Home | History | Annotate | Line # | Download | only in ic
tpm.c revision 1.27
      1  1.27   thorpej /*	$NetBSD: tpm.c,v 1.27 2022/09/25 18:43:32 thorpej Exp $	*/
      2  1.13      maxv 
      3  1.13      maxv /*
      4  1.13      maxv  * Copyright (c) 2019 The NetBSD Foundation, Inc.
      5  1.13      maxv  * All rights reserved.
      6  1.13      maxv  *
      7  1.13      maxv  * This code is derived from software contributed to The NetBSD Foundation
      8  1.13      maxv  * by Maxime Villard.
      9  1.13      maxv  *
     10  1.13      maxv  * Redistribution and use in source and binary forms, with or without
     11  1.13      maxv  * modification, are permitted provided that the following conditions
     12  1.13      maxv  * are met:
     13  1.13      maxv  * 1. Redistributions of source code must retain the above copyright
     14  1.13      maxv  *    notice, this list of conditions and the following disclaimer.
     15  1.13      maxv  * 2. Redistributions in binary form must reproduce the above copyright
     16  1.13      maxv  *    notice, this list of conditions and the following disclaimer in the
     17  1.13      maxv  *    documentation and/or other materials provided with the distribution.
     18  1.13      maxv  *
     19  1.13      maxv  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     20  1.13      maxv  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     21  1.13      maxv  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     22  1.13      maxv  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     23  1.13      maxv  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     24  1.13      maxv  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     25  1.13      maxv  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     26  1.13      maxv  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     27  1.13      maxv  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     28  1.13      maxv  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     29  1.13      maxv  * POSSIBILITY OF SUCH DAMAGE.
     30  1.13      maxv  */
     31  1.13      maxv 
     32   1.1  christos /*
     33   1.1  christos  * Copyright (c) 2008, 2009 Michael Shalayeff
     34  1.13      maxv  * Copyright (c) 2009, 2010 Hans-Joerg Hoexer
     35   1.1  christos  * All rights reserved.
     36   1.1  christos  *
     37   1.1  christos  * Permission to use, copy, modify, and distribute this software for any
     38   1.1  christos  * purpose with or without fee is hereby granted, provided that the above
     39   1.1  christos  * copyright notice and this permission notice appear in all copies.
     40   1.1  christos  *
     41   1.1  christos  * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
     42   1.1  christos  * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
     43   1.1  christos  * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
     44   1.1  christos  * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
     45   1.1  christos  * WHATSOEVER RESULTING FROM LOSS OF MIND, USE, DATA OR PROFITS, WHETHER IN
     46   1.1  christos  * AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT
     47   1.1  christos  * OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
     48   1.1  christos  */
     49   1.1  christos 
     50   1.1  christos #include <sys/cdefs.h>
     51  1.27   thorpej __KERNEL_RCSID(0, "$NetBSD: tpm.c,v 1.27 2022/09/25 18:43:32 thorpej Exp $");
     52   1.1  christos 
     53   1.1  christos #include <sys/param.h>
     54  1.17  riastrad #include <sys/types.h>
     55  1.17  riastrad 
     56  1.19  riastrad #include <sys/atomic.h>
     57  1.17  riastrad #include <sys/bus.h>
     58  1.17  riastrad #include <sys/conf.h>
     59  1.17  riastrad #include <sys/device.h>
     60   1.1  christos #include <sys/kernel.h>
     61  1.17  riastrad #include <sys/pmf.h>
     62   1.1  christos #include <sys/proc.h>
     63  1.17  riastrad #include <sys/systm.h>
     64  1.19  riastrad #include <sys/workqueue.h>
     65   1.1  christos 
     66   1.1  christos #include <dev/ic/tpmreg.h>
     67   1.1  christos #include <dev/ic/tpmvar.h>
     68   1.1  christos 
     69  1.12  riastrad #include "ioconf.h"
     70  1.12  riastrad 
     71  1.15      maxv CTASSERT(sizeof(struct tpm_header) == 10);
     72  1.15      maxv 
     73  1.13      maxv #define TPM_BUFSIZ	1024
     74  1.14      maxv 
     75  1.13      maxv #define TPM_PARAM_SIZE	0x0001	/* that's a flag */
     76  1.13      maxv 
     77  1.13      maxv /* Timeouts. */
     78  1.13      maxv #define TPM_ACCESS_TMO	2000	/* 2sec */
     79  1.13      maxv #define TPM_READY_TMO	2000	/* 2sec */
     80  1.13      maxv #define TPM_READ_TMO	2000	/* 2sec */
     81  1.13      maxv #define TPM_BURST_TMO	2000	/* 2sec */
     82  1.13      maxv 
     83  1.13      maxv #define TPM_CAPS_REQUIRED \
     84  1.13      maxv 	(TPM_INTF_DATA_AVAIL_INT|TPM_INTF_LOCALITY_CHANGE_INT| \
     85  1.13      maxv 	 TPM_INTF_INT_LEVEL_LOW)
     86   1.1  christos 
     87  1.13      maxv static inline int
     88  1.13      maxv tpm_tmotohz(int tmo)
     89   1.1  christos {
     90  1.13      maxv 	struct timeval tv;
     91   1.1  christos 
     92  1.13      maxv 	tv.tv_sec = tmo / 1000;
     93  1.13      maxv 	tv.tv_usec = 1000 * (tmo % 1000);
     94   1.1  christos 
     95  1.13      maxv 	return tvtohz(&tv);
     96   1.1  christos }
     97   1.1  christos 
     98  1.13      maxv static int
     99   1.1  christos tpm_getburst(struct tpm_softc *sc)
    100   1.1  christos {
    101   1.1  christos 	int burst, to, rv;
    102   1.1  christos 
    103   1.1  christos 	to = tpm_tmotohz(TPM_BURST_TMO);
    104   1.1  christos 
    105  1.13      maxv 	while (to--) {
    106   1.1  christos 		/*
    107  1.13      maxv 		 * Burst count is in bits 23:8, so read the two higher bytes.
    108   1.1  christos 		 */
    109   1.1  christos 		burst = bus_space_read_1(sc->sc_bt, sc->sc_bh, TPM_STS + 1);
    110   1.1  christos 		burst |= bus_space_read_1(sc->sc_bt, sc->sc_bh, TPM_STS + 2)
    111   1.1  christos 		    << 8;
    112  1.13      maxv 
    113   1.1  christos 		if (burst)
    114   1.1  christos 			return burst;
    115   1.1  christos 
    116  1.14      maxv 		rv = tsleep(sc, PCATCH, "tpm_getburst", 1);
    117   1.1  christos 		if (rv && rv != EWOULDBLOCK) {
    118   1.1  christos 			return 0;
    119   1.1  christos 		}
    120   1.1  christos 	}
    121   1.1  christos 
    122   1.1  christos 	return 0;
    123   1.1  christos }
    124   1.1  christos 
    125  1.13      maxv static inline uint8_t
    126   1.1  christos tpm_status(struct tpm_softc *sc)
    127   1.1  christos {
    128  1.13      maxv 	return bus_space_read_1(sc->sc_bt, sc->sc_bh, TPM_STS) &
    129  1.13      maxv 	    TPM_STS_STATUS_BITS;
    130   1.1  christos }
    131   1.1  christos 
    132  1.13      maxv /* -------------------------------------------------------------------------- */
    133   1.1  christos 
    134  1.15      maxv static bool
    135  1.15      maxv tpm12_suspend(struct tpm_softc *sc)
    136  1.15      maxv {
    137  1.15      maxv 	static const uint8_t command[10] = {
    138  1.15      maxv 		0x00, 0xC1,		/* TPM_TAG_RQU_COMMAND */
    139  1.15      maxv 		0x00, 0x00, 0x00, 10,	/* Length in bytes */
    140  1.15      maxv 		0x00, 0x00, 0x00, 0x98	/* TPM_ORD_SaveState */
    141  1.15      maxv 	};
    142  1.15      maxv 	struct tpm_header response;
    143  1.24  riastrad 	size_t nread;
    144  1.24  riastrad 	bool endwrite = false, endread = false;
    145  1.24  riastrad 	int error;
    146  1.24  riastrad 
    147  1.24  riastrad 	/*
    148  1.24  riastrad 	 * Write the command.
