tpm.c revision 1.7.4.2 1 1.7.4.2 mrg /* $NetBSD: tpm.c,v 1.7.4.2 2012/02/18 07:34:24 mrg Exp $ */
2 1.7.4.2 mrg /*
3 1.7.4.2 mrg * Copyright (c) 2008, 2009 Michael Shalayeff
4 1.7.4.2 mrg * Copyright (c) 2009, 2010 Hans-Jrg Hxer
5 1.7.4.2 mrg * All rights reserved.
6 1.7.4.2 mrg *
7 1.7.4.2 mrg * Permission to use, copy, modify, and distribute this software for any
8 1.7.4.2 mrg * purpose with or without fee is hereby granted, provided that the above
9 1.7.4.2 mrg * copyright notice and this permission notice appear in all copies.
10 1.7.4.2 mrg *
11 1.7.4.2 mrg * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
12 1.7.4.2 mrg * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
13 1.7.4.2 mrg * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
14 1.7.4.2 mrg * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
15 1.7.4.2 mrg * WHATSOEVER RESULTING FROM LOSS OF MIND, USE, DATA OR PROFITS, WHETHER IN
16 1.7.4.2 mrg * AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT
17 1.7.4.2 mrg * OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
18 1.7.4.2 mrg */
19 1.7.4.2 mrg
20 1.7.4.2 mrg #include <sys/cdefs.h>
21 1.7.4.2 mrg __KERNEL_RCSID(0, "$NetBSD: tpm.c,v 1.7.4.2 2012/02/18 07:34:24 mrg Exp $");
22 1.7.4.2 mrg
23 1.7.4.2 mrg #if 0
24 1.7.4.2 mrg #define TPM_DEBUG
25 1.7.4.2 mrg #define aprint_debug_dev aprint_error_dev
26 1.7.4.2 mrg #endif
27 1.7.4.2 mrg
28 1.7.4.2 mrg #include <sys/param.h>
29 1.7.4.2 mrg #include <sys/systm.h>
30 1.7.4.2 mrg #include <sys/kernel.h>
31 1.7.4.2 mrg #include <sys/malloc.h>
32 1.7.4.2 mrg #include <sys/proc.h>
33 1.7.4.2 mrg #include <sys/device.h>
34 1.7.4.2 mrg #include <sys/conf.h>
35 1.7.4.2 mrg #include <sys/bus.h>
36 1.7.4.2 mrg #include <sys/pmf.h>
37 1.7.4.2 mrg
38 1.7.4.2 mrg #include <dev/ic/tpmreg.h>
39 1.7.4.2 mrg #include <dev/ic/tpmvar.h>
40 1.7.4.2 mrg
41 1.7.4.2 mrg /* Set when enabling legacy interface in host bridge. */
42 1.7.4.2 mrg int tpm_enabled;
43 1.7.4.2 mrg
44 1.7.4.2 mrg const struct {
45 1.7.4.2 mrg uint32_t devid;
46 1.7.4.2 mrg char name[32];
47 1.7.4.2 mrg int flags;
48 1.7.4.2 mrg #define TPM_DEV_NOINTS 0x0001
49 1.7.4.2 mrg } tpm_devs[] = {
50 1.7.4.2 mrg { 0x000615d1, "IFX SLD 9630 TT 1.1", 0 },
51 1.7.4.2 mrg { 0x000b15d1, "IFX SLB 9635 TT 1.2", 0 },
52 1.7.4.2 mrg { 0x100214e4, "Broadcom BCM0102", TPM_DEV_NOINTS },
53 1.7.4.2 mrg { 0x00fe1050, "WEC WPCT200", 0 },
54 1.7.4.2 mrg { 0x687119fa, "SNS SSX35", 0 },
55 1.7.4.2 mrg { 0x2e4d5453, "STM ST19WP18", 0 },
56 1.7.4.2 mrg { 0x32021114, "ATML 97SC3203", TPM_DEV_NOINTS },
57 1.7.4.2 mrg { 0x10408086, "INTEL INTC0102", 0 },
58 1.7.4.2 mrg { 0, "", TPM_DEV_NOINTS },
59 1.7.4.2 mrg };
60 1.7.4.2 mrg
61 1.7.4.2 mrg int tpm_tis12_irqinit(struct tpm_softc *, int, int);
62 1.7.4.2 mrg
63 1.7.4.2 mrg int tpm_waitfor_poll(struct tpm_softc *, uint8_t, int, void *);
64 1.7.4.2 mrg int tpm_waitfor_int(struct tpm_softc *, uint8_t, int, void *, int);
65 1.7.4.2 mrg int tpm_waitfor(struct tpm_softc *, uint8_t, int, void *);
66 1.7.4.2 mrg int tpm_request_locality(struct tpm_softc *, int);
67 1.7.4.2 mrg int tpm_getburst(struct tpm_softc *);
68 1.7.4.2 mrg uint8_t tpm_status(struct tpm_softc *);
69 1.7.4.2 mrg int tpm_tmotohz(int);
70 1.7.4.2 mrg
71 1.7.4.2 mrg static dev_type_open(tpmopen);
72 1.7.4.2 mrg static dev_type_close(tpmclose);
73 1.7.4.2 mrg static dev_type_read(tpmread);
74 1.7.4.2 mrg static dev_type_read(tpmwrite);
75 1.7.4.2 mrg static dev_type_ioctl(tpmioctl);
76 1.7.4.2 mrg
77 1.7.4.2 mrg extern struct cfdriver tpm_cd;
