tpm.c revision 1.27 1 1.27 thorpej /* $NetBSD: tpm.c,v 1.27 2022/09/25 18:43:32 thorpej Exp $ */
2 1.13 maxv
3 1.13 maxv /*
4 1.13 maxv * Copyright (c) 2019 The NetBSD Foundation, Inc.
5 1.13 maxv * All rights reserved.
6 1.13 maxv *
7 1.13 maxv * This code is derived from software contributed to The NetBSD Foundation
8 1.13 maxv * by Maxime Villard.
9 1.13 maxv *
10 1.13 maxv * Redistribution and use in source and binary forms, with or without
11 1.13 maxv * modification, are permitted provided that the following conditions
12 1.13 maxv * are met:
13 1.13 maxv * 1. Redistributions of source code must retain the above copyright
14 1.13 maxv * notice, this list of conditions and the following disclaimer.
15 1.13 maxv * 2. Redistributions in binary form must reproduce the above copyright
16 1.13 maxv * notice, this list of conditions and the following disclaimer in the
17 1.13 maxv * documentation and/or other materials provided with the distribution.
18 1.13 maxv *
19 1.13 maxv * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
20 1.13 maxv * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
21 1.13 maxv * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
22 1.13 maxv * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
23 1.13 maxv * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
24 1.13 maxv * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
25 1.13 maxv * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
26 1.13 maxv * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
27 1.13 maxv * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
28 1.13 maxv * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
29 1.13 maxv * POSSIBILITY OF SUCH DAMAGE.
30 1.13 maxv */
31 1.13 maxv
32 1.1 christos /*
33 1.1 christos * Copyright (c) 2008, 2009 Michael Shalayeff
34 1.13 maxv * Copyright (c) 2009, 2010 Hans-Joerg Hoexer
35 1.1 christos * All rights reserved.
36 1.1 christos *
37 1.1 christos * Permission to use, copy, modify, and distribute this software for any
38 1.1 christos * purpose with or without fee is hereby granted, provided that the above
39 1.1 christos * copyright notice and this permission notice appear in all copies.
40 1.1 christos *
41 1.1 christos * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
42 1.1 christos * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
43 1.1 christos * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
44 1.1 christos * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
45 1.1 christos * WHATSOEVER RESULTING FROM LOSS OF MIND, USE, DATA OR PROFITS, WHETHER IN
46 1.1 christos * AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT
47 1.1 christos * OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
48 1.1 christos */
49 1.1 christos
50 1.1 christos #include <sys/cdefs.h>
51 1.27 thorpej __KERNEL_RCSID(0, "$NetBSD: tpm.c,v 1.27 2022/09/25 18:43:32 thorpej Exp $");
52 1.1 christos
53 1.1 christos #include <sys/param.h>
54 1.17 riastrad #include <sys/types.h>
55 1.17 riastrad
56 1.19 riastrad #include <sys/atomic.h>
57 1.17 riastrad #include <sys/bus.h>
58 1.17 riastrad #include <sys/conf.h>
59 1.17 riastrad #include <sys/device.h>
60 1.1 christos #include <sys/kernel.h>
61 1.17 riastrad #include <sys/pmf.h>
62 1.1 christos #include <sys/proc.h>
63 1.17 riastrad #include <sys/systm.h>
64 1.19 riastrad #include <sys/workqueue.h>
65 1.1 christos
66 1.1 christos #include <dev/ic/tpmreg.h>
67 1.1 christos #include <dev/ic/tpmvar.h>
68 1.1 christos
69 1.12 riastrad #include "ioconf.h"
70 1.12 riastrad
71 1.15 maxv CTASSERT(sizeof(struct tpm_header) == 10);
72 1.15 maxv
73 1.13 maxv #define TPM_BUFSIZ 1024
74 1.14 maxv
75 1.13 maxv #define TPM_PARAM_SIZE 0x0001 /* that's a flag */
76 1.13 maxv
77 1.13 maxv /* Timeouts. */
78 1.13 maxv #define TPM_ACCESS_TMO 2000 /* 2sec */
79 1.13 maxv #define TPM_READY_TMO 2000 /* 2sec */
80 1.13 maxv #define TPM_READ_TMO 2000 /* 2sec */
81 1.13 maxv #define TPM_BURST_TMO 2000 /* 2sec */
82 1.13 maxv
83 1.13 maxv #define TPM_CAPS_REQUIRED \
84 1.13 maxv (TPM_INTF_DATA_AVAIL_INT|TPM_INTF_LOCALITY_CHANGE_INT| \
85 1.13 maxv TPM_INTF_INT_LEVEL_LOW)
86 1.1 christos
87 1.13 maxv static inline int
88 1.13 maxv tpm_tmotohz(int tmo)
89 1.1 christos {
90 1.13 maxv struct timeval tv;
91 1.1 christos
92 1.13 maxv tv.tv_sec = tmo / 1000;
93 1.13 maxv tv.tv_usec = 1000 * (tmo % 1000);
94 1.1 christos
95 1.13 maxv return tvtohz(&tv);
96 1.1 christos }
97 1.1 christos
98 1.13 maxv static int
99 1.1 christos tpm_getburst(struct tpm_softc *sc)
100 1.1 christos {
101 1.1 christos int burst, to, rv;
102 1.1 christos
103 1.1 christos to = tpm_tmotohz(TPM_BURST_TMO);
104 1.1 christos
105 1.13 maxv while (to--) {
106 1.1 christos /*
107 1.13 maxv * Burst count is in bits 23:8, so read the two higher bytes.
108 1.1 christos */
109 1.1 christos burst = bus_space_read_1(sc->sc_bt, sc->sc_bh, TPM_STS + 1);
110 1.1 christos burst |= bus_space_read_1(sc->sc_bt, sc->sc_bh, TPM_STS + 2)
111 1.1 christos << 8;
112 1.13 maxv
113 1.1 christos if (burst)
114 1.1 christos return burst;
115 1.1 christos
116 1.14 maxv rv = tsleep(sc, PCATCH, "tpm_getburst", 1);
117 1.1 christos if (rv && rv != EWOULDBLOCK) {
118 1.1 christos return 0;
119 1.1 christos }
120 1.1 christos }
121 1.1 christos
122 1.1 christos return 0;
123 1.1 christos }
124 1.1 christos
125 1.13 maxv static inline uint8_t
126 1.1 christos tpm_status(struct tpm_softc *sc)
127 1.1 christos {
128 1.13 maxv return bus_space_read_1(sc->sc_bt, sc->sc_bh, TPM_STS) &
129 1.13 maxv TPM_STS_STATUS_BITS;
130 1.1 christos }
131 1.1 christos
132 1.13 maxv /* -------------------------------------------------------------------------- */
133 1.1 christos
134 1.15 maxv static bool
135 1.15 maxv tpm12_suspend(struct tpm_softc *sc)
136 1.15 maxv {
137 1.15 maxv static const uint8_t command[10] = {
138 1.15 maxv 0x00, 0xC1, /* TPM_TAG_RQU_COMMAND */
139 1.15 maxv 0x00, 0x00, 0x00, 10, /* Length in bytes */
140 1.15 maxv 0x00, 0x00, 0x00, 0x98 /* TPM_ORD_SaveState */
141 1.15 maxv };
142 1.15 maxv struct tpm_header response;
143 1.24 riastrad size_t nread;
144 1.24 riastrad bool endwrite = false, endread = false;
145 1.24 riastrad int error;
146 1.24 riastrad
147 1.24 riastrad /*
148 1.24 riastrad * Write the command.