    149  1.24  riastrad 	 */
    150  1.24  riastrad 	error = (*sc->sc_intf->start)(sc, UIO_WRITE);
    151  1.24  riastrad 	if (error) {
    152  1.24  riastrad 		device_printf(sc->sc_dev, "start write failed: %d", error);
    153  1.24  riastrad 		goto out;
    154  1.24  riastrad 	}
    155  1.24  riastrad 
    156  1.24  riastrad 	endwrite = true;
    157  1.24  riastrad 
    158  1.24  riastrad 	error = (*sc->sc_intf->write)(sc, &command, sizeof(command));
    159  1.24  riastrad 	if (error) {
    160  1.24  riastrad 		device_printf(sc->sc_dev, "write TPM_ORD_SaveState failed: %d",
    161  1.24  riastrad 		    error);
    162  1.24  riastrad 		goto out;
    163  1.24  riastrad 	}
    164  1.24  riastrad 
    165  1.24  riastrad 	endwrite = false;
    166  1.24  riastrad 
    167  1.24  riastrad 	error = (*sc->sc_intf->end)(sc, UIO_WRITE, 0);
    168  1.24  riastrad 	if (error) {
    169  1.24  riastrad 		device_printf(sc->sc_dev, "end write failed: %d", error);
    170  1.24  riastrad 		goto out;
    171  1.24  riastrad 	}
    172  1.24  riastrad 
    173  1.24  riastrad 	/*
    174  1.24  riastrad 	 * Read the response -- just the header; we don't expect a
    175  1.24  riastrad 	 * payload.
    176  1.24  riastrad 	 */
    177  1.24  riastrad 	error = (*sc->sc_intf->start)(sc, UIO_READ);
    178  1.24  riastrad 	if (error) {
    179  1.24  riastrad 		device_printf(sc->sc_dev, "start read failed: %d", error);
    180  1.24  riastrad 		goto out;
    181  1.24  riastrad 	}
    182  1.24  riastrad 
    183  1.24  riastrad 	endread = true;
    184  1.24  riastrad 
    185  1.24  riastrad 	error = (*sc->sc_intf->read)(sc, &response, sizeof(response), &nread,
    186  1.24  riastrad 	    0);
    187  1.24  riastrad 	if (error) {
    188  1.24  riastrad 		device_printf(sc->sc_dev, "read failed: %d", error);
    189  1.24  riastrad 		goto out;
    190  1.24  riastrad 	}
    191  1.24  riastrad 	if (nread != sizeof(response)) {
    192  1.24  riastrad 		device_printf(sc->sc_dev, "short header read: %zu", nread);
    193  1.24  riastrad 		goto out;
    194  1.24  riastrad 	}
    195  1.24  riastrad 
    196  1.24  riastrad 	endread = false;
    197  1.24  riastrad 
    198  1.24  riastrad 	error = (*sc->sc_intf->end)(sc, UIO_READ, 0);
    199  1.24  riastrad 	if (error) {
    200  1.24  riastrad 		device_printf(sc->sc_dev, "end read failed: %d", error);
    201  1.24  riastrad 		goto out;
    202  1.24  riastrad 	}
    203  1.24  riastrad 
    204  1.24  riastrad 	/*
    205  1.24  riastrad 	 * Verify the response looks reasonable.
    206  1.24  riastrad 	 */
    207  1.25  riastrad 	if (be16toh(response.tag) != TPM_TAG_RSP_COMMAND ||
    208  1.25  riastrad 	    be32toh(response.length) != sizeof(response) ||
    209  1.25  riastrad 	    be32toh(response.code) != 0) {
    210  1.24  riastrad 		device_printf(sc->sc_dev,
    211  1.24  riastrad 		    "TPM_ORD_SaveState failed: tag=0x%x length=0x%x code=0x%x",
    212  1.25  riastrad 		    be16toh(response.tag),
    213  1.25  riastrad 		    be32toh(response.length),
    214  1.25  riastrad 		    be32toh(response.code));
    215  1.24  riastrad 		error = EIO;
    216  1.24  riastrad 		goto out;
    217  1.24  riastrad 	}
    218  1.24  riastrad 
    219  1.24  riastrad 	/* Success!  */
    220  1.24  riastrad 	error = 0;
    221  1.15      maxv 
    222  1.24  riastrad out:	if (endwrite)
    223  1.24  riastrad 		error = (*sc->sc_intf->end)(sc, UIO_WRITE, error);
    224  1.24  riastrad 	if (endread)
    225  1.24  riastrad 		error = (*sc->sc_intf->end)(sc, UIO_READ, error);
    226  1.24  riastrad 	if (error)
    227  1.15      maxv 		return false;
    228  1.15      maxv 	return true;
    229  1.15      maxv }
    230   1.1  christos 
    231  1.15      maxv static bool
    232  1.15      maxv tpm20_suspend(struct tpm_softc *sc)
    233   1.1  christos {
    234  1.15      maxv 	static const uint8_t command[12] = {
    235  1.15      maxv 		0x80, 0x01,		/* TPM_ST_NO_SESSIONS */
    236  1.15      maxv 		0x00, 0x00, 0x00, 12,	/* Length in bytes */
    237  1.15      maxv 		0x00, 0x00, 0x01, 0x45,	/* TPM_CC_Shutdown */
    238  1.15      maxv 		0x00, 0x01		/* TPM_SU_STATE */
    239   1.1  christos 	};
    240  1.15      maxv 	struct tpm_header response;
    241  1.24  riastrad 	size_t nread;
    242  1.24  riastrad 	bool endwrite = false, endread = false;
    243  1.24  riastrad 	int error;
    244  1.24  riastrad 
    245  1.24  riastrad 	/*
    246  1.24  riastrad 	 * Write the command.
    247  1.24  riastrad 	 */
    248  1.24  riastrad 	error = (*sc->sc_intf->start)(sc, UIO_WRITE);
    249  1.24  riastrad 	if (error) {
    250  1.24  riastrad 		device_printf(sc->sc_dev, "start write failed: %d", error);
    251  1.24  riastrad 		goto out;
    252  1.24  riastrad 	}
    253  1.24  riastrad 
    254  1.24  riastrad 	endwrite = true;
    255  1.24  riastrad 
    256  1.24  riastrad 	error = (*sc->sc_intf->write)(sc, &command, sizeof(command));
    257  1.24  riastrad 	if (error) {
    258  1.24  riastrad 		device_printf(sc->sc_dev, "write TPM_ORD_SaveState failed: %d",
    259  1.24  riastrad 		    error);
    260  1.24  riastrad 		goto out;
    261  1.24  riastrad 	}
    262   1.1  christos 
    263  1.24  riastrad 	endwrite = false;
    264  1.24  riastrad 
    265  1.24  riastrad 	error = (*sc->sc_intf->end)(sc, UIO_WRITE, 0);
    266  1.24  riastrad 	if (error) {
    267  1.24  riastrad 		device_printf(sc->sc_dev, "end write failed: %d", error);
    268  1.24  riastrad 		goto out;
    269  1.24  riastrad 	}
    270  1.24  riastrad 
    271  1.24  riastrad 	/*
    272  1.24  riastrad 	 * Read the response -- just the header; we don't expect a
    273  1.24  riastrad 	 * payload.
    274  1.24  riastrad 	 */
    275  1.24  riastrad 	error = (*sc->sc_intf->start)(sc, UIO_READ);
    276  1.24  riastrad 	if (error) {
    277  1.24  riastrad 		device_printf(sc->sc_dev, "start read failed: %d", error);
    278  1.24  riastrad 		goto out;
    279  1.24  riastrad 	}
    280  1.24  riastrad 
    281  1.24  riastrad 	endread = true;
    282  1.24  riastrad 
    283  1.24  riastrad 	error = (*sc->sc_intf->read)(sc, &response, sizeof(response), &nread,
    284  1.24  riastrad 	    0);
    285  1.24  riastrad 	if (error) {
    286  1.24  riastrad 		device_printf(sc->sc_dev, "read failed: %d", error);
    287  1.24  riastrad 		goto out;
    288  1.24  riastrad 	}
    289  1.24  riastrad 	if (nread != sizeof(response)) {
    290  1.24  riastrad 		device_printf(sc->sc_dev, "short header read: %zu", nread);
    291  1.24  riastrad 		goto out;
    292  1.24  riastrad 	}
    293  1.24  riastrad 
    294  1.24  riastrad 	endread = false;
    295  1.24  riastrad 
    296  1.24  riastrad 	error = (*sc->sc_intf->end)(sc, UIO_READ, 0);
    297  1.24  riastrad 	if (error) {
    298  1.24  riastrad 		device_printf(sc->sc_dev, "end read failed: %d", error);
    299  1.24  riastrad 		goto out;
    300  1.24  riastrad 	}
    301  1.24  riastrad 
    302  1.24  riastrad 	/*
    303  1.24  riastrad 	 * Verify the response looks reasonable.