78 1.7.4.2 mrg #define TPMUNIT(a) minor(a)
79 1.7.4.2 mrg
80 1.7.4.2 mrg const struct cdevsw tpm_cdevsw = {
81 1.7.4.2 mrg tpmopen, tpmclose, tpmread, tpmwrite, tpmioctl,
82 1.7.4.2 mrg nostop, notty, nopoll, nommap, nokqfilter, D_OTHER,
83 1.7.4.2 mrg };
84 1.7.4.2 mrg
85 1.7.4.2 mrg /* Probe TPM using TIS 1.2 interface. */
86 1.7.4.2 mrg int
87 1.7.4.2 mrg tpm_tis12_probe(bus_space_tag_t bt, bus_space_handle_t bh)
88 1.7.4.2 mrg {
89 1.7.4.2 mrg uint32_t r;
90 1.7.4.2 mrg uint8_t save, reg;
91 1.7.4.2 mrg
92 1.7.4.2 mrg r = bus_space_read_4(bt, bh, TPM_INTF_CAPABILITIES);
93 1.7.4.2 mrg if (r == 0xffffffff)
94 1.7.4.2 mrg return 0;
95 1.7.4.2 mrg
96 1.7.4.2 mrg #ifdef TPM_DEBUG
97 1.7.4.2 mrg char buf[128];
98 1.7.4.2 mrg snprintb(buf, sizeof(buf), TPM_CAPBITS, r);
99 1.7.4.2 mrg printf("%s: caps=%s\n", __func__, buf);
100 1.7.4.2 mrg #endif
101 1.7.4.2 mrg if ((r & TPM_CAPSREQ) != TPM_CAPSREQ ||
102 1.7.4.2 mrg !(r & (TPM_INTF_INT_EDGE_RISING | TPM_INTF_INT_LEVEL_LOW))) {
103 1.7.4.2 mrg #ifdef TPM_DEBUG
104 1.7.4.2 mrg printf("%s: caps too low (caps=%s)\n", __func__, buf);
105 1.7.4.2 mrg #endif
106 1.7.4.2 mrg return 0;
107 1.7.4.2 mrg }
108 1.7.4.2 mrg
109 1.7.4.2 mrg save = bus_space_read_1(bt, bh, TPM_ACCESS);
110 1.7.4.2 mrg bus_space_write_1(bt, bh, TPM_ACCESS, TPM_ACCESS_REQUEST_USE);
111 1.7.4.2 mrg reg = bus_space_read_1(bt, bh, TPM_ACCESS);
112 1.7.4.2 mrg if ((reg & TPM_ACCESS_VALID) && (reg & TPM_ACCESS_ACTIVE_LOCALITY) &&
113 1.7.4.2 mrg bus_space_read_4(bt, bh, TPM_ID) != 0xffffffff)
114 1.7.4.2 mrg return 1;
115 1.7.4.2 mrg
116 1.7.4.2 mrg bus_space_write_1(bt, bh, TPM_ACCESS, save);
117 1.7.4.2 mrg return 0;
118 1.7.4.2 mrg }
119 1.7.4.2 mrg
120 1.7.4.2 mrg /*
121 1.7.4.2 mrg * Setup interrupt vector if one is provided and interrupts are know to
122 1.7.4.2 mrg * work on that particular chip.
123 1.7.4.2 mrg */
124 1.7.4.2 mrg int
125 1.7.4.2 mrg tpm_tis12_irqinit(struct tpm_softc *sc, int irq, int idx)
126 1.7.4.2 mrg {
127 1.7.4.2 mrg uint32_t r;
128 1.7.4.2 mrg
129 1.7.4.2 mrg if ((irq == -1) || (tpm_devs[idx].flags & TPM_DEV_NOINTS)) {
130 1.7.4.2 mrg sc->sc_vector = -1;
131 1.7.4.2 mrg return 0;
132 1.7.4.2 mrg }
133 1.7.4.2 mrg
134 1.7.4.2 mrg /* Ack and disable all interrupts. */
135 1.7.4.2 mrg r = bus_space_read_4(sc->sc_bt, sc->sc_bh, TPM_INTERRUPT_ENABLE);
136 1.7.4.2 mrg bus_space_write_4(sc->sc_bt, sc->sc_bh, TPM_INTERRUPT_ENABLE,
137 1.7.4.2 mrg r & ~TPM_GLOBAL_INT_ENABLE);
138 1.7.4.2 mrg bus_space_write_4(sc->sc_bt, sc->sc_bh, TPM_INT_STATUS,
139 1.7.4.2 mrg bus_space_read_4(sc->sc_bt, sc->sc_bh, TPM_INT_STATUS));
140 1.7.4.2 mrg #ifdef TPM_DEBUG
141 1.7.4.2 mrg char buf[128];
142 1.7.4.2 mrg snprintb(buf, sizeof(buf), TPM_INTERRUPT_ENABLE_BITS, r);
143 1.7.4.2 mrg aprint_debug_dev(sc->sc_dev, "%s: before ien %s\n", __func__, buf);
144 1.7.4.2 mrg #endif
145 1.7.4.2 mrg
146 1.7.4.2 mrg /* Program interrupt vector. */
147 1.7.4.2 mrg bus_space_write_1(sc->sc_bt, sc->sc_bh, TPM_INT_VECTOR, irq);
148 1.7.4.2 mrg sc->sc_vector = irq;
149 1.7.4.2 mrg
150 1.7.4.2 mrg /* Program interrupt type. */
151 1.7.4.2 mrg r &= ~(TPM_INT_EDGE_RISING|TPM_INT_EDGE_FALLING|TPM_INT_LEVEL_HIGH|
152 1.7.4.2 mrg TPM_INT_LEVEL_LOW);
153 1.7.4.2 mrg r |= TPM_GLOBAL_INT_ENABLE|TPM_CMD_READY_INT|TPM_LOCALITY_CHANGE_INT|
154 1.7.4.2 mrg TPM_STS_VALID_INT|TPM_DATA_AVAIL_INT;
155 1.7.4.2 mrg if (sc->sc_capabilities & TPM_INTF_INT_EDGE_RISING)
156 1.7.4.2 mrg r |= TPM_INT_EDGE_RISING;
157 1.7.4.2 mrg else if (sc->sc_capabilities & TPM_INTF_INT_EDGE_FALLING)
158 1.7.4.2 mrg r |= TPM_INT_EDGE_FALLING;
