytes));
738 1.21 riastrad nbytes = pktlen - offsetof(struct response, bytes);
739 1.21 riastrad }
740 1.21 riastrad
741 1.21 riastrad /*
742 1.21 riastrad * Enter the data into the entropy pool. Conservatively (or,
743 1.21 riastrad * perhaps, cargocultily) estimate half a bit of entropy per
744 1.21 riastrad * bit of data.
745 1.21 riastrad */
746 1.21 riastrad CTASSERT(sizeof(response.bytes) <= UINT_MAX/(NBBY/2));
747 1.21 riastrad entropybits = (NBBY/2)*nbytes;
748 1.21 riastrad rnd_add_data(&sc->sc_rnd, response.bytes, nbytes, entropybits);
749 1.21 riastrad
750 1.21 riastrad out: /* End the read or write if still ongoing. */
751 1.21 riastrad if (endread)
752 1.21 riastrad rv = (*sc->sc_intf->end)(sc, UIO_READ, rv);
753 1.21 riastrad if (endwrite)
754 1.21 riastrad rv = (*sc->sc_intf->end)(sc, UIO_WRITE, rv);
755 1.21 riastrad
756 1.21 riastrad *entropybitsp = entropybits;
757 1.21 riastrad return rv;
758 1.21 riastrad }
759 1.21 riastrad
760 1.21 riastrad static void
761 1.21 riastrad tpm_rng_work(struct work *wk, void *cookie)
762 1.21 riastrad {
763 1.21 riastrad struct tpm_softc *sc = cookie;
764 1.21 riastrad unsigned nbytes, entropybits;
765 1.21 riastrad int rv;
766 1.21 riastrad
767 1.21 riastrad /* Acknowledge the request. */
768 1.21 riastrad nbytes = atomic_swap_uint(&sc->sc_rndpending, 0);
769 1.21 riastrad
770 1.24 riastrad /* Lock the tpm while we do I/O transactions with it. */
771 1.21 riastrad mutex_enter(&sc->sc_lock);
772 1.21 riastrad
773 1.21 riastrad /*
774 1.21 riastrad * Issue as many commands as needed to fulfill the request, but
775 1.21 riastrad * stop if anything fails.
776 1.21 riastrad */
777 1.21 riastrad for (; nbytes; nbytes -= MIN(nbytes, MAX(1, entropybits/NBBY))) {
778 1.21 riastrad switch (sc->sc_ver) {
779 1.21 riastrad case TPM_1_2:
780 1.21 riastrad rv = tpm12_rng(sc, &entropybits);
781 1.21 riastrad break;
782 1.21 riastrad case TPM_2_0:
783 1.21 riastrad rv = tpm20_rng(sc, &entropybits);
784 1.21 riastrad break;
785 1.21 riastrad default:
786 1.21 riastrad panic("bad tpm version: %d", sc->sc_ver);
787 1.21 riastrad }
788 1.21 riastrad if (rv)
789 1.21 riastrad break;
790 1.21 riastrad }
791 1.19 riastrad
792 1.21 riastrad /*
793 1.19 riastrad * If the tpm is busted, no sense in trying again -- most
794 1.19 riastrad * likely, it is deactivated, and by the spec it cannot be
795 1.19 riastrad * reactivated until after a reboot.