    304  1.24  riastrad 	 */
    305  1.25  riastrad 	if (be16toh(response.tag) != TPM2_ST_NO_SESSIONS ||
    306  1.25  riastrad 	    be32toh(response.length) != sizeof(response) ||
    307  1.25  riastrad 	    be32toh(response.code) != TPM2_RC_SUCCESS) {
    308  1.24  riastrad 		device_printf(sc->sc_dev,
    309  1.24  riastrad 		    "TPM_CC_Shutdown failed: tag=0x%x length=0x%x code=0x%x",
    310  1.25  riastrad 		    be16toh(response.tag),
    311  1.25  riastrad 		    be32toh(response.length),
    312  1.25  riastrad 		    be32toh(response.code));
    313  1.24  riastrad 		error = EIO;
    314  1.24  riastrad 		goto out;
    315  1.24  riastrad 	}
    316  1.24  riastrad 
    317  1.24  riastrad 	/* Success!  */
    318  1.24  riastrad 	error = 0;
    319  1.24  riastrad 
    320  1.24  riastrad out:	if (endwrite)
    321  1.24  riastrad 		error = (*sc->sc_intf->end)(sc, UIO_WRITE, error);
    322  1.24  riastrad 	if (endread)
    323  1.24  riastrad 		error = (*sc->sc_intf->end)(sc, UIO_READ, error);
    324  1.24  riastrad 	if (error)
    325  1.15      maxv 		return false;
    326   1.7  christos 	return true;
    327   1.1  christos }
    328   1.1  christos 
    329   1.1  christos bool
    330  1.15      maxv tpm_suspend(device_t dev, const pmf_qual_t *qual)
    331   1.1  christos {
    332  1.15      maxv 	struct tpm_softc *sc = device_private(dev);
    333  1.15      maxv 
    334  1.15      maxv 	switch (sc->sc_ver) {
    335  1.15      maxv 	case TPM_1_2:
    336  1.15      maxv 		return tpm12_suspend(sc);
    337  1.15      maxv 	case TPM_2_0:
    338  1.15      maxv 		return tpm20_suspend(sc);
    339  1.15      maxv 	default:
    340  1.15      maxv 		panic("%s: impossible", __func__);
    341  1.15      maxv 	}
    342  1.15      maxv }
    343  1.15      maxv 
    344  1.15      maxv bool
    345  1.15      maxv tpm_resume(device_t dev, const pmf_qual_t *qual)
    346  1.15      maxv {
    347  1.15      maxv 	/*
    348  1.15      maxv 	 * Don't do anything, the BIOS is supposed to restore the previously
    349  1.15      maxv 	 * saved state.
    350  1.15      maxv 	 */
    351   1.7  christos 	return true;
    352   1.1  christos }
    353   1.1  christos 
    354  1.13      maxv /* -------------------------------------------------------------------------- */
    355  1.13      maxv 
    356  1.13      maxv static int
    357  1.14      maxv tpm_poll(struct tpm_softc *sc, uint8_t mask, int to, wchan_t chan)
    358   1.1  christos {
    359   1.1  christos 	int rv;
    360   1.1  christos 
    361  1.13      maxv 	while (((sc->sc_status = tpm_status(sc)) & mask) != mask && to--) {
    362  1.14      maxv 		rv = tsleep(chan, PCATCH, "tpm_poll", 1);
    363   1.1  christos 		if (rv && rv != EWOULDBLOCK) {
    364   1.1  christos 			return rv;
    365   1.1  christos 		}
    366   1.1  christos 	}
    367   1.1  christos 
    368   1.1  christos 	return 0;
    369   1.1  christos }
    370   1.1  christos 
    371  1.13      maxv static int
    372  1.13      maxv tpm_waitfor(struct tpm_softc *sc, uint8_t bits, int tmo, wchan_t chan)
    373   1.1  christos {
    374  1.13      maxv 	int retry, to, rv;
    375  1.13      maxv 	uint8_t todo;
    376   1.1  christos 
    377  1.14      maxv 	to = tpm_tmotohz(tmo);
    378  1.13      maxv 	retry = 3;
    379  1.13      maxv 
    380   1.1  christos restart:
    381  1.14      maxv 	todo = bits;
    382  1.14      maxv 
    383   1.1  christos 	/*
    384  1.14      maxv 	 * TPM_STS_VALID has priority over the others.
    385   1.1  christos 	 */
    386  1.14      maxv 	if (todo & TPM_STS_VALID) {
    387  1.14      maxv 		if ((rv = tpm_poll(sc, TPM_STS_VALID, to+1, chan)) != 0)
    388  1.14      maxv 			return rv;
    389  1.14      maxv 		todo &= ~TPM_STS_VALID;
    390  1.14      maxv 	}
    391  1.14      maxv 
    392  1.14      maxv 	if ((rv = tpm_poll(sc, todo, to, chan)) != 0)
    393   1.1  christos 		return rv;
    394   1.1  christos 
    395  1.13      maxv 	if ((todo & sc->sc_status) != todo) {
    396  1.14      maxv 		if ((retry-- > 0) && (bits & TPM_STS_VALID)) {
    397   1.1  christos 			bus_space_write_1(sc->sc_bt, sc->sc_bh, TPM_STS,
    398   1.1  christos 			    TPM_STS_RESP_RETRY);
    399   1.1  christos 			goto restart;
    400   1.1  christos 		}
    401   1.1  christos 		return EIO;
    402   1.1  christos 	}
    403   1.1  christos 
    404   1.1  christos 	return 0;
    405   1.1  christos }
    406   1.1  christos 
    407  1.13      maxv /* -------------------------------------------------------------------------- */
    408  1.13      maxv 
    409  1.13      maxv /*
    410  1.16      maxv  * TPM using the TIS 1.2 interface.
    411  1.13      maxv  */
    412  1.13      maxv 
    413  1.16      maxv static int
    414  1.16      maxv tpm12_request_locality(struct tpm_softc *sc, int l)
    415  1.16      maxv {
    416  1.16      maxv 	uint32_t r;
    417  1.16      maxv 	int to, rv;
    418  1.16      maxv 
    419  1.16      maxv 	if (l != 0)
    420  1.16      maxv 		return EINVAL;
    421  1.16      maxv 
    422  1.16      maxv 	if ((bus_space_read_1(sc->sc_bt, sc->sc_bh, TPM_ACCESS) &
    423  1.16      maxv 	    (TPM_ACCESS_VALID | TPM_ACCESS_ACTIVE_LOCALITY)) ==
    424  1.16      maxv 	    (TPM_ACCESS_VALID | TPM_ACCESS_ACTIVE_LOCALITY))
    425  1.16      maxv 		return 0;
    426  1.16      maxv 
    427  1.16      maxv 	bus_space_write_1(sc->sc_bt, sc->sc_bh, TPM_ACCESS,
    428  1.16      maxv 	    TPM_ACCESS_REQUEST_USE);
    429  1.16      maxv 
    430  1.16      maxv 	to = tpm_tmotohz(TPM_ACCESS_TMO);
    431  1.16      maxv 
    432  1.16      maxv 	while ((r = bus_space_read_1(sc->sc_bt, sc->sc_bh, TPM_ACCESS) &
    433  1.16      maxv 	    (TPM_ACCESS_VALID | TPM_ACCESS_ACTIVE_LOCALITY)) !=
    434  1.16      maxv 	    (TPM_ACCESS_VALID | TPM_ACCESS_ACTIVE_LOCALITY) && to--) {
    435  1.16      maxv 		rv = tsleep(sc->sc_intf->init, PCATCH, "tpm_locality", 1);
    436  1.16      maxv 		if (rv && rv != EWOULDBLOCK) {
    437  1.16      maxv 			return rv;
    438  1.16      maxv 		}
    439  1.16      maxv 	}
    440  1.16      maxv 
    441  1.16      maxv 	if ((r & (TPM_ACCESS_VALID | TPM_ACCESS_ACTIVE_LOCALITY)) !=
    442  1.16      maxv 	    (TPM_ACCESS_VALID | TPM_ACCESS_ACTIVE_LOCALITY)) {
    443  1.16      maxv 		return EBUSY;
    444  1.16      maxv 	}
    445  1.16      maxv 
    446  1.16      maxv 	return 0;
    447  1.16      maxv }
    448  1.16      maxv 
    449  1.16      maxv static int
    450  1.13      maxv tpm_tis12_probe(bus_space_tag_t bt, bus_space_handle_t bh)
    451  1.13      maxv {
    452  1.13      maxv 	uint32_t cap;
    453  1.13      maxv 	uint8_t reg;
    454  1.13      maxv 	int tmo;
    455  1.13      maxv 
    456  1.13      maxv 	cap = bus_space_read_4(bt, bh, TPM_INTF_CAPABILITY);
    457  1.13      maxv 	if (cap == 0xffffffff)
    458  1.16      maxv 		return EINVAL;
    459  1.13      maxv 	if ((cap & TPM_CAPS_REQUIRED) != TPM_CAPS_REQUIRED)
    460  1.16      maxv 		return ENOTSUP;
    461  1.13      maxv 
    462  1.13      maxv 	/* Request locality 0. */
    463  1.13      maxv 	bus_space_write_1(bt, bh, TPM_ACCESS, TPM_ACCESS_REQUEST_USE);
    464  1.13      maxv 
    465  1.13      maxv 	/* Wait for it to become active. */
    466  1.13      maxv 	tmo = TPM_ACCESS_TMO; /* Milliseconds. */