159 1.7.4.2 mrg else if (sc->sc_capabilities & TPM_INTF_INT_LEVEL_HIGH)
160 1.7.4.2 mrg r |= TPM_INT_LEVEL_HIGH;
161 1.7.4.2 mrg else
162 1.7.4.2 mrg r |= TPM_INT_LEVEL_LOW;
163 1.7.4.2 mrg
164 1.7.4.2 mrg bus_space_write_4(sc->sc_bt, sc->sc_bh, TPM_INTERRUPT_ENABLE, r);
165 1.7.4.2 mrg #ifdef TPM_DEBUG
166 1.7.4.2 mrg snprintb(buf, sizeof(buf), TPM_INTERRUPT_ENABLE_BITS, r);
167 1.7.4.2 mrg aprint_debug_dev(sc->sc_dev, "%s: after ien %s\n", __func__, buf);
168 1.7.4.2 mrg #endif
169 1.7.4.2 mrg
170 1.7.4.2 mrg return 0;
171 1.7.4.2 mrg }
172 1.7.4.2 mrg
173 1.7.4.2 mrg /* Setup TPM using TIS 1.2 interface. */
174 1.7.4.2 mrg int
175 1.7.4.2 mrg tpm_tis12_init(struct tpm_softc *sc, int irq, const char *name)
176 1.7.4.2 mrg {
177 1.7.4.2 mrg uint32_t r;
178 1.7.4.2 mrg int i;
179 1.7.4.2 mrg
180 1.7.4.2 mrg r = bus_space_read_4(sc->sc_bt, sc->sc_bh, TPM_INTF_CAPABILITIES);
181 1.7.4.2 mrg #ifdef TPM_DEBUG
182 1.7.4.2 mrg char cbuf[128];
183 1.7.4.2 mrg snprintb(cbuf, sizeof(cbuf), TPM_CAPBITS, r);
184 1.7.4.2 mrg aprint_debug_dev(sc->sc_dev, "%s: caps=%s ", __func__, cbuf);
185 1.7.4.2 mrg #endif
186 1.7.4.2 mrg if ((r & TPM_CAPSREQ) != TPM_CAPSREQ ||
187 1.7.4.2 mrg !(r & (TPM_INTF_INT_EDGE_RISING | TPM_INTF_INT_LEVEL_LOW))) {
188 1.7.4.2 mrg char buf[128];
189 1.7.4.2 mrg snprintb(buf, sizeof(buf), TPM_CAPBITS, r);
190 1.7.4.2 mrg aprint_error_dev(sc->sc_dev, "capabilities too low (caps=%s)\n",
191 1.7.4.2 mrg buf);
192 1.7.4.2 mrg return 1;
193 1.7.4.2 mrg }
194 1.7.4.2 mrg sc->sc_capabilities = r;
195 1.7.4.2 mrg
196 1.7.4.2 mrg sc->sc_devid = bus_space_read_4(sc->sc_bt, sc->sc_bh, TPM_ID);
197 1.7.4.2 mrg sc->sc_rev = bus_space_read_1(sc->sc_bt, sc->sc_bh, TPM_REV);
198 1.7.4.2 mrg
199 1.7.4.2 mrg for (i = 0; tpm_devs[i].devid; i++)
200 1.7.4.2 mrg if (tpm_devs[i].devid == sc->sc_devid)
201 1.7.4.2 mrg break;
202 1.7.4.2 mrg
203 1.7.4.2 mrg if (tpm_devs[i].devid)
204 1.7.4.2 mrg aprint_normal(": %s rev 0x%x\n",
205 1.7.4.2 mrg tpm_devs[i].name, sc->sc_rev);
206 1.7.4.2 mrg else
207 1.7.4.2 mrg aprint_normal(": device 0x%08x rev 0x%x\n",
208 1.7.4.2 mrg sc->sc_devid, sc->sc_rev);
209 1.7.4.2 mrg
210 1.7.4.2 mrg if (tpm_tis12_irqinit(sc, irq, i))
211 1.7.4.2 mrg return 1;
212 1.7.4.2 mrg
213 1.7.4.2 mrg if (tpm_request_locality(sc, 0))
214 1.7.4.2 mrg return 1;
215 1.7.4.2 mrg
216 1.7.4.2 mrg /* Abort whatever it thought it was doing. */
217 1.7.4.2 mrg bus_space_write_1(sc->sc_bt, sc->sc_bh, TPM_STS, TPM_STS_CMD_READY);
218 1.7.4.2 mrg
219 1.7.4.2 mrg return 0;
220 1.7.4.2 mrg }
221 1.7.4.2 mrg
222 1.7.4.2 mrg int
223 1.7.4.2 mrg tpm_request_locality(struct tpm_softc *sc, int l)
224 1.7.4.2 mrg {
225 1.7.4.2 mrg uint32_t r;
226 1.7.4.2 mrg int to, rv;
227 1.7.4.2 mrg
228 1.7.4.2 mrg if (l != 0)
229 1.7.4.2 mrg return EINVAL;
230 1.7.4.2 mrg
231 1.7.4.2 mrg if ((bus_space_read_1(sc->sc_bt, sc->sc_bh, TPM_ACCESS) &
232 1.7.4.2 mrg (TPM_ACCESS_VALID | TPM_ACCESS_ACTIVE_LOCALITY)) ==
233 1.7.4.2 mrg (TPM_ACCESS_VALID | TPM_ACCESS_ACTIVE_LOCALITY))
234 1.7.4.2 mrg return 0;
235 1.7.4.2 mrg
236 1.7.4.2 mrg bus_space_write_1(sc->sc_bt, sc->sc_bh, TPM_ACCESS,
237 1.7.4.2 mrg TPM_ACCESS_REQUEST_USE);
238 1.7.4.2 mrg
239 1.7.4.2 mrg to = tpm_tmotohz(TPM_ACCESS_TMO);
240 1.7.4.2 mrg
241 1.7.4.2 mrg while ((r = bus_space_read_1(sc->sc_bt, sc->sc_bh, TPM_ACCESS) &
242 1.7.4.2 mrg (TPM_ACCESS_VALID | TPM_ACCESS_ACTIVE_LOCALITY)) !=
243 1.7.4.2 mrg (TPM_ACCESS_VALID | TPM_ACCESS_ACTIVE_LOCALITY) && to--) {
244 1.7.4.2 mrg rv = tsleep(sc->sc_init, PRIBIO | PCATCH, "tpm_locality", 1);