796 1.19 riastrad */
797 1.19 riastrad if (rv) {
798 1.19 riastrad device_printf(sc->sc_dev, "deactivating entropy source\n");
799 1.23 riastrad atomic_store_relaxed(&sc->sc_rnddisabled, true);
800 1.19 riastrad /* XXX worker thread can't workqueue_destroy its own queue */
801 1.19 riastrad }
802 1.19 riastrad
803 1.24 riastrad /* Relinquish the tpm. */
804 1.19 riastrad mutex_exit(&sc->sc_lock);
805 1.19 riastrad }
806 1.19 riastrad
807 1.19 riastrad static void
808 1.21 riastrad tpm_rng_get(size_t nbytes, void *cookie)
809 1.19 riastrad {
810 1.19 riastrad struct tpm_softc *sc = cookie;
811 1.19 riastrad
812 1.23 riastrad if (atomic_load_relaxed(&sc->sc_rnddisabled))
813 1.23 riastrad return; /* tough */
814 1.21 riastrad if (atomic_swap_uint(&sc->sc_rndpending, MIN(nbytes, UINT_MAX/NBBY))
815 1.21 riastrad == 0)
816 1.19 riastrad workqueue_enqueue(sc->sc_rndwq, &sc->sc_rndwk, NULL);
817 1.19 riastrad }
818 1.19 riastrad
819 1.16 maxv static int
820 1.14 maxv tpm_tis12_init(struct tpm_softc *sc)
821 1.13 maxv {
822 1.16 maxv int rv;
823 1.16 maxv
824 1.14 maxv sc->sc_caps = bus_space_read_4(sc->sc_bt, sc->sc_bh,
825 1.13 maxv TPM_INTF_CAPABILITY);
826 1.13 maxv sc->sc_devid = bus_space_read_4(sc->sc_bt, sc->sc_bh, TPM_ID);
827 1.13 maxv sc->sc_rev = bus_space_read_1(sc->sc_bt, sc->sc_bh, TPM_REV);
828 1.13 maxv
829 1.14 maxv aprint_normal_dev(sc->sc_dev, "device 0x%08x rev 0x%x\n",
830 1.14 maxv sc->sc_devid, sc->sc_rev);
831 1.13 maxv
832 1.16 maxv if ((rv = tpm12_request_locality(sc, 0)) != 0)
833 1.16 maxv return rv;
834 1.13 maxv
835 1.13 maxv /* Abort whatever it thought it was doing. */
836 1.13 maxv bus_space_write_1(sc->sc_bt, sc->sc_bh, TPM_STS, TPM_STS_CMD_READY);
837 1.13 maxv
838 1.19 riastrad /* XXX Run this at higher priority? */
839 1.19 riastrad if ((rv = workqueue_create(&sc->sc_rndwq, device_xname(sc->sc_dev),
840 1.21 riastrad tpm_rng_work, sc, PRI_NONE, IPL_VM, WQ_MPSAFE)) != 0)
841 1.19 riastrad return rv;
842 1.21 riastrad rndsource_setcb(&sc->sc_rnd, tpm_rng_get, sc);
843 1.19 riastrad rnd_attach_source(&sc->sc_rnd, device_xname(sc->sc_dev),
844 1.19 riastrad RND_TYPE_RNG,
845 1.19 riastrad RND_FLAG_COLLECT_VALUE|RND_FLAG_ESTIMATE_VALUE|RND_FLAG_HASCB);
846 1.19 riastrad
847 1.13 maxv return 0;
848 1.13 maxv }
849 1.13 maxv
850 1.16 maxv static int
851 1.14 maxv tpm_tis12_start(struct tpm_softc *sc, int rw)
852 1.1 christos {
853 1.1 christos int rv;
854 1.1 christos
855 1.14 maxv if (rw == UIO_READ) {
856 1.1 christos rv = tpm_waitfor(sc, TPM_STS_DATA_AVAIL | TPM_STS_VALID,
857 1.16 maxv TPM_READ_TMO, sc->sc_intf->read);
858 1.1 christos return rv;
859 1.1 christos }
860 1.1 christos
861 1.13 maxv /* Request the 0th locality. */
862 1.16 maxv if ((rv = tpm12_request_locality(sc, 0)) != 0)