    467  1.13      maxv 	while ((reg = bus_space_read_1(bt, bh, TPM_ACCESS) &
    468  1.13      maxv 	    (TPM_ACCESS_VALID | TPM_ACCESS_ACTIVE_LOCALITY)) !=
    469  1.13      maxv 	    (TPM_ACCESS_VALID | TPM_ACCESS_ACTIVE_LOCALITY) && tmo--) {
    470  1.13      maxv 		DELAY(1000); /* 1 millisecond. */
    471  1.13      maxv 	}
    472  1.13      maxv 	if ((reg & (TPM_ACCESS_VALID | TPM_ACCESS_ACTIVE_LOCALITY)) !=
    473  1.13      maxv 	    (TPM_ACCESS_VALID | TPM_ACCESS_ACTIVE_LOCALITY)) {
    474  1.16      maxv 		return ETIMEDOUT;
    475  1.13      maxv 	}
    476  1.13      maxv 
    477  1.13      maxv 	if (bus_space_read_4(bt, bh, TPM_ID) == 0xffffffff)
    478  1.16      maxv 		return EINVAL;
    479  1.13      maxv 
    480  1.16      maxv 	return 0;
    481  1.13      maxv }
    482  1.13      maxv 
    483  1.21  riastrad static int
    484  1.21  riastrad tpm12_rng(struct tpm_softc *sc, unsigned *entropybitsp)
    485  1.19  riastrad {
    486  1.19  riastrad 	/*
    487  1.19  riastrad 	 * TPM Specification Version 1.2, Main Part 3: Commands,
    488  1.19  riastrad 	 * Sec. 13.6 TPM_GetRandom
    489  1.19  riastrad 	 */
    490  1.19  riastrad 	struct {
    491  1.19  riastrad 		struct tpm_header hdr;
    492  1.19  riastrad 		uint32_t bytesRequested;
    493  1.19  riastrad 	} __packed command;
    494  1.19  riastrad 	struct response {
    495  1.19  riastrad 		struct tpm_header hdr;
    496  1.19  riastrad 		uint32_t randomBytesSize;
    497  1.19  riastrad 		uint8_t	bytes[64];
    498  1.19  riastrad 	} __packed response;
    499  1.21  riastrad 	bool endwrite = false, endread = false;
    500  1.19  riastrad 	size_t nread;
    501  1.19  riastrad 	uint16_t tag;
    502  1.21  riastrad 	uint32_t pktlen, code, nbytes, entropybits = 0;
    503  1.19  riastrad 	int rv;
    504  1.19  riastrad 
    505  1.19  riastrad 	/* Encode the command.  */
    506  1.19  riastrad 	memset(&command, 0, sizeof(command));
    507  1.19  riastrad 	command.hdr.tag = htobe16(TPM_TAG_RQU_COMMAND);
    508  1.19  riastrad 	command.hdr.length = htobe32(sizeof(command));
    509  1.19  riastrad 	command.hdr.code = htobe32(TPM_ORD_GetRandom);
    510  1.19  riastrad 	command.bytesRequested = htobe32(sizeof(response.bytes));
    511  1.19  riastrad 
    512  1.19  riastrad 	/* Write the command.   */
    513  1.19  riastrad 	if ((rv = (*sc->sc_intf->start)(sc, UIO_WRITE)) != 0) {
    514  1.19  riastrad 		device_printf(sc->sc_dev, "start write failed, error=%d\n",
    515  1.19  riastrad 		    rv);
    516  1.19  riastrad 		goto out;
    517  1.19  riastrad 	}
    518  1.19  riastrad 	endwrite = true;
    519  1.19  riastrad 	if ((rv = (*sc->sc_intf->write)(sc, &command, sizeof(command))) != 0) {
    520  1.19  riastrad 		device_printf(sc->sc_dev, "write failed, error=%d\n", rv);
    521  1.19  riastrad 		goto out;
    522  1.19  riastrad 	}
    523  1.19  riastrad 	rv = (*sc->sc_intf->end)(sc, UIO_WRITE, 0);
    524  1.19  riastrad 	endwrite = false;
    525  1.19  riastrad 	if (rv) {
    526  1.19  riastrad 		device_printf(sc->sc_dev, "end write failed, error=%d\n", rv);
    527  1.19  riastrad 		goto out;
    528  1.19  riastrad 	}
    529  1.19  riastrad 
    530  1.19  riastrad 	/* Read the response header.  */
    531  1.19  riastrad 	if ((rv = (*sc->sc_intf->start)(sc, UIO_READ)) != 0) {
    532  1.19  riastrad 		device_printf(sc->sc_dev, "start write failed, error=%d\n",
    533  1.19  riastrad 		    rv);
    534  1.19  riastrad 		goto out;
    535  1.19  riastrad 	}
    536  1.19  riastrad 	endread = true;
    537  1.19  riastrad 	if ((rv = (*sc->sc_intf->read)(sc, &response.hdr, sizeof(response.hdr),
    538  1.19  riastrad 		    &nread, 0)) != 0) {
    539  1.19  riastrad 		device_printf(sc->sc_dev, "read failed, error=%d\n", rv);
    540  1.19  riastrad 		goto out;
    541  1.19  riastrad 	}
    542  1.19  riastrad 
    543  1.19  riastrad 	/* Verify the response header looks sensible.  */
    544  1.19  riastrad 	if (nread != sizeof(response.hdr)) {
    545  1.26   khorben 		device_printf(sc->sc_dev, "read %zu bytes, expected %zu\n",
    546  1.19  riastrad 		    nread, sizeof(response.hdr));
    547  1.19  riastrad 		goto out;
    548  1.19  riastrad 	}
    549  1.19  riastrad 	tag = be16toh(response.hdr.tag);
    550  1.19  riastrad 	pktlen = be32toh(response.hdr.length);
    551  1.19  riastrad 	code = be32toh(response.hdr.code);
    552  1.19  riastrad 	if (tag != TPM_TAG_RSP_COMMAND ||
    553  1.19  riastrad 	    pktlen < offsetof(struct response, bytes) ||
    554  1.19  riastrad 	    pktlen > sizeof(response) ||
    555  1.19  riastrad 	    code != 0) {
    556  1.19  riastrad 		/*
    557  1.19  riastrad 		 * If the tpm itself is busy (e.g., it has yet to run a
    558  1.19  riastrad 		 * self-test, or it's in a timeout period to defend
    559  1.19  riastrad 		 * against brute force attacks), then we can try again
    560  1.19  riastrad 		 * later.  Otherwise, give up.
    561  1.19  riastrad 		 */
    562  1.19  riastrad 		if (code & TPM_NON_FATAL) {
    563  1.19  riastrad 			aprint_debug_dev(sc->sc_dev, "%s: tpm busy, code=%u\n",
    564  1.19  riastrad 			    __func__, code & ~TPM_NON_FATAL);
    565  1.19  riastrad 			rv = 0;
    566  1.19  riastrad 		} else if (code == TPM_DEACTIVATED) {
    567  1.19  riastrad 			device_printf(sc->sc_dev, "tpm is deactivated\n");
    568  1.19  riastrad 			rv = ENXIO;
    569  1.19  riastrad 		} else {
    570  1.19  riastrad 			device_printf(sc->sc_dev, "bad tpm response:"
    571  1.19  riastrad 			    " tag=%u len=%u code=%u\n", tag, pktlen, code);
    572  1.19  riastrad 			hexdump(aprint_debug, "tpm response header",
    573  1.19  riastrad 			    (const void *)&response.hdr,
    574  1.19  riastrad 			    sizeof(response.hdr));
    575  1.19  riastrad 			rv = EIO;
    576  1.19  riastrad 		}
    577  1.19  riastrad 		goto out;
    578  1.19  riastrad 	}
    579  1.19  riastrad 
    580  1.19  riastrad 	/* Read the response payload.  */
    581  1.19  riastrad 	if ((rv = (*sc->sc_intf->read)(sc,
    582  1.19  riastrad 		    (char *)&response + nread, pktlen - nread,
    583  1.19  riastrad 		    NULL, TPM_PARAM_SIZE)) != 0) {
    584  1.19  riastrad 		device_printf(sc->sc_dev, "read failed, error=%d\n", rv);
    585  1.19  riastrad 		goto out;
    586  1.19  riastrad 	}
    587  1.19  riastrad 	endread = false;
    588  1.19  riastrad 	if ((rv = (*sc->sc_intf->end)(sc, UIO_READ, 0)) != 0) {
    589  1.19  riastrad 		device_printf(sc->sc_dev, "end read failed, error=%d\n", rv);
    590  1.19  riastrad 		goto out;
    591  1.19  riastrad 	}
    592  1.19  riastrad 
    593  1.19  riastrad 	/* Verify the number of bytes read looks sensible.  */
    594  1.19  riastrad 	nbytes = be32toh(response.randomBytesSize);
    595  1.19  riastrad 	if (nbytes > pktlen - offsetof(struct response, bytes)) {
    596  1.19  riastrad 		device_printf(sc->sc_dev, "overlong GetRandom length:"
    597  1.19  riastrad 		    " %u, max %zu\n",
    598  1.19  riastrad 		    nbytes, pktlen - offsetof(struct response, bytes));
    599  1.19  riastrad 		nbytes = pktlen - offsetof(struct response, bytes);
    600  1.19  riastrad 	}
    601  1.19  riastrad 
    602  1.19  riastrad 	/*
    603  1.19  riastrad 	 * Enter the data into the entropy pool.  Conservatively (or,
    604  1.19  riastrad 	 * perhaps, cargocultily) estimate half a bit of entropy per
    605  1.19  riastrad 	 * bit of data.