245 1.7.4.2 mrg if (rv && rv != EWOULDBLOCK) {
246 1.7.4.2 mrg #ifdef TPM_DEBUG
247 1.7.4.2 mrg aprint_debug_dev(sc->sc_dev, "%s: interrupted %d\n",
248 1.7.4.2 mrg __func__, rv);
249 1.7.4.2 mrg #endif
250 1.7.4.2 mrg return rv;
251 1.7.4.2 mrg }
252 1.7.4.2 mrg }
253 1.7.4.2 mrg
254 1.7.4.2 mrg if ((r & (TPM_ACCESS_VALID | TPM_ACCESS_ACTIVE_LOCALITY)) !=
255 1.7.4.2 mrg (TPM_ACCESS_VALID | TPM_ACCESS_ACTIVE_LOCALITY)) {
256 1.7.4.2 mrg #ifdef TPM_DEBUG
257 1.7.4.2 mrg char buf[128];
258 1.7.4.2 mrg snprintb(buf, sizeof(buf), TPM_ACCESS_BITS, r);
259 1.7.4.2 mrg aprint_debug_dev(sc->sc_dev, "%s: access %s\n", __func__, buf);
260 1.7.4.2 mrg #endif
261 1.7.4.2 mrg return EBUSY;
262 1.7.4.2 mrg }
263 1.7.4.2 mrg
264 1.7.4.2 mrg return 0;
265 1.7.4.2 mrg }
266 1.7.4.2 mrg
267 1.7.4.2 mrg int
268 1.7.4.2 mrg tpm_getburst(struct tpm_softc *sc)
269 1.7.4.2 mrg {
270 1.7.4.2 mrg int burst, to, rv;
271 1.7.4.2 mrg
272 1.7.4.2 mrg to = tpm_tmotohz(TPM_BURST_TMO);
273 1.7.4.2 mrg
274 1.7.4.2 mrg burst = 0;
275 1.7.4.2 mrg while (burst == 0 && to--) {
276 1.7.4.2 mrg /*
277 1.7.4.2 mrg * Burst count has to be read from bits 8 to 23 without
278 1.7.4.2 mrg * touching any other bits, eg. the actual status bits 0
279 1.7.4.2 mrg * to 7.
280 1.7.4.2 mrg */
281 1.7.4.2 mrg burst = bus_space_read_1(sc->sc_bt, sc->sc_bh, TPM_STS + 1);
282 1.7.4.2 mrg burst |= bus_space_read_1(sc->sc_bt, sc->sc_bh, TPM_STS + 2)
283 1.7.4.2 mrg << 8;
284 1.7.4.2 mrg #ifdef TPM_DEBUG
285 1.7.4.2 mrg aprint_debug_dev(sc->sc_dev, "%s: read %d\n", __func__, burst);
286 1.7.4.2 mrg #endif
287 1.7.4.2 mrg if (burst)
288 1.7.4.2 mrg return burst;
289 1.7.4.2 mrg
290 1.7.4.2 mrg rv = tsleep(sc, PRIBIO | PCATCH, "tpm_getburst", 1);
291 1.7.4.2 mrg if (rv && rv != EWOULDBLOCK) {
292 1.7.4.2 mrg return 0;
293 1.7.4.2 mrg }
294 1.7.4.2 mrg }
295 1.7.4.2 mrg
296 1.7.4.2 mrg return 0;
297 1.7.4.2 mrg }
298 1.7.4.2 mrg
299 1.7.4.2 mrg uint8_t
300 1.7.4.2 mrg tpm_status(struct tpm_softc *sc)
301 1.7.4.2 mrg {
302 1.7.4.2 mrg return bus_space_read_1(sc->sc_bt, sc->sc_bh, TPM_STS) & TPM_STS_MASK;
303 1.7.4.2 mrg }
304 1.7.4.2 mrg
305 1.7.4.2 mrg int
306 1.7.4.2 mrg tpm_tmotohz(int tmo)
307 1.7.4.2 mrg {
308 1.7.4.2 mrg struct timeval tv;
309 1.7.4.2 mrg
310 1.7.4.2 mrg tv.tv_sec = tmo / 1000;
311 1.7.4.2 mrg tv.tv_usec = 1000 * (tmo % 1000);
312 1.7.4.2 mrg
313 1.7.4.2 mrg return tvtohz(&tv);
314 1.7.4.2 mrg }
315 1.7.4.2 mrg
316 1.7.4.2 mrg /* Save TPM state on suspend. */
317 1.7.4.2 mrg bool
318 1.7.4.2 mrg tpm_suspend(device_t dev, const pmf_qual_t *qual)
319 1.7.4.2 mrg {
320 1.7.4.2 mrg struct tpm_softc *sc = device_private(dev);
321 1.7.4.2 mrg static const uint8_t command[] = {
322 1.7.4.2 mrg 0, 193, /* TPM_TAG_RQU_COMMAND */
323 1.7.4.2 mrg 0, 0, 0, 10, /* Length in bytes */
324 1.7.4.2 mrg 0, 0, 0, 156 /* TPM_ORD_SaveStates */
325 1.7.4.2 mrg };
326 1.7.4.2 mrg uint8_t scratch[sizeof(command)];
327 1.7.4.2 mrg
328 1.7.4.2 mrg /*
329 1.7.4.2 mrg * Power down: We have to issue the SaveStates command.
330 1.7.4.2 mrg */
331 1.7.4.2 mrg (*sc->sc_write)(sc, &command, sizeof(command));
332 1.7.4.2 mrg (*sc->sc_read)(sc, &scratch, sizeof(scratch), NULL, TPM_HDRSIZE);
333 1.7.4.2 mrg #ifdef TPM_DEBUG
334 1.7.4.2 mrg aprint_debug_dev(sc->sc_dev, "%s: power down\n", __func__);
335 1.7.4.2 mrg #endif
336 1.7.4.2 mrg return true;
337 1.7.4.2 mrg }
338 1.7.4.2 mrg
339 1.7.4.2 mrg /*
340 1.7.4.2 mrg * Handle resume event. Actually nothing to do as the BIOS is supposed
341 1.7.4.2 mrg * to restore the previously saved state.