863 1.1 christos return rv;
864 1.1 christos
865 1.13 maxv sc->sc_status = tpm_status(sc);
866 1.13 maxv if (sc->sc_status & TPM_STS_CMD_READY)
867 1.1 christos return 0;
868 1.1 christos
869 1.1 christos /* Abort previous and restart. */
870 1.1 christos bus_space_write_1(sc->sc_bt, sc->sc_bh, TPM_STS, TPM_STS_CMD_READY);
871 1.16 maxv rv = tpm_waitfor(sc, TPM_STS_CMD_READY, TPM_READY_TMO, sc->sc_intf->write);
872 1.13 maxv if (rv)
873 1.1 christos return rv;
874 1.1 christos
875 1.1 christos return 0;
876 1.1 christos }
877 1.1 christos
878 1.16 maxv static int
879 1.3 christos tpm_tis12_read(struct tpm_softc *sc, void *buf, size_t len, size_t *count,
880 1.1 christos int flags)
881 1.1 christos {
882 1.1 christos uint8_t *p = buf;
883 1.1 christos size_t cnt;
884 1.14 maxv int rv, n;
885 1.1 christos
886 1.1 christos cnt = 0;
887 1.1 christos while (len > 0) {
888 1.13 maxv rv = tpm_waitfor(sc, TPM_STS_DATA_AVAIL | TPM_STS_VALID,
889 1.16 maxv TPM_READ_TMO, sc->sc_intf->read);
890 1.13 maxv if (rv)
891 1.1 christos return rv;
892 1.1 christos
893 1.14 maxv n = MIN(len, tpm_getburst(sc));
894 1.14 maxv while (n > 0) {
895 1.1 christos *p++ = bus_space_read_1(sc->sc_bt, sc->sc_bh, TPM_DATA);
896 1.1 christos cnt++;
897 1.14 maxv len--;
898 1.14 maxv n--;
899 1.1 christos }
900 1.1 christos
901 1.1 christos if ((flags & TPM_PARAM_SIZE) == 0 && cnt >= 6)
902 1.1 christos break;
903 1.1 christos }
904 1.1 christos
905 1.1 christos if (count)
906 1.1 christos *count = cnt;
907 1.1 christos
908 1.1 christos return 0;
909 1.1 christos }
910 1.1 christos
911 1.16 maxv static int
912 1.3 christos tpm_tis12_write(struct tpm_softc *sc, const void *buf, size_t len)
913 1.1 christos {
914 1.3 christos const uint8_t *p = buf;
915 1.1 christos size_t cnt;
916 1.1 christos int rv, r;
917 1.1 christos
918 1.3 christos if (len == 0)
919 1.3 christos return 0;
920 1.16 maxv if ((rv = tpm12_request_locality(sc, 0)) != 0)
921 1.1 christos return rv;
922 1.1 christos
923 1.1 christos cnt = 0;
924 1.1 christos while (cnt < len - 1) {
925 1.1 christos for (r = tpm_getburst(sc); r > 0 && cnt < len - 1; r--) {
926 1.1 christos bus_space_write_1(sc->sc_bt, sc->sc_bh, TPM_DATA, *p++);
927 1.1 christos cnt++;
928 1.1 christos }
929 1.1 christos if ((rv = tpm_waitfor(sc, TPM_STS_VALID, TPM_READ_TMO, sc))) {
930 1.1 christos return rv;
931 1.1 christos }
932 1.13 maxv sc->sc_status = tpm_status(sc);
933 1.13 maxv if (!(sc->sc_status & TPM_STS_DATA_EXPECT)) {
934 1.1 christos return EIO;
935 1.1 christos }
936 1.1 christos }
937 1.1 christos
938 1.1 christos bus_space_write_1(sc->sc_bt, sc->sc_bh, TPM_DATA, *p++);
939 1.1 christos cnt++;
940 1.1 christos
941 1.1 christos if ((rv = tpm_waitfor(sc, TPM_STS_VALID, TPM_READ_TMO, sc))) {
942 1.1 christos return rv;