149 1.24 riastrad */
150 1.24 riastrad error = (*sc->sc_intf->start)(sc, UIO_WRITE);
151 1.24 riastrad if (error) {
152 1.24 riastrad device_printf(sc->sc_dev, "start write failed: %d", error);
153 1.24 riastrad goto out;
154 1.24 riastrad }
155 1.24 riastrad
156 1.24 riastrad endwrite = true;
157 1.24 riastrad
158 1.24 riastrad error = (*sc->sc_intf->write)(sc, &command, sizeof(command));
159 1.24 riastrad if (error) {
160 1.24 riastrad device_printf(sc->sc_dev, "write TPM_ORD_SaveState failed: %d",
161 1.24 riastrad error);
162 1.24 riastrad goto out;
163 1.24 riastrad }
164 1.24 riastrad
165 1.24 riastrad endwrite = false;
166 1.24 riastrad
167 1.24 riastrad error = (*sc->sc_intf->end)(sc, UIO_WRITE, 0);
168 1.24 riastrad if (error) {
169 1.24 riastrad device_printf(sc->sc_dev, "end write failed: %d", error);
170 1.24 riastrad goto out;
171 1.24 riastrad }
172 1.24 riastrad
173 1.24 riastrad /*
174 1.24 riastrad * Read the response -- just the header; we don't expect a
175 1.24 riastrad * payload.
176 1.24 riastrad */
177 1.24 riastrad error = (*sc->sc_intf->start)(sc, UIO_READ);
178 1.24 riastrad if (error) {
179 1.24 riastrad device_printf(sc->sc_dev, "start read failed: %d", error);
180 1.24 riastrad goto out;
181 1.24 riastrad }
182 1.24 riastrad
183 1.24 riastrad endread = true;
184 1.24 riastrad
185 1.24 riastrad error = (*sc->sc_intf->read)(sc, &response, sizeof(response), &nread,
186 1.24 riastrad 0);
187 1.24 riastrad if (error) {
188 1.24 riastrad device_printf(sc->sc_dev, "read failed: %d", error);
189 1.24 riastrad goto out;
190 1.24 riastrad }
191 1.24 riastrad if (nread != sizeof(response)) {
192 1.24 riastrad device_printf(sc->sc_dev, "short header read: %zu", nread);
193 1.24 riastrad goto out;
194 1.24 riastrad }
195 1.24 riastrad
196 1.24 riastrad endread = false;
197 1.24 riastrad
198 1.24 riastrad error = (*sc->sc_intf->end)(sc, UIO_READ, 0);
199 1.24 riastrad if (error) {
200 1.24 riastrad device_printf(sc->sc_dev, "end read failed: %d", error);
201 1.24 riastrad goto out;
202 1.24 riastrad }
203 1.24 riastrad
204 1.24 riastrad /*
205 1.24 riastrad * Verify the response looks reasonable.
206 1.24 riastrad */
207 1.25 riastrad if (be16toh(response.tag) != TPM_TAG_RSP_COMMAND ||
208 1.25 riastrad be32toh(response.length) != sizeof(response) ||
209 1.25 riastrad be32toh(response.code) != 0) {
210 1.24 riastrad device_printf(sc->sc_dev,
211 1.24 riastrad "TPM_ORD_SaveState failed: tag=0x%x length=0x%x code=0x%x",
212 1.25 riastrad be16toh(response.tag),
213 1.25 riastrad be32toh(response.length),
214 1.25 riastrad be32toh(response.code));
215 1.24 riastrad error = EIO;
216 1.24 riastrad goto out;
217 1.24 riastrad }
218 1.24 riastrad
219 1.24 riastrad /* Success! */
220 1.24 riastrad error = 0;
221 1.15 maxv
222 1.24 riastrad out: if (endwrite)
223 1.24 riastrad error = (*sc->sc_intf->end)(sc, UIO_WRITE, error);
224 1.24 riastrad if (endread)
225 1.24 riastrad error = (*sc->sc_intf->end)(sc, UIO_READ, error);
226 1.24 riastrad if (error)
227 1.15 maxv return false;
228 1.15 maxv return true;
229 1.15 maxv }
230 1.1 christos
231 1.15 maxv static bool
232 1.15 maxv tpm20_suspend(struct tpm_softc *sc)
233 1.1 christos {
234 1.15 maxv static const uint8_t command[12] = {
235 1.15 maxv 0x80, 0x01, /* TPM_ST_NO_SESSIONS */
236 1.15 maxv 0x00, 0x00, 0x00, 12, /* Length in bytes */
237 1.15 maxv 0x00, 0x00, 0x01, 0x45, /* TPM_CC_Shutdown */
238 1.15 maxv 0x00, 0x01 /* TPM_SU_STATE */
239 1.1 christos };
240 1.15 maxv struct tpm_header response;
241 1.24 riastrad size_t nread;
242 1.24 riastrad bool endwrite = false, endread = false;
243 1.24 riastrad int error;
244 1.24 riastrad
245 1.24 riastrad /*
246 1.24 riastrad * Write the command.
247 1.24 riastrad */
248 1.24 riastrad error = (*sc->sc_intf->start)(sc, UIO_WRITE);
249 1.24 riastrad if (error) {
250 1.24 riastrad device_printf(sc->sc_dev, "start write failed: %d", error);
251 1.24 riastrad goto out;
252 1.24 riastrad }
253 1.24 riastrad
254 1.24 riastrad endwrite = true;
255 1.24 riastrad
256 1.24 riastrad error = (*sc->sc_intf->write)(sc, &command, sizeof(command));
257 1.24 riastrad if (error) {
258 1.24 riastrad device_printf(sc->sc_dev, "write TPM_ORD_SaveState failed: %d",
259 1.24 riastrad error);
260 1.24 riastrad goto out;
261 1.24 riastrad }
262 1.1 christos
263 1.24 riastrad endwrite = false;
264 1.24 riastrad
265 1.24 riastrad error = (*sc->sc_intf->end)(sc, UIO_WRITE, 0);
266 1.24 riastrad if (error) {
267 1.24 riastrad device_printf(sc->sc_dev, "end write failed: %d", error);
268 1.24 riastrad goto out;
269 1.24 riastrad }
270 1.24 riastrad
271 1.24 riastrad /*
272 1.24 riastrad * Read the response -- just the header; we don't expect a
273 1.24 riastrad * payload.
274 1.24 riastrad */
275 1.24 riastrad error = (*sc->sc_intf->start)(sc, UIO_READ);
276 1.24 riastrad if (error) {
277 1.24 riastrad device_printf(sc->sc_dev, "start read failed: %d", error);
278 1.24 riastrad goto out;
279 1.24 riastrad }
280 1.24 riastrad
281 1.24 riastrad endread = true;
282 1.24 riastrad
283 1.24 riastrad error = (*sc->sc_intf->read)(sc, &response, sizeof(response), &nread,
284 1.24 riastrad 0);
285 1.24 riastrad if (error) {
286 1.24 riastrad device_printf(sc->sc_dev, "read failed: %d", error);
287 1.24 riastrad goto out;
288 1.24 riastrad }
289 1.24 riastrad if (nread != sizeof(response)) {
290 1.24 riastrad device_printf(sc->sc_dev, "short header read: %zu", nread);
291 1.24 riastrad goto out;
292 1.24 riastrad }
293 1.24 riastrad
294 1.24 riastrad endread = false;
295 1.24 riastrad
296 1.24 riastrad error = (*sc->sc_intf->end)(sc, UIO_READ, 0);
297 1.24 riastrad if (error) {
298 1.24 riastrad device_printf(sc->sc_dev, "end read failed: %d", error);
299 1.24 riastrad goto out;
300 1.24 riastrad }
301 1.24 riastrad
302 1.24 riastrad /*
303 1.24 riastrad * Verify the response looks reasonable.