    606  1.19  riastrad 	 */
    607  1.21  riastrad 	CTASSERT(sizeof(response.bytes) <= UINT_MAX/(NBBY/2));
    608  1.21  riastrad 	entropybits = (NBBY/2)*nbytes;
    609  1.21  riastrad 	rnd_add_data(&sc->sc_rnd, response.bytes, nbytes, entropybits);
    610  1.21  riastrad 
    611  1.21  riastrad out:	/* End the read or write if still ongoing.  */
    612  1.21  riastrad 	if (endread)
    613  1.21  riastrad 		rv = (*sc->sc_intf->end)(sc, UIO_READ, rv);
    614  1.21  riastrad 	if (endwrite)
    615  1.21  riastrad 		rv = (*sc->sc_intf->end)(sc, UIO_WRITE, rv);
    616  1.21  riastrad 
    617  1.21  riastrad 	*entropybitsp = entropybits;
    618  1.21  riastrad 	return rv;
    619  1.21  riastrad }
    620  1.21  riastrad 
    621  1.21  riastrad static int
    622  1.21  riastrad tpm20_rng(struct tpm_softc *sc, unsigned *entropybitsp)
    623  1.21  riastrad {
    624  1.21  riastrad 	/*
    625  1.21  riastrad 	 * Trusted Platform Module Library, Family "2.0", Level 00
    626  1.21  riastrad 	 * Revision 01.38, Part 3: Commands, Sec. 16.1 `TPM2_GetRandom'
    627  1.21  riastrad 	 *
    628  1.21  riastrad 	 * https://trustedcomputinggroup.org/wp-content/uploads/TPM-Rev-2.0-Part-3-Commands-01.38.pdf#page=133
    629  1.21  riastrad 	 */
    630  1.21  riastrad 	struct {
    631  1.21  riastrad 		struct tpm_header hdr;
    632  1.21  riastrad 		uint16_t bytesRequested;
    633  1.21  riastrad 	} __packed command;
    634  1.21  riastrad 	struct response {
    635  1.21  riastrad 		struct tpm_header hdr;
    636  1.21  riastrad 		uint16_t randomBytesSize;
    637  1.21  riastrad 		uint8_t bytes[64];
    638  1.21  riastrad 	} __packed response;
    639  1.21  riastrad 	bool endwrite = false, endread = false;
    640  1.21  riastrad 	size_t nread;
    641  1.21  riastrad 	uint16_t tag;
    642  1.21  riastrad 	uint32_t pktlen, code, nbytes, entropybits = 0;
    643  1.21  riastrad 	int rv;
    644  1.21  riastrad 
    645  1.21  riastrad 	/* Encode the command.  */
    646  1.21  riastrad 	memset(&command, 0, sizeof(command));
    647  1.21  riastrad 	command.hdr.tag = htobe16(TPM2_ST_NO_SESSIONS);
    648  1.21  riastrad 	command.hdr.length = htobe32(sizeof(command));
    649  1.21  riastrad 	command.hdr.code = htobe32(TPM2_CC_GetRandom);
    650  1.21  riastrad 	command.bytesRequested = htobe16(sizeof(response.bytes));
    651  1.21  riastrad 
    652  1.21  riastrad 	/* Write the command.   */
    653  1.21  riastrad 	if ((rv = (*sc->sc_intf->start)(sc, UIO_WRITE)) != 0) {
    654  1.21  riastrad 		device_printf(sc->sc_dev, "start write failed, error=%d\n",
    655  1.21  riastrad 		    rv);
    656  1.21  riastrad 		goto out;
    657  1.21  riastrad 	}
    658  1.21  riastrad 	endwrite = true;
    659  1.21  riastrad 	if ((rv = (*sc->sc_intf->write)(sc, &command, sizeof(command))) != 0) {
    660  1.21  riastrad 		device_printf(sc->sc_dev, "write failed, error=%d\n", rv);
    661  1.21  riastrad 		goto out;
    662  1.21  riastrad 	}
    663  1.21  riastrad 	rv = (*sc->sc_intf->end)(sc, UIO_WRITE, 0);
    664  1.21  riastrad 	endwrite = false;
    665  1.21  riastrad 	if (rv) {
    666  1.21  riastrad 		device_printf(sc->sc_dev, "end write failed, error=%d\n", rv);
    667  1.21  riastrad 		goto out;
    668  1.21  riastrad 	}
    669  1.21  riastrad 
    670  1.21  riastrad 	/* Read the response header.  */
    671  1.21  riastrad 	if ((rv = (*sc->sc_intf->start)(sc, UIO_READ)) != 0) {
    672  1.21  riastrad 		device_printf(sc->sc_dev, "start write failed, error=%d\n",
    673  1.21  riastrad 		    rv);
    674  1.21  riastrad 		goto out;
    675  1.21  riastrad 	}
    676  1.21  riastrad 	endread = true;
    677  1.21  riastrad 	if ((rv = (*sc->sc_intf->read)(sc, &response.hdr, sizeof(response.hdr),
    678  1.21  riastrad 		    &nread, 0)) != 0) {
    679  1.21  riastrad 		device_printf(sc->sc_dev, "read failed, error=%d\n", rv);
    680  1.21  riastrad 		goto out;
    681  1.21  riastrad 	}
    682  1.21  riastrad 
    683  1.21  riastrad 	/* Verify the response header looks sensible.  */
    684  1.21  riastrad 	if (nread != sizeof(response.hdr)) {
    685  1.21  riastrad 		device_printf(sc->sc_dev, "read %zu bytes, expected %zu",
    686  1.21  riastrad 		    nread, sizeof(response.hdr));
    687  1.21  riastrad 		goto out;
    688  1.21  riastrad 	}
    689  1.21  riastrad 	tag = be16toh(response.hdr.tag);
    690  1.21  riastrad 	pktlen = be32toh(response.hdr.length);
    691  1.21  riastrad 	code = be32toh(response.hdr.code);
    692  1.21  riastrad 	if (tag != TPM2_ST_NO_SESSIONS ||
    693  1.21  riastrad 	    pktlen < offsetof(struct response, bytes) ||
    694  1.21  riastrad 	    pktlen > sizeof(response) ||
    695  1.21  riastrad 	    code != 0) {
    696  1.21  riastrad 		/*
    697  1.21  riastrad 		 * If the tpm itself is busy (e.g., it has yet to run a
    698  1.21  riastrad 		 * self-test, or it's in a timeout period to defend
    699  1.21  riastrad 		 * against brute force attacks), then we can try again
    700  1.21  riastrad 		 * later.  Otherwise, give up.
    701  1.21  riastrad 		 */
    702  1.21  riastrad 		if (code & TPM2_RC_WARN) {
    703  1.21  riastrad 			aprint_debug_dev(sc->sc_dev, "%s: tpm busy,"
    704  1.21  riastrad 			    " code=TPM_RC_WARN+0x%x\n",
    705  1.21  riastrad 			    __func__, code & ~TPM2_RC_WARN);
    706  1.21  riastrad 			rv = 0;
    707  1.21  riastrad 		} else {
    708  1.21  riastrad 			device_printf(sc->sc_dev, "bad tpm response:"
    709  1.21  riastrad 			    " tag=%u len=%u code=0x%x\n", tag, pktlen, code);
    710  1.21  riastrad 			hexdump(aprint_debug, "tpm response header",
    711  1.21  riastrad 			    (const void *)&response.hdr,
    712  1.21  riastrad 			    sizeof(response.hdr));
    713  1.21  riastrad 			rv = EIO;
    714  1.21  riastrad 		}
    715  1.21  riastrad 		goto out;
    716  1.21  riastrad 	}
    717  1.21  riastrad 
    718  1.21  riastrad 	/* Read the response payload.  */
    719  1.21  riastrad 	if ((rv = (*sc->sc_intf->read)(sc,
    720  1.21  riastrad 		    (char *)&response + nread, pktlen - nread,
    721  1.21  riastrad 		    NULL, TPM_PARAM_SIZE)) != 0) {
    722  1.21  riastrad 		device_printf(sc->sc_dev, "read failed, error=%d\n", rv);
    723  1.21  riastrad 		goto out;
    724  1.21  riastrad 	}
    725  1.21  riastrad 	endread = false;
    726  1.21  riastrad 	if ((rv = (*sc->sc_intf->end)(sc, UIO_READ, 0)) != 0) {
    727  1.21  riastrad 		device_printf(sc->sc_dev, "end read failed, error=%d\n", rv);
    728  1.21  riastrad 		goto out;
    729  1.21  riastrad 	}
    730  1.21  riastrad 
    731  1.21  riastrad 	/* Verify the number of bytes read looks sensible.  */
    732  1.21  riastrad 	nbytes = be16toh(response.randomBytesSize);
    733  1.21  riastrad 	if (nbytes > pktlen - offsetof(struct response, bytes)) {
    734  1.21  riastrad 		device_printf(sc->sc_dev, "overlong GetRandom length:"
    735  1.21  riastrad 		    " %u, max %zu\n",
    736  1.21  riastrad 		    nbytes, pktlen - offsetof(struct response, bytes));
    737  1.21  riastrad 		nbytes = pktlen - offsetof(struct response, bytes);
    738  1.21  riastrad 	}
    739  1.21  riastrad 
    740  1.21  riastrad 	/*
    741  1.21  riastrad 	 * Enter the data into the entropy pool.  Conservatively (or,
    742  1.21  riastrad 	 * perhaps, cargocultily) estimate half a bit of entropy per
    743  1.21  riastrad 	 * bit of data.