943 1.1 christos }
944 1.13 maxv if ((sc->sc_status & TPM_STS_DATA_EXPECT) != 0) {
945 1.1 christos return EIO;
946 1.1 christos }
947 1.1 christos
948 1.1 christos return 0;
949 1.1 christos }
950 1.1 christos
951 1.16 maxv static int
952 1.14 maxv tpm_tis12_end(struct tpm_softc *sc, int rw, int err)
953 1.1 christos {
954 1.1 christos int rv = 0;
955 1.1 christos
956 1.14 maxv if (rw == UIO_READ) {
957 1.16 maxv rv = tpm_waitfor(sc, TPM_STS_VALID, TPM_READ_TMO, sc->sc_intf->read);
958 1.13 maxv if (rv)
959 1.22 riastrad goto out;
960 1.1 christos
961 1.1 christos /* Still more data? */
962 1.13 maxv sc->sc_status = tpm_status(sc);
963 1.14 maxv if (!err && (sc->sc_status & TPM_STS_DATA_AVAIL)) {
964 1.1 christos rv = EIO;
965 1.1 christos }
966 1.1 christos
967 1.1 christos bus_space_write_1(sc->sc_bt, sc->sc_bh, TPM_STS,
968 1.1 christos TPM_STS_CMD_READY);
969 1.1 christos
970 1.13 maxv /* Release the 0th locality. */
971 1.13 maxv bus_space_write_1(sc->sc_bt, sc->sc_bh, TPM_ACCESS,
972 1.1 christos TPM_ACCESS_ACTIVE_LOCALITY);
973 1.1 christos } else {
974 1.1 christos /* Hungry for more? */
975 1.13 maxv sc->sc_status = tpm_status(sc);
976 1.13 maxv if (!err && (sc->sc_status & TPM_STS_DATA_EXPECT)) {
977 1.1 christos rv = EIO;
978 1.1 christos }
979 1.1 christos
980 1.1 christos bus_space_write_1(sc->sc_bt, sc->sc_bh, TPM_STS,
981 1.1 christos err ? TPM_STS_CMD_READY : TPM_STS_GO);
982 1.1 christos }
983 1.1 christos
984 1.22 riastrad out: return err ? err : rv;
985 1.1 christos }
986 1.1 christos
987 1.16 maxv const struct tpm_intf tpm_intf_tis12 = {
988 1.16 maxv .version = TIS_1_2,
989 1.16 maxv .probe = tpm_tis12_probe,
990 1.16 maxv .init = tpm_tis12_init,
991 1.16 maxv .start = tpm_tis12_start,
992 1.16 maxv .read = tpm_tis12_read,
993 1.16 maxv .write = tpm_tis12_write,
994 1.16 maxv .end = tpm_tis12_end
995 1.16 maxv };
996 1.16 maxv
997 1.13 maxv /* -------------------------------------------------------------------------- */
998 1.1 christos
999 1.13 maxv static dev_type_open(tpmopen);
1000 1.13 maxv static dev_type_close(tpmclose);
1001 1.13 maxv static dev_type_read(tpmread);
1002 1.13 maxv static dev_type_write(tpmwrite);
1003 1.13 maxv static dev_type_ioctl(tpmioctl);
1004 1.1 christos
1005 1.13 maxv const struct cdevsw tpm_cdevsw = {
1006 1.13 maxv .d_open = tpmopen,
1007 1.13 maxv .d_close = tpmclose,
1008 1.13 maxv .d_read = tpmread,
1009 1.13 maxv .d_write = tpmwrite,
1010 1.13 maxv .d_ioctl = tpmioctl,
1011 1.13 maxv .d_stop = nostop,
1012 1.13 maxv .d_tty = notty,
1013 1.13 maxv .d_poll = nopoll,
1014 1.13 maxv .d_mmap = nommap,
1015 1.13 maxv .d_kqfilter = nokqfilter,
1016 1.13 maxv .d_discard = nodiscard,
1017 1.14 maxv .d_flag = D_OTHER | D_MPSAFE,
1018 1.13 maxv };
1019 1.1 christos