304 1.24 riastrad */
305 1.25 riastrad if (be16toh(response.tag) != TPM2_ST_NO_SESSIONS ||
306 1.25 riastrad be32toh(response.length) != sizeof(response) ||
307 1.25 riastrad be32toh(response.code) != TPM2_RC_SUCCESS) {
308 1.24 riastrad device_printf(sc->sc_dev,
309 1.24 riastrad "TPM_CC_Shutdown failed: tag=0x%x length=0x%x code=0x%x",
310 1.25 riastrad be16toh(response.tag),
311 1.25 riastrad be32toh(response.length),
312 1.25 riastrad be32toh(response.code));
313 1.24 riastrad error = EIO;
314 1.24 riastrad goto out;
315 1.24 riastrad }
316 1.24 riastrad
317 1.24 riastrad /* Success! */
318 1.24 riastrad error = 0;
319 1.24 riastrad
320 1.24 riastrad out: if (endwrite)
321 1.24 riastrad error = (*sc->sc_intf->end)(sc, UIO_WRITE, error);
322 1.24 riastrad if (endread)
323 1.24 riastrad error = (*sc->sc_intf->end)(sc, UIO_READ, error);
324 1.24 riastrad if (error)
325 1.15 maxv return false;
326 1.7 christos return true;
327 1.1 christos }
328 1.1 christos
329 1.1 christos bool
330 1.15 maxv tpm_suspend(device_t dev, const pmf_qual_t *qual)
331 1.1 christos {
332 1.15 maxv struct tpm_softc *sc = device_private(dev);
333 1.15 maxv
334 1.15 maxv switch (sc->sc_ver) {
335 1.15 maxv case TPM_1_2:
336 1.15 maxv return tpm12_suspend(sc);
337 1.15 maxv case TPM_2_0:
338 1.15 maxv return tpm20_suspend(sc);
339 1.15 maxv default:
340 1.15 maxv panic("%s: impossible", __func__);
341 1.15 maxv }
342 1.15 maxv }
343 1.15 maxv
344 1.15 maxv bool
345 1.15 maxv tpm_resume(device_t dev, const pmf_qual_t *qual)
346 1.15 maxv {
347 1.15 maxv /*
348 1.15 maxv * Don't do anything, the BIOS is supposed to restore the previously
349 1.15 maxv * saved state.
350 1.15 maxv */
351 1.7 christos return true;
352 1.1 christos }
353 1.1 christos
354 1.13 maxv /* -------------------------------------------------------------------------- */
355 1.13 maxv
356 1.13 maxv static int
357 1.14 maxv tpm_poll(struct tpm_softc *sc, uint8_t mask, int to, wchan_t chan)
358 1.1 christos {
359 1.1 christos int rv;
360 1.1 christos
361 1.13 maxv while (((sc->sc_status = tpm_status(sc)) & mask) != mask && to--) {
362 1.14 maxv rv = tsleep(chan, PCATCH, "tpm_poll", 1);
363 1.1 christos if (rv && rv != EWOULDBLOCK) {
364 1.1 christos return rv;
365 1.1 christos }
366 1.1 christos }
367 1.1 christos
368 1.1 christos return 0;
369 1.1 christos }
370 1.1 christos
371 1.13 maxv static int
372 1.13 maxv tpm_waitfor(struct tpm_softc *sc, uint8_t bits, int tmo, wchan_t chan)
373 1.1 christos {
374 1.13 maxv int retry, to, rv;
375 1.13 maxv uint8_t todo;
376 1.1 christos
377 1.14 maxv to = tpm_tmotohz(tmo);
378 1.13 maxv retry = 3;
379 1.13 maxv
380 1.1 christos restart:
381 1.14 maxv todo = bits;
382 1.14 maxv
383 1.1 christos /*
384 1.14 maxv * TPM_STS_VALID has priority over the others.
385 1.1 christos */
386 1.14 maxv if (todo & TPM_STS_VALID) {
387 1.14 maxv if ((rv = tpm_poll(sc, TPM_STS_VALID, to+1, chan)) != 0)
388 1.14 maxv return rv;
389 1.14 maxv todo &= ~TPM_STS_VALID;
390 1.14 maxv }
391 1.14 maxv
392 1.14 maxv if ((rv = tpm_poll(sc, todo, to, chan)) != 0)
393 1.1 christos return rv;
394 1.1 christos
395 1.13 maxv if ((todo & sc->sc_status) != todo) {
396 1.14 maxv if ((retry-- > 0) && (bits & TPM_STS_VALID)) {
397 1.1 christos bus_space_write_1(sc->sc_bt, sc->sc_bh, TPM_STS,
398 1.1 christos TPM_STS_RESP_RETRY);
399 1.1 christos goto restart;
400 1.1 christos }
401 1.1 christos return EIO;
402 1.1 christos }
403 1.1 christos
404 1.1 christos return 0;
405 1.1 christos }
406 1.1 christos
407 1.13 maxv /* -------------------------------------------------------------------------- */
408 1.13 maxv
409 1.13 maxv /*
410 1.16 maxv * TPM using the TIS 1.2 interface.
411 1.13 maxv */
412 1.13 maxv
413 1.16 maxv static int
414 1.16 maxv tpm12_request_locality(struct tpm_softc *sc, int l)
415 1.16 maxv {
416 1.16 maxv uint32_t r;
417 1.16 maxv int to, rv;
418 1.16 maxv
419 1.16 maxv if (l != 0)
420 1.16 maxv return EINVAL;
421 1.16 maxv
422 1.16 maxv if ((bus_space_read_1(sc->sc_bt, sc->sc_bh, TPM_ACCESS) &
423 1.16 maxv (TPM_ACCESS_VALID | TPM_ACCESS_ACTIVE_LOCALITY)) ==
424 1.16 maxv (TPM_ACCESS_VALID | TPM_ACCESS_ACTIVE_LOCALITY))
425 1.16 maxv return 0;
426 1.16 maxv
427 1.16 maxv bus_space_write_1(sc->sc_bt, sc->sc_bh, TPM_ACCESS,
428 1.16 maxv TPM_ACCESS_REQUEST_USE);
429 1.16 maxv
430 1.16 maxv to = tpm_tmotohz(TPM_ACCESS_TMO);
431 1.16 maxv
432 1.16 maxv while ((r = bus_space_read_1(sc->sc_bt, sc->sc_bh, TPM_ACCESS) &
433 1.16 maxv (TPM_ACCESS_VALID | TPM_ACCESS_ACTIVE_LOCALITY)) !=
434 1.16 maxv (TPM_ACCESS_VALID | TPM_ACCESS_ACTIVE_LOCALITY) && to--) {
435 1.16 maxv rv = tsleep(sc->sc_intf->init, PCATCH, "tpm_locality", 1);
436 1.16 maxv if (rv && rv != EWOULDBLOCK) {
437 1.16 maxv return rv;
438 1.16 maxv }
439 1.16 maxv }
440 1.16 maxv
441 1.16 maxv if ((r & (TPM_ACCESS_VALID | TPM_ACCESS_ACTIVE_LOCALITY)) !=
442 1.16 maxv (TPM_ACCESS_VALID | TPM_ACCESS_ACTIVE_LOCALITY)) {
443 1.16 maxv return EBUSY;
444 1.16 maxv }
445 1.16 maxv
446 1.16 maxv return 0;
447 1.16 maxv }
448 1.16 maxv
449 1.16 maxv static int
450 1.13 maxv tpm_tis12_probe(bus_space_tag_t bt, bus_space_handle_t bh)
451 1.13 maxv {
452 1.13 maxv uint32_t cap;
453 1.13 maxv uint8_t reg;
454 1.13 maxv int tmo;
455 1.13 maxv
456 1.13 maxv cap = bus_space_read_4(bt, bh, TPM_INTF_CAPABILITY);
457 1.13 maxv if (cap == 0xffffffff)
458 1.16 maxv return EINVAL;
459 1.13 maxv if ((cap & TPM_CAPS_REQUIRED) != TPM_CAPS_REQUIRED)
460 1.16 maxv return ENOTSUP;
461 1.13 maxv
462 1.13 maxv /* Request locality 0. */
463 1.13 maxv bus_space_write_1(bt, bh, TPM_ACCESS, TPM_ACCESS_REQUEST_USE);
464 1.13 maxv
465 1.13 maxv /* Wait for it to become active. */
466 1.13 maxv tmo = TPM_ACCESS_TMO; /* Milliseconds. */
467 1.13 maxv while ((reg = bus_space_read_1(bt, bh, TPM_ACCESS) &
468 1.13 maxv (TPM_ACCESS_VALID | TPM_ACCESS_ACTIVE_LOCALITY)) !=
469 1.13 maxv (TPM_ACCESS_VALID | TPM_ACCESS_ACTIVE_LOCALITY) && tmo--) {
470 1.13 maxv DELAY(1000); /* 1 millisecond. */
471 1.13 maxv }