    744  1.21  riastrad 	 */
    745  1.21  riastrad 	CTASSERT(sizeof(response.bytes) <= UINT_MAX/(NBBY/2));
    746  1.21  riastrad 	entropybits = (NBBY/2)*nbytes;
    747  1.21  riastrad 	rnd_add_data(&sc->sc_rnd, response.bytes, nbytes, entropybits);
    748  1.21  riastrad 
    749  1.21  riastrad out:	/* End the read or write if still ongoing.  */
    750  1.21  riastrad 	if (endread)
    751  1.21  riastrad 		rv = (*sc->sc_intf->end)(sc, UIO_READ, rv);
    752  1.21  riastrad 	if (endwrite)
    753  1.21  riastrad 		rv = (*sc->sc_intf->end)(sc, UIO_WRITE, rv);
    754  1.21  riastrad 
    755  1.21  riastrad 	*entropybitsp = entropybits;
    756  1.21  riastrad 	return rv;
    757  1.21  riastrad }
    758  1.21  riastrad 
    759  1.21  riastrad static void
    760  1.21  riastrad tpm_rng_work(struct work *wk, void *cookie)
    761  1.21  riastrad {
    762  1.21  riastrad 	struct tpm_softc *sc = cookie;
    763  1.21  riastrad 	unsigned nbytes, entropybits;
    764  1.21  riastrad 	int rv;
    765  1.21  riastrad 
    766  1.21  riastrad 	/* Acknowledge the request.  */
    767  1.21  riastrad 	nbytes = atomic_swap_uint(&sc->sc_rndpending, 0);
    768  1.21  riastrad 
    769  1.24  riastrad 	/* Lock the tpm while we do I/O transactions with it.  */
    770  1.21  riastrad 	mutex_enter(&sc->sc_lock);
    771  1.21  riastrad 
    772  1.21  riastrad 	/*
    773  1.21  riastrad 	 * Issue as many commands as needed to fulfill the request, but
    774  1.21  riastrad 	 * stop if anything fails.
    775  1.21  riastrad 	 */
    776  1.21  riastrad 	for (; nbytes; nbytes -= MIN(nbytes, MAX(1, entropybits/NBBY))) {
    777  1.21  riastrad 		switch (sc->sc_ver) {
    778  1.21  riastrad 		case TPM_1_2:
    779  1.21  riastrad 			rv = tpm12_rng(sc, &entropybits);
    780  1.21  riastrad 			break;
    781  1.21  riastrad 		case TPM_2_0:
    782  1.21  riastrad 			rv = tpm20_rng(sc, &entropybits);
    783  1.21  riastrad 			break;
    784  1.21  riastrad 		default:
    785  1.21  riastrad 			panic("bad tpm version: %d", sc->sc_ver);
    786  1.21  riastrad 		}
    787  1.21  riastrad 		if (rv)
    788  1.21  riastrad 			break;
    789  1.21  riastrad 	}
    790  1.19  riastrad 
    791  1.21  riastrad 	/*
    792  1.19  riastrad 	 * If the tpm is busted, no sense in trying again -- most
    793  1.19  riastrad 	 * likely, it is deactivated, and by the spec it cannot be
    794  1.19  riastrad 	 * reactivated until after a reboot.
    795  1.19  riastrad 	 */
    796  1.19  riastrad 	if (rv) {
    797  1.19  riastrad 		device_printf(sc->sc_dev, "deactivating entropy source\n");
    798  1.23  riastrad 		atomic_store_relaxed(&sc->sc_rnddisabled, true);
    799  1.19  riastrad 		/* XXX worker thread can't workqueue_destroy its own queue */
    800  1.19  riastrad 	}
    801  1.19  riastrad 
    802  1.24  riastrad 	/* Relinquish the tpm.  */
    803  1.19  riastrad 	mutex_exit(&sc->sc_lock);
    804  1.19  riastrad }
    805  1.19  riastrad 
    806  1.19  riastrad static void
    807  1.21  riastrad tpm_rng_get(size_t nbytes, void *cookie)
    808  1.19  riastrad {
    809  1.19  riastrad 	struct tpm_softc *sc = cookie;
    810  1.19  riastrad 
    811  1.23  riastrad 	if (atomic_load_relaxed(&sc->sc_rnddisabled))
    812  1.23  riastrad 		return;		/* tough */
    813  1.21  riastrad 	if (atomic_swap_uint(&sc->sc_rndpending, MIN(nbytes, UINT_MAX/NBBY))
    814  1.21  riastrad 	    == 0)
    815  1.19  riastrad 		workqueue_enqueue(sc->sc_rndwq, &sc->sc_rndwk, NULL);
    816  1.19  riastrad }
    817  1.19  riastrad 
    818  1.16      maxv static int
    819  1.14      maxv tpm_tis12_init(struct tpm_softc *sc)
    820  1.13      maxv {
    821  1.16      maxv 	int rv;
    822  1.16      maxv 
    823  1.14      maxv 	sc->sc_caps = bus_space_read_4(sc->sc_bt, sc->sc_bh,
    824  1.13      maxv 	    TPM_INTF_CAPABILITY);
    825  1.13      maxv 	sc->sc_devid = bus_space_read_4(sc->sc_bt, sc->sc_bh, TPM_ID);
    826  1.13      maxv 	sc->sc_rev = bus_space_read_1(sc->sc_bt, sc->sc_bh, TPM_REV);
    827  1.13      maxv 
    828  1.14      maxv 	aprint_normal_dev(sc->sc_dev, "device 0x%08x rev 0x%x\n",
    829  1.14      maxv 	    sc->sc_devid, sc->sc_rev);
    830  1.13      maxv 
    831  1.16      maxv 	if ((rv = tpm12_request_locality(sc, 0)) != 0)
    832  1.16      maxv 		return rv;
    833  1.13      maxv 
    834  1.13      maxv 	/* Abort whatever it thought it was doing. */
    835  1.13      maxv 	bus_space_write_1(sc->sc_bt, sc->sc_bh, TPM_STS, TPM_STS_CMD_READY);
    836  1.13      maxv 
    837  1.19  riastrad 	/* XXX Run this at higher priority?  */
    838  1.19  riastrad 	if ((rv = workqueue_create(&sc->sc_rndwq, device_xname(sc->sc_dev),
    839  1.21  riastrad 		    tpm_rng_work, sc, PRI_NONE, IPL_VM, WQ_MPSAFE)) != 0)
    840  1.19  riastrad 		return rv;
    841  1.21  riastrad 	rndsource_setcb(&sc->sc_rnd, tpm_rng_get, sc);
    842  1.19  riastrad 	rnd_attach_source(&sc->sc_rnd, device_xname(sc->sc_dev),
    843  1.19  riastrad 	    RND_TYPE_RNG,
    844  1.19  riastrad 	    RND_FLAG_COLLECT_VALUE|RND_FLAG_ESTIMATE_VALUE|RND_FLAG_HASCB);
    845  1.19  riastrad 
    846  1.13      maxv 	return 0;
    847  1.13      maxv }
    848  1.13      maxv 
    849  1.16      maxv static int
    850  1.14      maxv tpm_tis12_start(struct tpm_softc *sc, int rw)
    851   1.1  christos {
    852   1.1  christos 	int rv;
    853   1.1  christos 
    854  1.14      maxv 	if (rw == UIO_READ) {
    855   1.1  christos 		rv = tpm_waitfor(sc, TPM_STS_DATA_AVAIL | TPM_STS_VALID,
    856  1.16      maxv 		    TPM_READ_TMO, sc->sc_intf->read);
    857   1.1  christos 		return rv;
    858   1.1  christos 	}
    859   1.1  christos 
    860  1.13      maxv 	/* Request the 0th locality. */
    861  1.16      maxv 	if ((rv = tpm12_request_locality(sc, 0)) != 0)
    862   1.1  christos 		return rv;
    863   1.1  christos 
    864  1.13      maxv 	sc->sc_status = tpm_status(sc);
    865  1.13      maxv 	if (sc->sc_status & TPM_STS_CMD_READY)
    866   1.1  christos 		return 0;
    867   1.1  christos 
    868   1.1  christos 	/* Abort previous and restart. */
    869   1.1  christos 	bus_space_write_1(sc->sc_bt, sc->sc_bh, TPM_STS, TPM_STS_CMD_READY);
    870  1.16      maxv 	rv = tpm_waitfor(sc, TPM_STS_CMD_READY, TPM_READY_TMO, sc->sc_intf->write);
    871  1.13      maxv 	if (rv)
    872   1.1  christos 		return rv;
    873   1.1  christos 
    874   1.1  christos 	return 0;
    875   1.1  christos }
    876   1.1  christos 
    877  1.16      maxv static int