342 1.7.4.2 mrg */
343 1.7.4.2 mrg bool
344 1.7.4.2 mrg tpm_resume(device_t dev, const pmf_qual_t *qual)
345 1.7.4.2 mrg {
346 1.7.4.2 mrg #ifdef TPM_DEBUG
347 1.7.4.2 mrg struct tpm_softc *sc = device_private(dev);
348 1.7.4.2 mrg aprint_debug_dev(sc->sc_dev, "%s: resume\n", __func__);
349 1.7.4.2 mrg #endif
350 1.7.4.2 mrg return true;
351 1.7.4.2 mrg }
352 1.7.4.2 mrg
353 1.7.4.2 mrg /* Wait for given status bits using polling. */
354 1.7.4.2 mrg int
355 1.7.4.2 mrg tpm_waitfor_poll(struct tpm_softc *sc, uint8_t mask, int tmo, void *c)
356 1.7.4.2 mrg {
357 1.7.4.2 mrg int rv;
358 1.7.4.2 mrg
359 1.7.4.2 mrg /*
360 1.7.4.2 mrg * Poll until either the requested condition or a time out is
361 1.7.4.2 mrg * met.
362 1.7.4.2 mrg */
363 1.7.4.2 mrg while (((sc->sc_stat = tpm_status(sc)) & mask) != mask && tmo--) {
364 1.7.4.2 mrg rv = tsleep(c, PRIBIO | PCATCH, "tpm_poll", 1);
365 1.7.4.2 mrg if (rv && rv != EWOULDBLOCK) {
366 1.7.4.2 mrg #ifdef TPM_DEBUG
367 1.7.4.2 mrg aprint_debug_dev(sc->sc_dev,
368 1.7.4.2 mrg "%s: interrupted %d\n", __func__, rv);
369 1.7.4.2 mrg #endif
370 1.7.4.2 mrg return rv;
371 1.7.4.2 mrg }
372 1.7.4.2 mrg }
373 1.7.4.2 mrg
374 1.7.4.2 mrg return 0;
375 1.7.4.2 mrg }
376 1.7.4.2 mrg
377 1.7.4.2 mrg /* Wait for given status bits using interrupts. */
378 1.7.4.2 mrg int
379 1.7.4.2 mrg tpm_waitfor_int(struct tpm_softc *sc, uint8_t mask, int tmo, void *c,
380 1.7.4.2 mrg int inttype)
381 1.7.4.2 mrg {
382 1.7.4.2 mrg int rv, to;
383 1.7.4.2 mrg
384 1.7.4.2 mrg /* Poll and return when condition is already met. */
385 1.7.4.2 mrg sc->sc_stat = tpm_status(sc);
386 1.7.4.2 mrg if ((sc->sc_stat & mask) == mask)
387 1.7.4.2 mrg return 0;
388 1.7.4.2 mrg
389 1.7.4.2 mrg /*
390 1.7.4.2 mrg * Enable interrupt on tpm chip. Note that interrupts on our
391 1.7.4.2 mrg * level (SPL_TTY) are disabled (see tpm{read,write} et al) and
392 1.7.4.2 mrg * will not be delivered to the cpu until we call tsleep(9) below.
393 1.7.4.2 mrg */
394 1.7.4.2 mrg bus_space_write_4(sc->sc_bt, sc->sc_bh, TPM_INTERRUPT_ENABLE,
395 1.7.4.2 mrg bus_space_read_4(sc->sc_bt, sc->sc_bh, TPM_INTERRUPT_ENABLE) |
396 1.7.4.2 mrg inttype);
397 1.7.4.2 mrg bus_space_write_4(sc->sc_bt, sc->sc_bh, TPM_INTERRUPT_ENABLE,
398 1.7.4.2 mrg bus_space_read_4(sc->sc_bt, sc->sc_bh, TPM_INTERRUPT_ENABLE) |
399 1.7.4.2 mrg TPM_GLOBAL_INT_ENABLE);
400 1.7.4.2 mrg
401 1.7.4.2 mrg /*
402 1.7.4.2 mrg * Poll once more to remedy the race between previous polling
403 1.7.4.2 mrg * and enabling interrupts on the tpm chip.
404 1.7.4.2 mrg */
405 1.7.4.2 mrg sc->sc_stat = tpm_status(sc);
406 1.7.4.2 mrg if ((sc->sc_stat & mask) == mask) {
407 1.7.4.2 mrg rv = 0;
408 1.7.4.2 mrg goto out;
409 1.7.4.2 mrg }
410 1.7.4.2 mrg
411 1.7.4.2 mrg to = tpm_tmotohz(tmo);
412 1.7.4.2 mrg #ifdef TPM_DEBUG
413 1.7.4.2 mrg aprint_debug_dev(sc->sc_dev,
414 1.7.4.2 mrg "%s: sleeping for %d ticks on %p\n", __func__, to, c);
415 1.7.4.2 mrg #endif
416 1.7.4.2 mrg /*
417 1.7.4.2 mrg * tsleep(9) enables interrupts on the cpu and returns after
418 1.7.4.2 mrg * wake up with interrupts disabled again. Note that interrupts
419 1.7.4.2 mrg * generated by the tpm chip while being at SPL_TTY are not lost
420 1.7.4.2 mrg * but held and delivered as soon as the cpu goes below SPL_TTY.
421 1.7.4.2 mrg */
422 1.7.4.2 mrg rv = tsleep(c, PRIBIO | PCATCH, "tpm_wait", to);
423 1.7.4.2 mrg
424 1.7.4.2 mrg sc->sc_stat = tpm_status(sc);
425 1.7.4.2 mrg #ifdef TPM_DEBUG
426 1.7.4.2 mrg char buf[128];
427 1.7.4.2 mrg snprintb(buf, sizeof(buf), TPM_STS_BITS, sc->sc_stat);
428 1.7.4.2 mrg aprint_debug_dev(sc->sc_dev,
429 1.7.4.2 mrg "%s: woke up with rv %d stat %s\n", __func__, rv, buf);
430 1.7.4.2 mrg #endif
431 1.7.4.2 mrg if ((sc->sc_stat & mask) == mask)
432 1.7.4.2 mrg rv = 0;
433 1.7.4.2 mrg
434 1.7.4.2 mrg /* Disable interrupts on tpm chip again. */
435 1.7.4.2 mrg out: bus_space_write_4(sc->sc_bt, sc->sc_bh, TPM_INTERRUPT_ENABLE,
436 1.7.4.2 mrg bus_space_read_4(sc->sc_bt, sc->sc_bh, TPM_INTERRUPT_ENABLE) &
437 1.7.4.2 mrg ~TPM_GLOBAL_INT_ENABLE);
438 1.7.4.2 mrg bus_space_write_4(sc->sc_bt, sc->sc_bh, TPM_INTERRUPT_ENABLE,
439 1.7.4.2 mrg bus_space_read_4(sc->sc_bt, sc->sc_bh, TPM_INTERRUPT_ENABLE) &
440 1.7.4.2 mrg ~inttype);
441 1.7.4.2 mrg
442 1.7.4.2 mrg return rv;
443 1.7.4.2 mrg }
444 1.7.4.2 mrg
445 1.7.4.2 mrg /*
446 1.7.4.2 mrg * Wait on given status bits, uses interrupts where possible, otherwise polls.