472 1.13 maxv if ((reg & (TPM_ACCESS_VALID | TPM_ACCESS_ACTIVE_LOCALITY)) !=
473 1.13 maxv (TPM_ACCESS_VALID | TPM_ACCESS_ACTIVE_LOCALITY)) {
474 1.16 maxv return ETIMEDOUT;
475 1.13 maxv }
476 1.13 maxv
477 1.13 maxv if (bus_space_read_4(bt, bh, TPM_ID) == 0xffffffff)
478 1.16 maxv return EINVAL;
479 1.13 maxv
480 1.16 maxv return 0;
481 1.13 maxv }
482 1.13 maxv
483 1.21 riastrad static int
484 1.21 riastrad tpm12_rng(struct tpm_softc *sc, unsigned *entropybitsp)
485 1.19 riastrad {
486 1.19 riastrad /*
487 1.19 riastrad * TPM Specification Version 1.2, Main Part 3: Commands,
488 1.19 riastrad * Sec. 13.6 TPM_GetRandom
489 1.19 riastrad */
490 1.19 riastrad struct {
491 1.19 riastrad struct tpm_header hdr;
492 1.19 riastrad uint32_t bytesRequested;
493 1.19 riastrad } __packed command;
494 1.19 riastrad struct response {
495 1.19 riastrad struct tpm_header hdr;
496 1.19 riastrad uint32_t randomBytesSize;
497 1.19 riastrad uint8_t bytes[64];
498 1.19 riastrad } __packed response;
499 1.21 riastrad bool endwrite = false, endread = false;
500 1.19 riastrad size_t nread;
501 1.19 riastrad uint16_t tag;
502 1.21 riastrad uint32_t pktlen, code, nbytes, entropybits = 0;
503 1.19 riastrad int rv;
504 1.19 riastrad
505 1.19 riastrad /* Encode the command. */
506 1.19 riastrad memset(&command, 0, sizeof(command));
507 1.19 riastrad command.hdr.tag = htobe16(TPM_TAG_RQU_COMMAND);
508 1.19 riastrad command.hdr.length = htobe32(sizeof(command));
509 1.19 riastrad command.hdr.code = htobe32(TPM_ORD_GetRandom);
510 1.19 riastrad command.bytesRequested = htobe32(sizeof(response.bytes));
511 1.19 riastrad
512 1.19 riastrad /* Write the command. */
513 1.19 riastrad if ((rv = (*sc->sc_intf->start)(sc, UIO_WRITE)) != 0) {
514 1.19 riastrad device_printf(sc->sc_dev, "start write failed, error=%d\n",
515 1.19 riastrad rv);
516 1.19 riastrad goto out;
517 1.19 riastrad }
518 1.19 riastrad endwrite = true;
519 1.19 riastrad if ((rv = (*sc->sc_intf->write)(sc, &command, sizeof(command))) != 0) {
520 1.19 riastrad device_printf(sc->sc_dev, "write failed, error=%d\n", rv);
521 1.19 riastrad goto out;
522 1.19 riastrad }
523 1.19 riastrad rv = (*sc->sc_intf->end)(sc, UIO_WRITE, 0);
524 1.19 riastrad endwrite = false;
525 1.19 riastrad if (rv) {
526 1.19 riastrad device_printf(sc->sc_dev, "end write failed, error=%d\n", rv);
527 1.19 riastrad goto out;
528 1.19 riastrad }
529 1.19 riastrad
530 1.19 riastrad /* Read the response header. */
531 1.19 riastrad if ((rv = (*sc->sc_intf->start)(sc, UIO_READ)) != 0) {
532 1.19 riastrad device_printf(sc->sc_dev, "start write failed, error=%d\n",
533 1.19 riastrad rv);
534 1.19 riastrad goto out;
535 1.19 riastrad }
536 1.19 riastrad endread = true;
537 1.19 riastrad if ((rv = (*sc->sc_intf->read)(sc, &response.hdr, sizeof(response.hdr),
538 1.19 riastrad &nread, 0)) != 0) {
539 1.19 riastrad device_printf(sc->sc_dev, "read failed, error=%d\n", rv);
540 1.19 riastrad goto out;
541 1.19 riastrad }
542 1.19 riastrad
543 1.19 riastrad /* Verify the response header looks sensible. */
544 1.19 riastrad if (nread != sizeof(response.hdr)) {
545 1.26 khorben device_printf(sc->sc_dev, "read %zu bytes, expected %zu\n",
546 1.19 riastrad nread, sizeof(response.hdr));
547 1.19 riastrad goto out;
548 1.19 riastrad }
549 1.19 riastrad tag = be16toh(response.hdr.tag);
550 1.19 riastrad pktlen = be32toh(response.hdr.length);
551 1.19 riastrad code = be32toh(response.hdr.code);
552 1.19 riastrad if (tag != TPM_TAG_RSP_COMMAND ||
553 1.19 riastrad pktlen < offsetof(struct response, bytes) ||
554 1.19 riastrad pktlen > sizeof(response) ||
555 1.19 riastrad code != 0) {
556 1.19 riastrad /*
557 1.19 riastrad * If the tpm itself is busy (e.g., it has yet to run a
558 1.19 riastrad * self-test, or it's in a timeout period to defend
559 1.19 riastrad * against brute force attacks), then we can try again
560 1.19 riastrad * later. Otherwise, give up.
561 1.19 riastrad */
562 1.19 riastrad if (code & TPM_NON_FATAL) {
563 1.19 riastrad aprint_debug_dev(sc->sc_dev, "%s: tpm busy, code=%u\n",
564 1.19 riastrad __func__, code & ~TPM_NON_FATAL);
565 1.19 riastrad rv = 0;
566 1.19 riastrad } else if (code == TPM_DEACTIVATED) {
567 1.19 riastrad device_printf(sc->sc_dev, "tpm is deactivated\n");
568 1.19 riastrad rv = ENXIO;
569 1.19 riastrad } else {
570 1.19 riastrad device_printf(sc->sc_dev, "bad tpm response:"
571 1.19 riastrad " tag=%u len=%u code=%u\n", tag, pktlen, code);
572 1.19 riastrad hexdump(aprint_debug, "tpm response header",
573 1.19 riastrad (const void *)&response.hdr,
574 1.19 riastrad sizeof(response.hdr));
575 1.19 riastrad rv = EIO;
576 1.19 riastrad }
577 1.19 riastrad goto out;
578 1.19 riastrad }
579 1.19 riastrad
580 1.19 riastrad /* Read the response payload. */
581 1.19 riastrad if ((rv = (*sc->sc_intf->read)(sc,
582 1.19 riastrad (char *)&response + nread, pktlen - nread,
583 1.19 riastrad NULL, TPM_PARAM_SIZE)) != 0) {
584 1.19 riastrad device_printf(sc->sc_dev, "read failed, error=%d\n", rv);
585 1.19 riastrad goto out;
586 1.19 riastrad }
587 1.19 riastrad endread = false;
588 1.19 riastrad if ((rv = (*sc->sc_intf->end)(sc, UIO_READ, 0)) != 0) {
589 1.19 riastrad device_printf(sc->sc_dev, "end read failed, error=%d\n", rv);
590 1.19 riastrad goto out;
591 1.19 riastrad }
592 1.19 riastrad
593 1.19 riastrad /* Verify the number of bytes read looks sensible. */
594 1.19 riastrad nbytes = be32toh(response.randomBytesSize);
595 1.19 riastrad if (nbytes > pktlen - offsetof(struct response, bytes)) {
596 1.19 riastrad device_printf(sc->sc_dev, "overlong GetRandom length:"
597 1.19 riastrad " %u, max %zu\n",
598 1.19 riastrad nbytes, pktlen - offsetof(struct response, bytes));
599 1.19 riastrad nbytes = pktlen - offsetof(struct response, bytes);
600 1.19 riastrad }
601 1.19 riastrad
602 1.19 riastrad /*
603 1.19 riastrad * Enter the data into the entropy pool. Conservatively (or,
604 1.19 riastrad * perhaps, cargocultily) estimate half a bit of entropy per
605 1.19 riastrad * bit of data.