    878   1.3  christos tpm_tis12_read(struct tpm_softc *sc, void *buf, size_t len, size_t *count,
    879   1.1  christos     int flags)
    880   1.1  christos {
    881   1.1  christos 	uint8_t *p = buf;
    882   1.1  christos 	size_t cnt;
    883  1.14      maxv 	int rv, n;
    884   1.1  christos 
    885   1.1  christos 	cnt = 0;
    886   1.1  christos 	while (len > 0) {
    887  1.13      maxv 		rv = tpm_waitfor(sc, TPM_STS_DATA_AVAIL | TPM_STS_VALID,
    888  1.16      maxv 		    TPM_READ_TMO, sc->sc_intf->read);
    889  1.13      maxv 		if (rv)
    890   1.1  christos 			return rv;
    891   1.1  christos 
    892  1.14      maxv 		n = MIN(len, tpm_getburst(sc));
    893  1.14      maxv 		while (n > 0) {
    894   1.1  christos 			*p++ = bus_space_read_1(sc->sc_bt, sc->sc_bh, TPM_DATA);
    895   1.1  christos 			cnt++;
    896  1.14      maxv 			len--;
    897  1.14      maxv 			n--;
    898   1.1  christos 		}
    899   1.1  christos 
    900   1.1  christos 		if ((flags & TPM_PARAM_SIZE) == 0 && cnt >= 6)
    901   1.1  christos 			break;
    902   1.1  christos 	}
    903   1.1  christos 
    904   1.1  christos 	if (count)
    905   1.1  christos 		*count = cnt;
    906   1.1  christos 
    907   1.1  christos 	return 0;
    908   1.1  christos }
    909   1.1  christos 
    910  1.16      maxv static int
    911   1.3  christos tpm_tis12_write(struct tpm_softc *sc, const void *buf, size_t len)
    912   1.1  christos {
    913   1.3  christos 	const uint8_t *p = buf;
    914   1.1  christos 	size_t cnt;
    915   1.1  christos 	int rv, r;
    916   1.1  christos 
    917   1.3  christos 	if (len == 0)
    918   1.3  christos 		return 0;
    919  1.16      maxv 	if ((rv = tpm12_request_locality(sc, 0)) != 0)
    920   1.1  christos 		return rv;
    921   1.1  christos 
    922   1.1  christos 	cnt = 0;
    923   1.1  christos 	while (cnt < len - 1) {
    924   1.1  christos 		for (r = tpm_getburst(sc); r > 0 && cnt < len - 1; r--) {
    925   1.1  christos 			bus_space_write_1(sc->sc_bt, sc->sc_bh, TPM_DATA, *p++);
    926   1.1  christos 			cnt++;
    927   1.1  christos 		}
    928   1.1  christos 		if ((rv = tpm_waitfor(sc, TPM_STS_VALID, TPM_READ_TMO, sc))) {
    929   1.1  christos 			return rv;
    930   1.1  christos 		}
    931  1.13      maxv 		sc->sc_status = tpm_status(sc);
    932  1.13      maxv 		if (!(sc->sc_status & TPM_STS_DATA_EXPECT)) {
    933   1.1  christos 			return EIO;
    934   1.1  christos 		}
    935   1.1  christos 	}
    936   1.1  christos 
    937   1.1  christos 	bus_space_write_1(sc->sc_bt, sc->sc_bh, TPM_DATA, *p++);
    938   1.1  christos 	cnt++;
    939   1.1  christos 
    940   1.1  christos 	if ((rv = tpm_waitfor(sc, TPM_STS_VALID, TPM_READ_TMO, sc))) {
    941   1.1  christos 		return rv;
    942   1.1  christos 	}
    943  1.13      maxv 	if ((sc->sc_status & TPM_STS_DATA_EXPECT) != 0) {
    944   1.1  christos 		return EIO;
    945   1.1  christos 	}
    946   1.1  christos 
    947   1.1  christos 	return 0;
    948   1.1  christos }
    949   1.1  christos 
    950  1.16      maxv static int
    951  1.14      maxv tpm_tis12_end(struct tpm_softc *sc, int rw, int err)
    952   1.1  christos {
    953   1.1  christos 	int rv = 0;
    954   1.1  christos 
    955  1.14      maxv 	if (rw == UIO_READ) {
    956  1.16      maxv 		rv = tpm_waitfor(sc, TPM_STS_VALID, TPM_READ_TMO, sc->sc_intf->read);
    957  1.13      maxv 		if (rv)
    958  1.22  riastrad 			goto out;
    959   1.1  christos 
    960   1.1  christos 		/* Still more data? */
    961  1.13      maxv 		sc->sc_status = tpm_status(sc);
    962  1.14      maxv 		if (!err && (sc->sc_status & TPM_STS_DATA_AVAIL)) {
    963   1.1  christos 			rv = EIO;
    964   1.1  christos 		}
    965   1.1  christos 
    966   1.1  christos 		bus_space_write_1(sc->sc_bt, sc->sc_bh, TPM_STS,
    967   1.1  christos 		    TPM_STS_CMD_READY);
    968   1.1  christos 
    969  1.13      maxv 		/* Release the 0th locality. */
    970  1.13      maxv 		bus_space_write_1(sc->sc_bt, sc->sc_bh, TPM_ACCESS,
    971   1.1  christos 		    TPM_ACCESS_ACTIVE_LOCALITY);
    972   1.1  christos 	} else {
    973   1.1  christos 		/* Hungry for more? */
    974  1.13      maxv 		sc->sc_status = tpm_status(sc);
    975  1.13      maxv 		if (!err && (sc->sc_status & TPM_STS_DATA_EXPECT)) {
    976   1.1  christos 			rv = EIO;
    977   1.1  christos 		}
    978   1.1  christos 
    979   1.1  christos 		bus_space_write_1(sc->sc_bt, sc->sc_bh, TPM_STS,
    980   1.1  christos 		    err ? TPM_STS_CMD_READY : TPM_STS_GO);
    981   1.1  christos 	}
    982   1.1  christos 
    983  1.22  riastrad out:	return err ? err : rv;
    984   1.1  christos }
    985   1.1  christos 
    986  1.16      maxv const struct tpm_intf tpm_intf_tis12 = {
    987  1.16      maxv 	.version = TIS_1_2,
    988  1.16      maxv 	.probe = tpm_tis12_probe,
    989  1.16      maxv 	.init = tpm_tis12_init,
    990  1.16      maxv 	.start = tpm_tis12_start,
    991  1.16      maxv 	.read = tpm_tis12_read,
    992  1.16      maxv 	.write = tpm_tis12_write,
    993  1.16      maxv 	.end = tpm_tis12_end
    994  1.16      maxv };
    995  1.16      maxv 
    996  1.13      maxv /* -------------------------------------------------------------------------- */
    997   1.1  christos 
    998  1.13      maxv static dev_type_open(tpmopen);
    999  1.13      maxv static dev_type_close(tpmclose);
   1000  1.13      maxv static dev_type_read(tpmread);
   1001  1.13      maxv static dev_type_write(tpmwrite);
   1002  1.13      maxv static dev_type_ioctl(tpmioctl);
   1003   1.1  christos 
   1004  1.13      maxv const struct cdevsw tpm_cdevsw = {
   1005  1.13      maxv 	.d_open = tpmopen,
   1006  1.13      maxv 	.d_close = tpmclose,
   1007  1.13      maxv 	.d_read = tpmread,
   1008  1.13      maxv 	.d_write = tpmwrite,
   1009  1.13      maxv 	.d_ioctl = tpmioctl,
   1010  1.13      maxv 	.d_stop = nostop,
   1011  1.13      maxv 	.d_tty = notty,
   1012  1.13      maxv 	.d_poll = nopoll,
   1013  1.13      maxv 	.d_mmap = nommap,
   1014  1.13      maxv 	.d_kqfilter = nokqfilter,
   1015  1.13      maxv 	.d_discard = nodiscard,
   1016  1.14      maxv 	.d_flag = D_OTHER | D_MPSAFE,
   1017  1.13      maxv };
   1018   1.1  christos 
   1019  1.13      maxv static int
   1020   1.1  christos tpmopen(dev_t dev, int flag, int mode, struct lwp *l)
   1021   1.1  christos {
   1022  1.14      maxv 	struct tpm_softc *sc = device_lookup_private(&tpm_cd, minor(dev));
   1023  1.14      maxv 	int ret = 0;