447 1.7.4.2 mrg */
448 1.7.4.2 mrg int
449 1.7.4.2 mrg tpm_waitfor(struct tpm_softc *sc, uint8_t b0, int tmo, void *c)
450 1.7.4.2 mrg {
451 1.7.4.2 mrg uint8_t b;
452 1.7.4.2 mrg int re, to, rv;
453 1.7.4.2 mrg
454 1.7.4.2 mrg #ifdef TPM_DEBUG
455 1.7.4.2 mrg char buf[128];
456 1.7.4.2 mrg snprintb(buf, sizeof(buf), TPM_STS_BITS, sc->sc_stat);
457 1.7.4.2 mrg aprint_debug_dev(sc->sc_dev, "%s: b0 %s\n", __func__, buf);
458 1.7.4.2 mrg #endif
459 1.7.4.2 mrg
460 1.7.4.2 mrg /*
461 1.7.4.2 mrg * If possible, use interrupts, otherwise poll.
462 1.7.4.2 mrg *
463 1.7.4.2 mrg * We use interrupts for TPM_STS_VALID and TPM_STS_DATA_AVAIL (if
464 1.7.4.2 mrg * the tpm chips supports them) as waiting for those can take
465 1.7.4.2 mrg * really long. The other TPM_STS* are not needed very often
466 1.7.4.2 mrg * so we do not support them.
467 1.7.4.2 mrg */
468 1.7.4.2 mrg if (sc->sc_vector != -1) {
469 1.7.4.2 mrg b = b0;
470 1.7.4.2 mrg
471 1.7.4.2 mrg /*
472 1.7.4.2 mrg * Wait for data ready. This interrupt only occures
473 1.7.4.2 mrg * when both TPM_STS_VALID and TPM_STS_DATA_AVAIL are asserted.
474 1.7.4.2 mrg * Thus we don't have to bother with TPM_STS_VALID
475 1.7.4.2 mrg * separately and can just return.
476 1.7.4.2 mrg *
477 1.7.4.2 mrg * This only holds for interrupts! When using polling
478 1.7.4.2 mrg * both flags have to be waited for, see below.
479 1.7.4.2 mrg */
480 1.7.4.2 mrg if ((b & TPM_STS_DATA_AVAIL) && (sc->sc_capabilities &
481 1.7.4.2 mrg TPM_INTF_DATA_AVAIL_INT))
482 1.7.4.2 mrg return tpm_waitfor_int(sc, b, tmo, c,
483 1.7.4.2 mrg TPM_DATA_AVAIL_INT);
484 1.7.4.2 mrg
485 1.7.4.2 mrg /* Wait for status valid bit. */
486 1.7.4.2 mrg if ((b & TPM_STS_VALID) && (sc->sc_capabilities &
487 1.7.4.2 mrg TPM_INTF_STS_VALID_INT)) {
488 1.7.4.2 mrg rv = tpm_waitfor_int(sc, b, tmo, c, TPM_STS_VALID_INT);
489 1.7.4.2 mrg if (rv != 0)
490 1.7.4.2 mrg return rv;
491 1.7.4.2 mrg else
492 1.7.4.2 mrg b = b0 & ~TPM_STS_VALID;
493 1.7.4.2 mrg }
494 1.7.4.2 mrg
495 1.7.4.2 mrg /*
496 1.7.4.2 mrg * When all flags are taken care of, return. Otherwise
497 1.7.4.2 mrg * use polling for eg. TPM_STS_CMD_READY.
498 1.7.4.2 mrg */
499 1.7.4.2 mrg if (b == 0)
500 1.7.4.2 mrg return 0;
501 1.7.4.2 mrg }
502 1.7.4.2 mrg
503 1.7.4.2 mrg re = 3;
504 1.7.4.2 mrg restart:
505 1.7.4.2 mrg /*
506 1.7.4.2 mrg * If requested wait for TPM_STS_VALID before dealing with
507 1.7.4.2 mrg * any other flag. Eg. when both TPM_STS_DATA_AVAIL and TPM_STS_VALID
508 1.7.4.2 mrg * are requested, wait for the latter first.