606 1.19 riastrad */
607 1.21 riastrad CTASSERT(sizeof(response.bytes) <= UINT_MAX/(NBBY/2));
608 1.21 riastrad entropybits = (NBBY/2)*nbytes;
609 1.21 riastrad rnd_add_data(&sc->sc_rnd, response.bytes, nbytes, entropybits);
610 1.21 riastrad
611 1.21 riastrad out: /* End the read or write if still ongoing. */
612 1.21 riastrad if (endread)
613 1.21 riastrad rv = (*sc->sc_intf->end)(sc, UIO_READ, rv);
614 1.21 riastrad if (endwrite)
615 1.21 riastrad rv = (*sc->sc_intf->end)(sc, UIO_WRITE, rv);
616 1.21 riastrad
617 1.21 riastrad *entropybitsp = entropybits;
618 1.21 riastrad return rv;
619 1.21 riastrad }
620 1.21 riastrad
621 1.21 riastrad static int
622 1.21 riastrad tpm20_rng(struct tpm_softc *sc, unsigned *entropybitsp)
623 1.21 riastrad {
624 1.21 riastrad /*
625 1.21 riastrad * Trusted Platform Module Library, Family "2.0", Level 00
626 1.21 riastrad * Revision 01.38, Part 3: Commands, Sec. 16.1 `TPM2_GetRandom'
627 1.21 riastrad *
628 1.21 riastrad * https://trustedcomputinggroup.org/wp-content/uploads/TPM-Rev-2.0-Part-3-Commands-01.38.pdf#page=133
629 1.21 riastrad */
630 1.21 riastrad struct {
631 1.21 riastrad struct tpm_header hdr;
632 1.21 riastrad uint16_t bytesRequested;
633 1.21 riastrad } __packed command;
634 1.21 riastrad struct response {
635 1.21 riastrad struct tpm_header hdr;
636 1.21 riastrad uint16_t randomBytesSize;
637 1.21 riastrad uint8_t bytes[64];
638 1.21 riastrad } __packed response;
639 1.21 riastrad bool endwrite = false, endread = false;
640 1.21 riastrad size_t nread;
641 1.21 riastrad uint16_t tag;
642 1.21 riastrad uint32_t pktlen, code, nbytes, entropybits = 0;
643 1.21 riastrad int rv;
644 1.21 riastrad
645 1.21 riastrad /* Encode the command. */
646 1.21 riastrad memset(&command, 0, sizeof(command));
647 1.21 riastrad command.hdr.tag = htobe16(TPM2_ST_NO_SESSIONS);
648 1.21 riastrad command.hdr.length = htobe32(sizeof(command));
649 1.21 riastrad command.hdr.code = htobe32(TPM2_CC_GetRandom);
650 1.21 riastrad command.bytesRequested = htobe16(sizeof(response.bytes));
651 1.21 riastrad
652 1.21 riastrad /* Write the command. */
653 1.21 riastrad if ((rv = (*sc->sc_intf->start)(sc, UIO_WRITE)) != 0) {
654 1.21 riastrad device_printf(sc->sc_dev, "start write failed, error=%d\n",
655 1.21 riastrad rv);
656 1.21 riastrad goto out;
657 1.21 riastrad }
658 1.21 riastrad endwrite = true;
659 1.21 riastrad if ((rv = (*sc->sc_intf->write)(sc, &command, sizeof(command))) != 0) {
660 1.21 riastrad device_printf(sc->sc_dev, "write failed, error=%d\n", rv);
661 1.21 riastrad goto out;
662 1.21 riastrad }
663 1.21 riastrad rv = (*sc->sc_intf->end)(sc, UIO_WRITE, 0);
664 1.21 riastrad endwrite = false;
665 1.21 riastrad if (rv) {
666 1.21 riastrad device_printf(sc->sc_dev, "end write failed, error=%d\n", rv);
667 1.21 riastrad goto out;
668 1.21 riastrad }
669 1.21 riastrad
670 1.21 riastrad /* Read the response header. */
671 1.21 riastrad if ((rv = (*sc->sc_intf->start)(sc, UIO_READ)) != 0) {
672 1.21 riastrad device_printf(sc->sc_dev, "start write failed, error=%d\n",
673 1.21 riastrad rv);
674 1.21 riastrad goto out;
675 1.21 riastrad }
676 1.21 riastrad endread = true;
677 1.21 riastrad if ((rv = (*sc->sc_intf->read)(sc, &response.hdr, sizeof(response.hdr),
678 1.21 riastrad &nread, 0)) != 0) {
679 1.21 riastrad device_printf(sc->sc_dev, "read failed, error=%d\n", rv);
680 1.21 riastrad goto out;
681 1.21 riastrad }
682 1.21 riastrad
683 1.21 riastrad /* Verify the response header looks sensible. */
684 1.21 riastrad if (nread != sizeof(response.hdr)) {
685 1.21 riastrad device_printf(sc->sc_dev, "read %zu bytes, expected %zu",
686 1.21 riastrad nread, sizeof(response.hdr));
687 1.21 riastrad goto out;
688 1.21 riastrad }
689 1.21 riastrad tag = be16toh(response.hdr.tag);
690 1.21 riastrad pktlen = be32toh(response.hdr.length);
691 1.21 riastrad code = be32toh(response.hdr.code);
692 1.21 riastrad if (tag != TPM2_ST_NO_SESSIONS ||
693 1.21 riastrad pktlen < offsetof(struct response, bytes) ||
694 1.21 riastrad pktlen > sizeof(response) ||
695 1.21 riastrad code != 0) {
696 1.21 riastrad /*
697 1.21 riastrad * If the tpm itself is busy (e.g., it has yet to run a
698 1.21 riastrad * self-test, or it's in a timeout period to defend
699 1.21 riastrad * against brute force attacks), then we can try again
700 1.21 riastrad * later. Otherwise, give up.
701 1.21 riastrad */
702 1.21 riastrad if (code & TPM2_RC_WARN) {
703 1.21 riastrad aprint_debug_dev(sc->sc_dev, "%s: tpm busy,"
704 1.21 riastrad " code=TPM_RC_WARN+0x%x\n",
705 1.21 riastrad __func__, code & ~TPM2_RC_WARN);
706 1.21 riastrad rv = 0;
707 1.21 riastrad } else {
708 1.21 riastrad device_printf(sc->sc_dev, "bad tpm response:"
709 1.21 riastrad " tag=%u len=%u code=0x%x\n", tag, pktlen, code);
710 1.21 riastrad hexdump(aprint_debug, "tpm response header",
711 1.21 riastrad (const void *)&response.hdr,
712 1.21 riastrad sizeof(response.hdr));
713 1.21 riastrad rv = EIO;
714 1.21 riastrad }
715 1.21 riastrad goto out;
716 1.21 riastrad }
717 1.21 riastrad
718 1.21 riastrad /* Read the response payload. */
719 1.21 riastrad if ((rv = (*sc->sc_intf->read)(sc,
720 1.21 riastrad (char *)&response + nread, pktlen - nread,
721 1.21 riastrad NULL, TPM_PARAM_SIZE)) != 0) {
722 1.21 riastrad device_printf(sc->sc_dev, "read failed, error=%d\n", rv);
723 1.21 riastrad goto out;
724 1.21 riastrad }
725 1.21 riastrad endread = false;
726 1.21 riastrad if ((rv = (*sc->sc_intf->end)(sc, UIO_READ, 0)) != 0) {
727 1.21 riastrad device_printf(sc->sc_dev, "end read failed, error=%d\n", rv);
728 1.21 riastrad goto out;
729 1.21 riastrad }
730 1.21 riastrad
731 1.21 riastrad /* Verify the number of bytes read looks sensible. */
732 1.21 riastrad nbytes = be16toh(response.randomBytesSize);
733 1.21 riastrad if (nbytes > pktlen - offsetof(struct response, bytes)) {
734 1.21 riastrad device_printf(sc->sc_dev, "overlong GetRandom length:"
735 1.21 riastrad " %u, max %zu\n",
736 1.21 riastrad nbytes, pktlen - offsetof(struct response, bytes));
737 1.21 riastrad nbytes = pktlen - offsetof(struct response, bytes);
738 1.21 riastrad }
739 1.21 riastrad
740 1.21 riastrad /*
741 1.21 riastrad * Enter the data into the entropy pool. Conservatively (or,
742 1.21 riastrad * perhaps, cargocultily) estimate half a bit of entropy per
743 1.21 riastrad * bit of data.