1020 1.13 maxv static int
1021 1.1 christos tpmopen(dev_t dev, int flag, int mode, struct lwp *l)
1022 1.1 christos {
1023 1.14 maxv struct tpm_softc *sc = device_lookup_private(&tpm_cd, minor(dev));
1024 1.14 maxv int ret = 0;
1025 1.1 christos
1026 1.13 maxv if (sc == NULL)
1027 1.1 christos return ENXIO;
1028 1.1 christos
1029 1.14 maxv mutex_enter(&sc->sc_lock);
1030 1.14 maxv if (sc->sc_busy) {
1031 1.14 maxv ret = EBUSY;
1032 1.14 maxv } else {
1033 1.14 maxv sc->sc_busy = true;
1034 1.14 maxv }
1035 1.14 maxv mutex_exit(&sc->sc_lock);
1036 1.1 christos
1037 1.14 maxv return ret;
1038 1.1 christos }
1039 1.1 christos
1040 1.13 maxv static int
1041 1.1 christos tpmclose(dev_t dev, int flag, int mode, struct lwp *l)
1042 1.1 christos {
1043 1.14 maxv struct tpm_softc *sc = device_lookup_private(&tpm_cd, minor(dev));
1044 1.14 maxv int ret = 0;
1045 1.1 christos
1046 1.13 maxv if (sc == NULL)
1047 1.1 christos return ENXIO;
1048 1.1 christos
1049 1.14 maxv mutex_enter(&sc->sc_lock);
1050 1.14 maxv if (!sc->sc_busy) {
1051 1.14 maxv ret = EINVAL;
1052 1.14 maxv } else {
1053 1.14 maxv sc->sc_busy = false;
1054 1.14 maxv }
1055 1.14 maxv mutex_exit(&sc->sc_lock);
1056 1.1 christos
1057 1.14 maxv return ret;
1058 1.1 christos }
1059 1.1 christos
1060 1.13 maxv static int
1061 1.1 christos tpmread(dev_t dev, struct uio *uio, int flags)
1062 1.1 christos {
1063 1.14 maxv struct tpm_softc *sc = device_lookup_private(&tpm_cd, minor(dev));
1064 1.15 maxv struct tpm_header hdr;
1065 1.14 maxv uint8_t buf[TPM_BUFSIZ];
1066 1.24 riastrad size_t cnt, len = 0/*XXXGCC*/;
1067 1.24 riastrad bool end = false;
1068 1.14 maxv int rv;
1069 1.1 christos
1070 1.13 maxv if (sc == NULL)
1071 1.1 christos return ENXIO;
1072 1.1 christos
1073 1.24 riastrad mutex_enter(&sc->sc_lock);
1074 1.24 riastrad
1075 1.16 maxv if ((rv = (*sc->sc_intf->start)(sc, UIO_READ)))
1076 1.24 riastrad goto out;
1077 1.24 riastrad end = true;
1078 1.1 christos
1079 1.14 maxv /* Get the header. */
1080 1.16 maxv if ((rv = (*sc->sc_intf->read)(sc, &hdr, sizeof(hdr), &cnt, 0))) {
1081 1.3 christos goto out;
1082 1.1 christos }
1083 1.24 riastrad if (cnt != sizeof(hdr)) {
1084 1.24 riastrad rv = EIO;
1085 1.24 riastrad goto out;
1086 1.24 riastrad }
1087 1.25 riastrad len = be32toh(hdr.length);
1088 1.24 riastrad if (len > MIN(sizeof(buf), uio->uio_resid) || len < sizeof(hdr)) {
1089 1.1 christos rv = EIO;
1090 1.3 christos goto out;
1091 1.1 christos }
1092 1.1 christos
1093 1.24 riastrad /* Get the payload. */
1094 1.24 riastrad len -= sizeof(hdr);
1095 1.24 riastrad if ((rv = (*sc->sc_intf->read)(sc, buf, len, NULL, TPM_PARAM_SIZE))) {
1096 1.24 riastrad goto out;
1097 1.24 riastrad }
1098 1.24 riastrad
1099 1.24 riastrad out: if (end)
1100 1.24 riastrad rv = (*sc->sc_intf->end)(sc, UIO_READ, rv);