509 1.7.4.2 mrg */
510 1.7.4.2 mrg b = b0;
511 1.7.4.2 mrg if (b0 & TPM_STS_VALID)
512 1.7.4.2 mrg b = TPM_STS_VALID;
513 1.7.4.2 mrg
514 1.7.4.2 mrg to = tpm_tmotohz(tmo);
515 1.7.4.2 mrg again:
516 1.7.4.2 mrg if ((rv = tpm_waitfor_poll(sc, b, to, c)) != 0)
517 1.7.4.2 mrg return rv;
518 1.7.4.2 mrg
519 1.7.4.2 mrg if ((b & sc->sc_stat) == TPM_STS_VALID) {
520 1.7.4.2 mrg /* Now wait for other flags. */
521 1.7.4.2 mrg b = b0 & ~TPM_STS_VALID;
522 1.7.4.2 mrg to++;
523 1.7.4.2 mrg goto again;
524 1.7.4.2 mrg }
525 1.7.4.2 mrg
526 1.7.4.2 mrg if ((sc->sc_stat & b) != b) {
527 1.7.4.2 mrg #ifdef TPM_DEBUG
528 1.7.4.2 mrg char bbuf[128], cbuf[128];
529 1.7.4.2 mrg snprintb(bbuf, sizeof(bbuf), TPM_STS_BITS, b);
530 1.7.4.2 mrg snprintb(cbuf, sizeof(cbuf), TPM_STS_BITS, sc->sc_stat);
531 1.7.4.2 mrg aprint_debug_dev(sc->sc_dev,
532 1.7.4.2 mrg "%s: timeout: stat=%s b=%s\n", __func__, cbuf, bbuf);
533 1.7.4.2 mrg #endif
534 1.7.4.2 mrg if (re-- && (b0 & TPM_STS_VALID)) {
535 1.7.4.2 mrg bus_space_write_1(sc->sc_bt, sc->sc_bh, TPM_STS,
536 1.7.4.2 mrg TPM_STS_RESP_RETRY);
537 1.7.4.2 mrg goto restart;
538 1.7.4.2 mrg }
539 1.7.4.2 mrg return EIO;
540 1.7.4.2 mrg }
541 1.7.4.2 mrg
542 1.7.4.2 mrg return 0;
543 1.7.4.2 mrg }
544 1.7.4.2 mrg
545 1.7.4.2 mrg /* Start transaction. */
546 1.7.4.2 mrg int
547 1.7.4.2 mrg tpm_tis12_start(struct tpm_softc *sc, int flag)
548 1.7.4.2 mrg {
549 1.7.4.2 mrg int rv;
550 1.7.4.2 mrg
551 1.7.4.2 mrg if (flag == UIO_READ) {
552 1.7.4.2 mrg rv = tpm_waitfor(sc, TPM_STS_DATA_AVAIL | TPM_STS_VALID,
553 1.7.4.2 mrg TPM_READ_TMO, sc->sc_read);
554 1.7.4.2 mrg return rv;
555 1.7.4.2 mrg }
556 1.7.4.2 mrg
557 1.7.4.2 mrg /* Own our (0th) locality. */
558 1.7.4.2 mrg if ((rv = tpm_request_locality(sc, 0)) != 0)
559 1.7.4.2 mrg return rv;
560 1.7.4.2 mrg
561 1.7.4.2 mrg sc->sc_stat = tpm_status(sc);
562 1.7.4.2 mrg if (sc->sc_stat & TPM_STS_CMD_READY) {
563 1.7.4.2 mrg #ifdef TPM_DEBUG
564 1.7.4.2 mrg char buf[128];
565 1.7.4.2 mrg snprintb(buf, sizeof(buf), TPM_STS_BITS, sc->sc_stat);
566 1.7.4.2 mrg aprint_debug_dev(sc->sc_dev, "%s: UIO_WRITE status %s\n",
567 1.7.4.2 mrg __func__, buf);
568 1.7.4.2 mrg #endif
569 1.7.4.2 mrg return 0;
570 1.7.4.2 mrg }
571 1.7.4.2 mrg
572 1.7.4.2 mrg #ifdef TPM_DEBUG
573 1.7.4.2 mrg aprint_debug_dev(sc->sc_dev,
574 1.7.4.2 mrg "%s: UIO_WRITE readying chip\n", __func__);
575 1.7.4.2 mrg #endif
576 1.7.4.2 mrg
577 1.7.4.2 mrg /* Abort previous and restart. */
578 1.7.4.2 mrg bus_space_write_1(sc->sc_bt, sc->sc_bh, TPM_STS, TPM_STS_CMD_READY);
579 1.7.4.2 mrg if ((rv = tpm_waitfor(sc, TPM_STS_CMD_READY, TPM_READY_TMO,
580 1.7.4.2 mrg sc->sc_write))) {
581 1.7.4.2 mrg #ifdef TPM_DEBUG
582 1.7.4.2 mrg aprint_debug_dev(sc->sc_dev,
583 1.7.4.2 mrg "%s: UIO_WRITE readying failed %d\n", __func__, rv);
584 1.7.4.2 mrg #endif
585 1.7.4.2 mrg return rv;
586 1.7.4.2 mrg }
587 1.7.4.2 mrg
588 1.7.4.2 mrg #ifdef TPM_DEBUG
589 1.7.4.2 mrg aprint_debug_dev(sc->sc_dev,
590 1.7.4.2 mrg "%s: UIO_WRITE readying done\n", __func__);
591 1.7.4.2 mrg #endif
592 1.7.4.2 mrg
593 1.7.4.2 mrg return 0;
594 1.7.4.2 mrg }
595 1.7.4.2 mrg
596 1.7.4.2 mrg int
597 1.7.4.2 mrg tpm_tis12_read(struct tpm_softc *sc, void *buf, size_t len, size_t *count,
598 1.7.4.2 mrg int flags)
599 1.7.4.2 mrg {
600 1.7.4.2 mrg uint8_t *p = buf;
601 1.7.4.2 mrg size_t cnt;
602 1.7.4.2 mrg int rv, n, bcnt;
603 1.7.4.2 mrg
604 1.7.4.2 mrg #ifdef TPM_DEBUG
605 1.7.4.2 mrg aprint_debug_dev(sc->sc_dev, "%s: len %zu\n", __func__, len);
606 1.7.4.2 mrg #endif
607 1.7.4.2 mrg cnt = 0;
608 1.7.4.2 mrg while (len > 0) {
609 1.7.4.2 mrg if ((rv = tpm_waitfor(sc, TPM_STS_DATA_AVAIL | TPM_STS_VALID,
610 1.7.4.2 mrg TPM_READ_TMO, sc->sc_read)))
611 1.7.4.2 mrg return rv;
612 1.7.4.2 mrg