744 1.21 riastrad */
745 1.21 riastrad CTASSERT(sizeof(response.bytes) <= UINT_MAX/(NBBY/2));
746 1.21 riastrad entropybits = (NBBY/2)*nbytes;
747 1.21 riastrad rnd_add_data(&sc->sc_rnd, response.bytes, nbytes, entropybits);
748 1.21 riastrad
749 1.21 riastrad out: /* End the read or write if still ongoing. */
750 1.21 riastrad if (endread)
751 1.21 riastrad rv = (*sc->sc_intf->end)(sc, UIO_READ, rv);
752 1.21 riastrad if (endwrite)
753 1.21 riastrad rv = (*sc->sc_intf->end)(sc, UIO_WRITE, rv);
754 1.21 riastrad
755 1.21 riastrad *entropybitsp = entropybits;
756 1.21 riastrad return rv;
757 1.21 riastrad }
758 1.21 riastrad
759 1.21 riastrad static void
760 1.21 riastrad tpm_rng_work(struct work *wk, void *cookie)
761 1.21 riastrad {
762 1.21 riastrad struct tpm_softc *sc = cookie;
763 1.21 riastrad unsigned nbytes, entropybits;
764 1.21 riastrad int rv;
765 1.21 riastrad
766 1.21 riastrad /* Acknowledge the request. */
767 1.21 riastrad nbytes = atomic_swap_uint(&sc->sc_rndpending, 0);
768 1.21 riastrad
769 1.24 riastrad /* Lock the tpm while we do I/O transactions with it. */
770 1.21 riastrad mutex_enter(&sc->sc_lock);
771 1.21 riastrad
772 1.21 riastrad /*
773 1.21 riastrad * Issue as many commands as needed to fulfill the request, but
774 1.21 riastrad * stop if anything fails.
775 1.21 riastrad */
776 1.21 riastrad for (; nbytes; nbytes -= MIN(nbytes, MAX(1, entropybits/NBBY))) {
777 1.21 riastrad switch (sc->sc_ver) {
778 1.21 riastrad case TPM_1_2:
779 1.21 riastrad rv = tpm12_rng(sc, &entropybits);
780 1.21 riastrad break;
781 1.21 riastrad case TPM_2_0:
782 1.21 riastrad rv = tpm20_rng(sc, &entropybits);
783 1.21 riastrad break;
784 1.21 riastrad default:
785 1.21 riastrad panic("bad tpm version: %d", sc->sc_ver);
786 1.21 riastrad }
787 1.21 riastrad if (rv)
788 1.21 riastrad break;
789 1.21 riastrad }
790 1.19 riastrad
791 1.21 riastrad /*
792 1.19 riastrad * If the tpm is busted, no sense in trying again -- most
793 1.19 riastrad * likely, it is deactivated, and by the spec it cannot be
794 1.19 riastrad * reactivated until after a reboot.
795 1.19 riastrad */
796 1.19 riastrad if (rv) {
797 1.19 riastrad device_printf(sc->sc_dev, "deactivating entropy source\n");
798 1.23 riastrad atomic_store_relaxed(&sc->sc_rnddisabled, true);
799 1.19 riastrad /* XXX worker thread can't workqueue_destroy its own queue */
800 1.19 riastrad }
801 1.19 riastrad
802 1.24 riastrad /* Relinquish the tpm. */
803 1.19 riastrad mutex_exit(&sc->sc_lock);
804 1.19 riastrad }
805 1.19 riastrad
806 1.19 riastrad static void
807 1.21 riastrad tpm_rng_get(size_t nbytes, void *cookie)
808 1.19 riastrad {
809 1.19 riastrad struct tpm_softc *sc = cookie;
810 1.19 riastrad
811 1.23 riastrad if (atomic_load_relaxed(&sc->sc_rnddisabled))
812 1.23 riastrad return; /* tough */
813 1.21 riastrad if (atomic_swap_uint(&sc->sc_rndpending, MIN(nbytes, UINT_MAX/NBBY))
814 1.21 riastrad == 0)
815 1.19 riastrad workqueue_enqueue(sc->sc_rndwq, &sc->sc_rndwk, NULL);
816 1.19 riastrad }
817 1.19 riastrad
818 1.16 maxv static int
819 1.14 maxv tpm_tis12_init(struct tpm_softc *sc)
820 1.13 maxv {
821 1.16 maxv int rv;
822 1.16 maxv
823 1.14 maxv sc->sc_caps = bus_space_read_4(sc->sc_bt, sc->sc_bh,
824 1.13 maxv TPM_INTF_CAPABILITY);
825 1.13 maxv sc->sc_devid = bus_space_read_4(sc->sc_bt, sc->sc_bh, TPM_ID);
826 1.13 maxv sc->sc_rev = bus_space_read_1(sc->sc_bt, sc->sc_bh, TPM_REV);
827 1.13 maxv
828 1.14 maxv aprint_normal_dev(sc->sc_dev, "device 0x%08x rev 0x%x\n",
829 1.14 maxv sc->sc_devid, sc->sc_rev);
830 1.13 maxv
831 1.16 maxv if ((rv = tpm12_request_locality(sc, 0)) != 0)
832 1.16 maxv return rv;
833 1.13 maxv
834 1.13 maxv /* Abort whatever it thought it was doing. */
835 1.13 maxv bus_space_write_1(sc->sc_bt, sc->sc_bh, TPM_STS, TPM_STS_CMD_READY);
836 1.13 maxv
837 1.19 riastrad /* XXX Run this at higher priority? */
838 1.19 riastrad if ((rv = workqueue_create(&sc->sc_rndwq, device_xname(sc->sc_dev),
839 1.21 riastrad tpm_rng_work, sc, PRI_NONE, IPL_VM, WQ_MPSAFE)) != 0)
840 1.19 riastrad return rv;
841 1.21 riastrad rndsource_setcb(&sc->sc_rnd, tpm_rng_get, sc);
842 1.19 riastrad rnd_attach_source(&sc->sc_rnd, device_xname(sc->sc_dev),
843 1.19 riastrad RND_TYPE_RNG,
844 1.19 riastrad RND_FLAG_COLLECT_VALUE|RND_FLAG_ESTIMATE_VALUE|RND_FLAG_HASCB);
845 1.19 riastrad
846 1.13 maxv return 0;
847 1.13 maxv }
848 1.13 maxv
849 1.16 maxv static int
850 1.14 maxv tpm_tis12_start(struct tpm_softc *sc, int rw)
851 1.1 christos {
852 1.1 christos int rv;
853 1.1 christos
854 1.14 maxv if (rw == UIO_READ) {
855 1.1 christos rv = tpm_waitfor(sc, TPM_STS_DATA_AVAIL | TPM_STS_VALID,
856 1.16 maxv TPM_READ_TMO, sc->sc_intf->read);
857 1.1 christos return rv;
858 1.1 christos }
859 1.1 christos
860 1.13 maxv /* Request the 0th locality. */
861 1.16 maxv if ((rv = tpm12_request_locality(sc, 0)) != 0)
862 1.1 christos return rv;
863 1.1 christos
864 1.13 maxv sc->sc_status = tpm_status(sc);
865 1.13 maxv if (sc->sc_status & TPM_STS_CMD_READY)
866 1.1 christos return 0;
867 1.1 christos
868 1.1 christos /* Abort previous and restart. */
869 1.1 christos bus_space_write_1(sc->sc_bt, sc->sc_bh, TPM_STS, TPM_STS_CMD_READY);
870 1.16 maxv rv = tpm_waitfor(sc, TPM_STS_CMD_READY, TPM_READY_TMO, sc->sc_intf->write);
871 1.13 maxv if (rv)
872 1.1 christos return rv;