   1024   1.1  christos 
   1025  1.13      maxv 	if (sc == NULL)
   1026   1.1  christos 		return ENXIO;
   1027   1.1  christos 
   1028  1.14      maxv 	mutex_enter(&sc->sc_lock);
   1029  1.14      maxv 	if (sc->sc_busy) {
   1030  1.14      maxv 		ret = EBUSY;
   1031  1.14      maxv 	} else {
   1032  1.14      maxv 		sc->sc_busy = true;
   1033  1.14      maxv 	}
   1034  1.14      maxv 	mutex_exit(&sc->sc_lock);
   1035   1.1  christos 
   1036  1.14      maxv 	return ret;
   1037   1.1  christos }
   1038   1.1  christos 
   1039  1.13      maxv static int
   1040   1.1  christos tpmclose(dev_t dev, int flag, int mode, struct lwp *l)
   1041   1.1  christos {
   1042  1.14      maxv 	struct tpm_softc *sc = device_lookup_private(&tpm_cd, minor(dev));
   1043  1.14      maxv 	int ret = 0;
   1044   1.1  christos 
   1045  1.13      maxv 	if (sc == NULL)
   1046   1.1  christos 		return ENXIO;
   1047   1.1  christos 
   1048  1.14      maxv 	mutex_enter(&sc->sc_lock);
   1049  1.14      maxv 	if (!sc->sc_busy) {
   1050  1.14      maxv 		ret = EINVAL;
   1051  1.14      maxv 	} else {
   1052  1.14      maxv 		sc->sc_busy = false;
   1053  1.14      maxv 	}
   1054  1.14      maxv 	mutex_exit(&sc->sc_lock);
   1055   1.1  christos 
   1056  1.14      maxv 	return ret;
   1057   1.1  christos }
   1058   1.1  christos 
   1059  1.13      maxv static int
   1060   1.1  christos tpmread(dev_t dev, struct uio *uio, int flags)
   1061   1.1  christos {
   1062  1.14      maxv 	struct tpm_softc *sc = device_lookup_private(&tpm_cd, minor(dev));
   1063  1.15      maxv 	struct tpm_header hdr;
   1064  1.14      maxv 	uint8_t buf[TPM_BUFSIZ];
   1065  1.24  riastrad 	size_t cnt, len = 0/*XXXGCC*/;
   1066  1.24  riastrad 	bool end = false;
   1067  1.14      maxv 	int rv;
   1068   1.1  christos 
   1069  1.13      maxv 	if (sc == NULL)
   1070   1.1  christos 		return ENXIO;
   1071   1.1  christos 
   1072  1.24  riastrad 	mutex_enter(&sc->sc_lock);
   1073  1.24  riastrad 
   1074  1.16      maxv 	if ((rv = (*sc->sc_intf->start)(sc, UIO_READ)))
   1075  1.24  riastrad 		goto out;
   1076  1.24  riastrad 	end = true;
   1077   1.1  christos 
   1078  1.14      maxv 	/* Get the header. */
   1079  1.16      maxv 	if ((rv = (*sc->sc_intf->read)(sc, &hdr, sizeof(hdr), &cnt, 0))) {
   1080   1.3  christos 		goto out;
   1081   1.1  christos 	}
   1082  1.24  riastrad 	if (cnt != sizeof(hdr)) {
   1083  1.24  riastrad 		rv = EIO;
   1084  1.24  riastrad 		goto out;
   1085  1.24  riastrad 	}
   1086  1.25  riastrad 	len = be32toh(hdr.length);
   1087  1.24  riastrad 	if (len > MIN(sizeof(buf), uio->uio_resid) || len < sizeof(hdr)) {
   1088   1.1  christos 		rv = EIO;
   1089   1.3  christos 		goto out;
   1090   1.1  christos 	}
   1091   1.1  christos 
   1092  1.24  riastrad 	/* Get the payload. */
   1093  1.24  riastrad 	len -= sizeof(hdr);
   1094  1.24  riastrad 	if ((rv = (*sc->sc_intf->read)(sc, buf, len, NULL, TPM_PARAM_SIZE))) {
   1095  1.24  riastrad 		goto out;
   1096  1.24  riastrad 	}
   1097  1.24  riastrad 
   1098  1.24  riastrad out:	if (end)
   1099  1.24  riastrad 		rv = (*sc->sc_intf->end)(sc, UIO_READ, rv);
   1100  1.24  riastrad 
   1101  1.24  riastrad 	mutex_exit(&sc->sc_lock);
   1102  1.24  riastrad 
   1103  1.24  riastrad 	/* If anything went wrong, stop here -- nothing to copy out. */
   1104  1.24  riastrad 	if (rv)
   1105  1.24  riastrad 		return rv;
   1106  1.24  riastrad 
   1107  1.14      maxv 	/* Copy out the header. */
   1108  1.24  riastrad 	if ((rv = uiomove(&hdr, sizeof(hdr), uio))) {
   1109  1.24  riastrad 		return rv;
   1110   1.1  christos 	}
   1111   1.1  christos 
   1112  1.24  riastrad 	/* Copy out the payload.  */
   1113  1.24  riastrad 	if ((rv = uiomove(buf, len, uio))) {
   1114  1.24  riastrad 		return rv;
   1115   1.1  christos 	}
   1116   1.1  christos 
   1117  1.24  riastrad 	/* Success! */
   1118  1.24  riastrad 	return 0;
   1119   1.1  christos }
   1120   1.1  christos 
   1121  1.13      maxv static int
   1122   1.1  christos tpmwrite(dev_t dev, struct uio *uio, int flags)
   1123   1.1  christos {
   1124  1.14      maxv 	struct tpm_softc *sc = device_lookup_private(&tpm_cd, minor(dev));
   1125   1.1  christos 	uint8_t buf[TPM_BUFSIZ];
   1126  1.24  riastrad 	bool end = false;
   1127  1.14      maxv 	int n, rv;
   1128   1.1  christos 
   1129  1.13      maxv 	if (sc == NULL)
   1130   1.1  christos 		return ENXIO;
   1131   1.1  christos 
   1132   1.1  christos 	n = MIN(sizeof(buf), uio->uio_resid);
   1133   1.1  christos 	if ((rv = uiomove(buf, n, uio))) {
   1134  1.24  riastrad 		return rv;
   1135   1.1  christos 	}
   1136  1.24  riastrad 
   1137  1.24  riastrad 	mutex_enter(&sc->sc_lock);
   1138  1.24  riastrad 
   1139  1.16      maxv 	if ((rv = (*sc->sc_intf->start)(sc, UIO_WRITE))) {
   1140  1.13      maxv 		goto out;
   1141   1.1  christos 	}
   1142  1.24  riastrad 	end = true;
   1143  1.24  riastrad 
   1144  1.16      maxv 	if ((rv = (*sc->sc_intf->write)(sc, buf, n))) {
   1145  1.13      maxv 		goto out;
   1146   1.1  christos 	}
   1147   1.1  christos 
   1148  1.24  riastrad out:	if (end)
   1149  1.24  riastrad 		rv = (*sc->sc_intf->end)(sc, UIO_WRITE, rv);
   1150  1.24  riastrad 
   1151  1.24  riastrad 	mutex_exit(&sc->sc_lock);
   1152   1.1  christos 	return rv;
   1153   1.1  christos }
   1154   1.1  christos 
   1155  1.13      maxv static int
   1156  1.13      maxv tpmioctl(dev_t dev, u_long cmd, void *addr, int flag, struct lwp *l)
   1157   1.1  christos {
   1158  1.14      maxv 	struct tpm_softc *sc = device_lookup_private(&tpm_cd, minor(dev));
   1159  1.13      maxv 	struct tpm_ioc_getinfo *info;
   1160  1.13      maxv 
   1161  1.13      maxv 	if (sc == NULL)
   1162  1.13      maxv 		return ENXIO;
   1163  1.13      maxv 
   1164  1.13      maxv 	switch (cmd) {
   1165  1.13      maxv 	case TPM_IOC_GETINFO:
   1166  1.13      maxv 		info = addr;
   1167  1.13      maxv 		info->api_version = TPM_API_VERSION;
   1168  1.13      maxv 		info->tpm_version = sc->sc_ver;
   1169  1.16      maxv 		info->itf_version = sc->sc_intf->version;
   1170  1.13      maxv 		info->device_id = sc->sc_devid;
   1171  1.13      maxv 		info->device_rev = sc->sc_rev;
   1172  1.14      maxv 		info->device_caps = sc->sc_caps;
   1173  1.13      maxv 		return 0;
   1174  1.13      maxv 	default:
   1175  1.13      maxv 		break;
   1176  1.13      maxv 	}
   1177  1.13      maxv 
   1178   1.1  christos 	return ENOTTY;
   1179   1.1  christos }
   1180