1101 1.24 riastrad
1102 1.24 riastrad mutex_exit(&sc->sc_lock);
1103 1.24 riastrad
1104 1.24 riastrad /* If anything went wrong, stop here -- nothing to copy out. */
1105 1.24 riastrad if (rv)
1106 1.24 riastrad return rv;
1107 1.24 riastrad
1108 1.14 maxv /* Copy out the header. */
1109 1.24 riastrad if ((rv = uiomove(&hdr, sizeof(hdr), uio))) {
1110 1.24 riastrad return rv;
1111 1.1 christos }
1112 1.1 christos
1113 1.24 riastrad /* Copy out the payload. */
1114 1.24 riastrad if ((rv = uiomove(buf, len, uio))) {
1115 1.24 riastrad return rv;
1116 1.1 christos }
1117 1.1 christos
1118 1.24 riastrad /* Success! */
1119 1.24 riastrad return 0;
1120 1.1 christos }
1121 1.1 christos
1122 1.13 maxv static int
1123 1.1 christos tpmwrite(dev_t dev, struct uio *uio, int flags)
1124 1.1 christos {
1125 1.14 maxv struct tpm_softc *sc = device_lookup_private(&tpm_cd, minor(dev));
1126 1.1 christos uint8_t buf[TPM_BUFSIZ];
1127 1.24 riastrad bool end = false;
1128 1.14 maxv int n, rv;
1129 1.1 christos
1130 1.13 maxv if (sc == NULL)
1131 1.1 christos return ENXIO;
1132 1.1 christos
1133 1.1 christos n = MIN(sizeof(buf), uio->uio_resid);
1134 1.1 christos if ((rv = uiomove(buf, n, uio))) {
1135 1.24 riastrad return rv;
1136 1.1 christos }
1137 1.24 riastrad
1138 1.24 riastrad mutex_enter(&sc->sc_lock);
1139 1.24 riastrad
1140 1.16 maxv if ((rv = (*sc->sc_intf->start)(sc, UIO_WRITE))) {
1141 1.13 maxv goto out;
1142 1.1 christos }
1143 1.24 riastrad end = true;
1144 1.24 riastrad
1145 1.16 maxv if ((rv = (*sc->sc_intf->write)(sc, buf, n))) {
1146 1.13 maxv goto out;
1147 1.1 christos }
1148 1.1 christos
1149 1.24 riastrad out: if (end)
1150 1.24 riastrad rv = (*sc->sc_intf->end)(sc, UIO_WRITE, rv);
1151 1.24 riastrad
1152 1.24 riastrad mutex_exit(&sc->sc_lock);
1153 1.1 christos return rv;
1154 1.1 christos }
1155 1.1 christos
1156 1.13 maxv static int
1157 1.13 maxv tpmioctl(dev_t dev, u_long cmd, void *addr, int flag, struct lwp *l)
1158 1.1 christos {
1159 1.14 maxv struct tpm_softc *sc = device_lookup_private(&tpm_cd, minor(dev));
1160 1.13 maxv struct tpm_ioc_getinfo *info;
1161 1.13 maxv
1162 1.13 maxv if (sc == NULL)
1163 1.13 maxv return ENXIO;
1164 1.13 maxv
1165 1.13 maxv switch (cmd) {
1166 1.13 maxv case TPM_IOC_GETINFO:
1167 1.13 maxv info = addr;
1168 1.13 maxv info->api_version = TPM_API_VERSION;
1169 1.13 maxv info->tpm_version = sc->sc_ver;
1170 1.16 maxv info->itf_version = sc->sc_intf->version;
1171 1.13 maxv info->device_id = sc->sc_devid;
1172 1.13 maxv info->device_rev = sc->sc_rev;
1173 1.14 maxv info->device_caps = sc->sc_caps;
1174 1.13 maxv return 0;
1175 1.13 maxv default:
1176 1.13 maxv break;
1177 1.13 maxv }
1178 1.13 maxv
1179 1.1 christos return ENOTTY;
1180 1.1 christos }
1181