873 1.1 christos
874 1.1 christos return 0;
875 1.1 christos }
876 1.1 christos
877 1.16 maxv static int
878 1.3 christos tpm_tis12_read(struct tpm_softc *sc, void *buf, size_t len, size_t *count,
879 1.1 christos int flags)
880 1.1 christos {
881 1.1 christos uint8_t *p = buf;
882 1.1 christos size_t cnt;
883 1.14 maxv int rv, n;
884 1.1 christos
885 1.1 christos cnt = 0;
886 1.1 christos while (len > 0) {
887 1.13 maxv rv = tpm_waitfor(sc, TPM_STS_DATA_AVAIL | TPM_STS_VALID,
888 1.16 maxv TPM_READ_TMO, sc->sc_intf->read);
889 1.13 maxv if (rv)
890 1.1 christos return rv;
891 1.1 christos
892 1.14 maxv n = MIN(len, tpm_getburst(sc));
893 1.14 maxv while (n > 0) {
894 1.1 christos *p++ = bus_space_read_1(sc->sc_bt, sc->sc_bh, TPM_DATA);
895 1.1 christos cnt++;
896 1.14 maxv len--;
897 1.14 maxv n--;
898 1.1 christos }
899 1.1 christos
900 1.1 christos if ((flags & TPM_PARAM_SIZE) == 0 && cnt >= 6)
901 1.1 christos break;
902 1.1 christos }
903 1.1 christos
904 1.1 christos if (count)
905 1.1 christos *count = cnt;
906 1.1 christos
907 1.1 christos return 0;
908 1.1 christos }
909 1.1 christos
910 1.16 maxv static int
911 1.3 christos tpm_tis12_write(struct tpm_softc *sc, const void *buf, size_t len)
912 1.1 christos {
913 1.3 christos const uint8_t *p = buf;
914 1.1 christos size_t cnt;
915 1.1 christos int rv, r;
916 1.1 christos
917 1.3 christos if (len == 0)
918 1.3 christos return 0;
919 1.16 maxv if ((rv = tpm12_request_locality(sc, 0)) != 0)
920 1.1 christos return rv;
921 1.1 christos
922 1.1 christos cnt = 0;
923 1.1 christos while (cnt < len - 1) {
924 1.1 christos for (r = tpm_getburst(sc); r > 0 && cnt < len - 1; r--) {
925 1.1 christos bus_space_write_1(sc->sc_bt, sc->sc_bh, TPM_DATA, *p++);
926 1.1 christos cnt++;
927 1.1 christos }
928 1.1 christos if ((rv = tpm_waitfor(sc, TPM_STS_VALID, TPM_READ_TMO, sc))) {
929 1.1 christos return rv;
930 1.1 christos }
931 1.13 maxv sc->sc_status = tpm_status(sc);
932 1.13 maxv if (!(sc->sc_status & TPM_STS_DATA_EXPECT)) {
933 1.1 christos return EIO;
934 1.1 christos }
935 1.1 christos }
936 1.1 christos
937 1.1 christos bus_space_write_1(sc->sc_bt, sc->sc_bh, TPM_DATA, *p++);
938 1.1 christos cnt++;
939 1.1 christos
940 1.1 christos if ((rv = tpm_waitfor(sc, TPM_STS_VALID, TPM_READ_TMO, sc))) {
941 1.1 christos return rv;
942 1.1 christos }
943 1.13 maxv if ((sc->sc_status & TPM_STS_DATA_EXPECT) != 0) {
944 1.1 christos return EIO;
945 1.1 christos }
946 1.1 christos
947 1.1 christos return 0;
948 1.1 christos }
949 1.1 christos
950 1.16 maxv static int
951 1.14 maxv tpm_tis12_end(struct tpm_softc *sc, int rw, int err)
952 1.1 christos {
953 1.1 christos int rv = 0;
954 1.1 christos
955 1.14 maxv if (rw == UIO_READ) {
956 1.16 maxv rv = tpm_waitfor(sc, TPM_STS_VALID, TPM_READ_TMO, sc->sc_intf->read);
957 1.13 maxv if (rv)
958 1.22 riastrad goto out;
959 1.1 christos
960 1.1 christos /* Still more data? */
961 1.13 maxv sc->sc_status = tpm_status(sc);
962 1.14 maxv if (!err && (sc->sc_status & TPM_STS_DATA_AVAIL)) {
963 1.1 christos rv = EIO;
964 1.1 christos }
965 1.1 christos
966 1.1 christos bus_space_write_1(sc->sc_bt, sc->sc_bh, TPM_STS,
967 1.1 christos TPM_STS_CMD_READY);
968 1.1 christos
969 1.13 maxv /* Release the 0th locality. */
970 1.13 maxv bus_space_write_1(sc->sc_bt, sc->sc_bh, TPM_ACCESS,
971 1.1 christos TPM_ACCESS_ACTIVE_LOCALITY);
972 1.1 christos } else {
973 1.1 christos /* Hungry for more? */
974 1.13 maxv sc->sc_status = tpm_status(sc);
975 1.13 maxv if (!err && (sc->sc_status & TPM_STS_DATA_EXPECT)) {
976 1.1 christos rv = EIO;
977 1.1 christos }
978 1.1 christos
979 1.1 christos bus_space_write_1(sc->sc_bt, sc->sc_bh, TPM_STS,
980 1.1 christos err ? TPM_STS_CMD_READY : TPM_STS_GO);
981 1.1 christos }
982 1.1 christos
983 1.22 riastrad out: return err ? err : rv;
984 1.1 christos }
985 1.1 christos
986 1.16 maxv const struct tpm_intf tpm_intf_tis12 = {
987 1.16 maxv .version = TIS_1_2,
988 1.16 maxv .probe = tpm_tis12_probe,
989 1.16 maxv .init = tpm_tis12_init,
990 1.16 maxv .start = tpm_tis12_start,
991 1.16 maxv .read = tpm_tis12_read,
992 1.16 maxv .write = tpm_tis12_write,
993 1.16 maxv .end = tpm_tis12_end
994 1.16 maxv };
995 1.16 maxv
996 1.13 maxv /* -------------------------------------------------------------------------- */
997 1.1 christos
998 1.13 maxv static dev_type_open(tpmopen);
999 1.13 maxv static dev_type_close(tpmclose);
1000 1.13 maxv static dev_type_read(tpmread);
1001 1.13 maxv static dev_type_write(tpmwrite);
1002 1.13 maxv static dev_type_ioctl(tpmioctl);
1003 1.1 christos
1004 1.13 maxv const struct cdevsw tpm_cdevsw = {
1005 1.13 maxv .d_open = tpmopen,
1006 1.13 maxv .d_close = tpmclose,
1007 1.13 maxv .d_read = tpmread,
1008 1.13 maxv .d_write = tpmwrite,
1009 1.13 maxv .d_ioctl = tpmioctl,
1010 1.13 maxv .d_stop = nostop,
1011 1.13 maxv .d_tty = notty,
1012 1.13 maxv .d_poll = nopoll,
1013 1.13 maxv .d_mmap = nommap,
1014 1.13 maxv .d_kqfilter = nokqfilter,
1015 1.13 maxv .d_discard = nodiscard,
1016 1.14 maxv .d_flag = D_OTHER | D_MPSAFE,
1017 1.13 maxv };
1018 1.1 christos
1019 1.13 maxv static int
1020 1.1 christos tpmopen(dev_t dev, int flag, int mode, struct lwp *l)
1021 1.1 christos {
1022 1.14 maxv struct tpm_softc *sc = device_lookup_private(&tpm_cd, minor(dev));
1023 1.14 maxv int ret = 0;
1024 1.1 christos
1025 1.13 maxv if (sc == NULL)
1026 1.1 christos return ENXIO;
1027 1.1 christos
1028 1.14 maxv mutex_enter(&sc->sc_lock);
1029 1.14 maxv if (sc->sc_busy) {
1030 1.14 maxv ret = EBUSY;
1031 1.14 maxv } else {
1032 1.14 maxv sc->sc_busy = true;
1033 1.14 maxv }
1034 1.14 maxv mutex_exit(&sc->sc_lock);
1035 1.1 christos
1036 1.14 maxv return ret;
1037 1.1 christos }
1038 1.1 christos
1039 1.13 maxv static int
1040 1.1 christos tpmclose(dev_t dev, int flag, int mode, struct lwp *l)
1041 1.1 christos {
1042 1.14 maxv struct tpm_softc *sc = device_lookup_private(&tpm_cd, minor(dev));
1043 1.14 maxv int ret = 0;
1044 1.1 christos
1045 1.13 maxv if (sc == NULL)
1046 1.1 christos return ENXIO;
1047 1.1 christos
1048 1.14 maxv mutex_enter(&sc->sc_lock);
1049 1.14 maxv if (!sc->sc_busy) {
1050 1.14 maxv ret = EINVAL;
1051 1.14 maxv } else {
1052 1.14 maxv sc->sc_busy = false;
1053 1.14 maxv }
1054 1.14 maxv mutex_exit(&sc->sc_lock);
1055 1.1 christos
1056 1.14 maxv return ret;
1057 1.1 christos }
1058 1.1 christos
1059 1.13 maxv static int
1060 1.1 christos tpmread(dev_t dev, struct uio *uio, int flags)
1061 1.1 christos {
1062 1.14 maxv struct tpm_softc *sc = device_lookup_private(&tpm_cd, minor(dev));
1063 1.15 maxv struct tpm_header hdr;
1064 1.14 maxv uint8_t buf[TPM_BUFSIZ];
1065 1.24 riastrad size_t cnt, len = 0/*XXXGCC*/;
1066 1.24 riastrad bool end = false;
1067 1.14 maxv int rv;
1068 1.1 christos
1069 1.13 maxv if (sc == NULL)
1070 1.1 christos return ENXIO;
1071 1.1 christos
1072 1.24 riastrad mutex_enter(&sc->sc_lock);
1073 1.24 riastrad
1074 1.16 maxv if ((rv = (*sc->sc_intf->start)(sc, UIO_READ)))
1075 1.24 riastrad goto out;
1076 1.24 riastrad end = true;
1077 1.1 christos
1078 1.14 maxv /* Get the header. */
1079 1.16 maxv if ((rv = (*sc->sc_intf->read)(sc, &hdr, sizeof(hdr), &cnt, 0))) {
1080 1.3 christos goto out;
1081 1.1 christos }
1082 1.24 riastrad if (cnt != sizeof(hdr)) {
1083 1.24 riastrad rv = EIO;
1084 1.24 riastrad goto out;
1085 1.24 riastrad }
1086 1.25 riastrad len = be32toh(hdr.length);
1087 1.24 riastrad if (len > MIN(sizeof(buf), uio->uio_resid) || len < sizeof(hdr)) {
1088 1.1 christos rv = EIO;
1089 1.3 christos goto out;
1090 1.1 christos }
1091 1.1 christos
1092 1.24 riastrad /* Get the payload. */
1093 1.24 riastrad len -= sizeof(hdr);
1094 1.24 riastrad if ((rv = (*sc->sc_intf->read)(sc, buf, len, NULL, TPM_PARAM_SIZE))) {
1095 1.24 riastrad goto out;
1096 1.24 riastrad }
1097 1.24 riastrad
1098 1.24 riastrad out: if (end)
1099 1.24 riastrad rv = (*sc->sc_intf->end)(sc, UIO_READ, rv);
1100 1.24 riastrad
1101 1.24 riastrad mutex_exit(&sc->sc_lock);
1102 1.24 riastrad
1103 1.24 riastrad /* If anything went wrong, stop here -- nothing to copy out. */
1104 1.24 riastrad if (rv)
1105 1.24 riastrad return rv;
1106 1.24 riastrad
1107 1.14 maxv /* Copy out the header. */
1108 1.24 riastrad if ((rv = uiomove(&hdr, sizeof(hdr), uio))) {
1109 1.24 riastrad return rv;
1110 1.1 christos }
1111 1.1 christos
1112 1.24 riastrad /* Copy out the payload. */
1113 1.24 riastrad if ((rv = uiomove(buf, len, uio))) {
1114 1.24 riastrad return rv;
1115 1.1 christos }
1116 1.1 christos
1117 1.24 riastrad /* Success! */
1118 1.24 riastrad return 0;
1119 1.1 christos }
1120 1.1 christos
1121 1.13 maxv static int
1122 1.1 christos tpmwrite(dev_t dev, struct uio *uio, int flags)
1123 1.1 christos {
1124 1.14 maxv struct tpm_softc *sc = device_lookup_private(&tpm_cd, minor(dev));
1125 1.1 christos uint8_t buf[TPM_BUFSIZ];
1126 1.24 riastrad bool end = false;
1127 1.14 maxv int n, rv;
1128 1.1 christos
1129 1.13 maxv if (sc == NULL)
1130 1.1 christos return ENXIO;
1131 1.1 christos
1132 1.1 christos n = MIN(sizeof(buf), uio->uio_resid);
1133 1.1 christos if ((rv = uiomove(buf, n, uio))) {
1134 1.24 riastrad return rv;
1135 1.1 christos }
1136 1.24 riastrad
1137 1.24 riastrad mutex_enter(&sc->sc_lock);
1138 1.24 riastrad
1139 1.16 maxv if ((rv = (*sc->sc_intf->start)(sc, UIO_WRITE))) {
1140 1.13 maxv goto out;
1141 1.1 christos }
1142 1.24 riastrad end = true;
1143 1.24 riastrad
1144 1.16 maxv if ((rv = (*sc->sc_intf->write)(sc, buf, n))) {
1145 1.13 maxv goto out;
1146 1.1 christos }
1147 1.1 christos
1148 1.24 riastrad out: if (end)
1149 1.24 riastrad rv = (*sc->sc_intf->end)(sc, UIO_WRITE, rv);
1150 1.24 riastrad
1151 1.24 riastrad mutex_exit(&sc->sc_lock);
1152 1.1 christos return rv;
1153 1.1 christos }
1154 1.1 christos
1155 1.13 maxv static int
1156 1.13 maxv tpmioctl(dev_t dev, u_long cmd, void *addr, int flag, struct lwp *l)
1157 1.1 christos {
1158 1.14 maxv struct tpm_softc *sc = device_lookup_private(&tpm_cd, minor(dev));
1159 1.13 maxv struct tpm_ioc_getinfo *info;
1160 1.13 maxv
1161 1.13 maxv if (sc == NULL)
1162 1.13 maxv return ENXIO;
1163 1.13 maxv
1164 1.13 maxv switch (cmd) {
1165 1.13 maxv case TPM_IOC_GETINFO:
1166 1.13 maxv info = addr;
1167 1.13 maxv info->api_version = TPM_API_VERSION;
1168 1.13 maxv info->tpm_version = sc->sc_ver;
1169 1.16 maxv info->itf_version = sc->sc_intf->version;
1170 1.13 maxv info->device_id = sc->sc_devid;
1171 1.13 maxv info->device_rev = sc->sc_rev;
1172 1.14 maxv info->device_caps = sc->sc_caps;
1173 1.13 maxv return 0;
1174 1.13 maxv default:
1175 1.13 maxv break;
1176 1.13 maxv }
1177 1.13 maxv
1178 1.1 christos return ENOTTY;
1179 1.1 christos }
1180