613 1.7.4.2 mrg bcnt = tpm_getburst(sc);
614 1.7.4.2 mrg n = MIN(len, bcnt);
615 1.7.4.2 mrg #ifdef TPM_DEBUG
616 1.7.4.2 mrg aprint_debug_dev(sc->sc_dev,
617 1.7.4.2 mrg "%s: fetching %d, burst is %d\n", __func__, n, bcnt);
618 1.7.4.2 mrg #endif
619 1.7.4.2 mrg for (; n--; len--) {
620 1.7.4.2 mrg *p++ = bus_space_read_1(sc->sc_bt, sc->sc_bh, TPM_DATA);
621 1.7.4.2 mrg cnt++;
622 1.7.4.2 mrg }
623 1.7.4.2 mrg
624 1.7.4.2 mrg if ((flags & TPM_PARAM_SIZE) == 0 && cnt >= 6)
625 1.7.4.2 mrg break;
626 1.7.4.2 mrg }
627 1.7.4.2 mrg #ifdef TPM_DEBUG
628 1.7.4.2 mrg aprint_debug_dev(sc->sc_dev,
629 1.7.4.2 mrg "%s: read %zu bytes, len %zu\n", __func__, cnt, len);
630 1.7.4.2 mrg #endif
631 1.7.4.2 mrg
632 1.7.4.2 mrg if (count)
633 1.7.4.2 mrg *count = cnt;
634 1.7.4.2 mrg
635 1.7.4.2 mrg return 0;
636 1.7.4.2 mrg }
637 1.7.4.2 mrg
638 1.7.4.2 mrg int
639 1.7.4.2 mrg tpm_tis12_write(struct tpm_softc *sc, const void *buf, size_t len)
640 1.7.4.2 mrg {
641 1.7.4.2 mrg const uint8_t *p = buf;
642 1.7.4.2 mrg size_t cnt;
643 1.7.4.2 mrg int rv, r;
644 1.7.4.2 mrg
645 1.7.4.2 mrg #ifdef TPM_DEBUG
646 1.7.4.2 mrg aprint_debug_dev(sc->sc_dev,
647 1.7.4.2 mrg "%s: sc %p buf %p len %zu\n", __func__, sc, buf, len);
648 1.7.4.2 mrg #endif
649 1.7.4.2 mrg if (len == 0)
650 1.7.4.2 mrg return 0;
651 1.7.4.2 mrg
652 1.7.4.2 mrg if ((rv = tpm_request_locality(sc, 0)) != 0)
653 1.7.4.2 mrg return rv;
654 1.7.4.2 mrg
655 1.7.4.2 mrg cnt = 0;
656 1.7.4.2 mrg while (cnt < len - 1) {
657 1.7.4.2 mrg for (r = tpm_getburst(sc); r > 0 && cnt < len - 1; r--) {
658 1.7.4.2 mrg bus_space_write_1(sc->sc_bt, sc->sc_bh, TPM_DATA, *p++);
659 1.7.4.2 mrg cnt++;
660 1.7.4.2 mrg }
661 1.7.4.2 mrg if ((rv = tpm_waitfor(sc, TPM_STS_VALID, TPM_READ_TMO, sc))) {
662 1.7.4.2 mrg #ifdef TPM_DEBUG
663 1.7.4.2 mrg aprint_debug_dev(sc->sc_dev,
664 1.7.4.2 mrg "%s: failed burst rv %d\n", __func__, rv);
665 1.7.4.2 mrg #endif
666 1.7.4.2 mrg return rv;
667 1.7.4.2 mrg }
668 1.7.4.2 mrg sc->sc_stat = tpm_status(sc);
669 1.7.4.2 mrg if (!(sc->sc_stat & TPM_STS_DATA_EXPECT)) {
670 1.7.4.2 mrg #ifdef TPM_DEBUG
671 1.7.4.2 mrg char sbuf[128];
672 1.7.4.2 mrg snprintb(sbuf, sizeof(sbuf), TPM_STS_BITS, sc->sc_stat);
673 1.7.4.2 mrg aprint_debug_dev(sc->sc_dev,
674 1.7.4.2 mrg "%s: failed rv %d stat=%s\n", __func__, rv, sbuf);
675 1.7.4.2 mrg #endif
676 1.7.4.2 mrg return EIO;
677 1.7.4.2 mrg }
678 1.7.4.2 mrg }
679 1.7.4.2 mrg
680 1.7.4.2 mrg bus_space_write_1(sc->sc_bt, sc->sc_bh, TPM_DATA, *p++);
681 1.7.4.2 mrg cnt++;
682 1.7.4.2 mrg
683 1.7.4.2 mrg if ((rv = tpm_waitfor(sc, TPM_STS_VALID, TPM_READ_TMO, sc))) {
684 1.7.4.2 mrg #ifdef TPM_DEBUG
685 1.7.4.2 mrg aprint_debug_dev(sc->sc_dev, "%s: failed last byte rv %d\n",
686 1.7.4.2 mrg __func__, rv);
687 1.7.4.2 mrg #endif
688 1.7.4.2 mrg return rv;
689 1.7.4.2 mrg }
690 1.7.4.2 mrg if ((sc->sc_stat & TPM_STS_DATA_EXPECT) != 0) {
691 1.7.4.2 mrg #ifdef TPM_DEBUG
692 1.7.4.2 mrg char sbuf[128];
693 1.7.4.2 mrg snprintb(sbuf, sizeof(sbuf), TPM_STS_BITS, sc->sc_stat);
694 1.7.4.2 mrg aprint_debug_dev(sc->sc_dev,
695 1.7.4.2 mrg "%s: failed rv %d stat=%s\n", __func__, rv, sbuf);
696 1.7.4.2 mrg #endif
697 1.7.4.2 mrg return EIO;
698 1.7.4.2 mrg }
699 1.7.4.2 mrg
700 1.7.4.2 mrg #ifdef TPM_DEBUG
701 1.7.4.2 mrg aprint_debug_dev(sc->sc_dev, "%s: wrote %zu byte\n", __func__, cnt);
702 1.7.4.2 mrg #endif
703 1.7.4.2 mrg
704 1.7.4.2 mrg return 0;
705 1.7.4.2 mrg }
706 1.7.4.2 mrg
707 1.7.4.2 mrg /* Finish transaction. */
708 1.7.4.2 mrg int
709 1.7.4.2 mrg tpm_tis12_end(struct tpm_softc *sc, int flag, int err)
710 1.7.4.2 mrg {
711 1.7.4.2 mrg int rv = 0;
712 1.7.4.2 mrg
713 1.7.4.2 mrg if (flag == UIO_READ) {
714 1.7.4.2 mrg if ((rv = tpm_waitfor(sc, TPM_STS_VALID, TPM_READ_TMO,
715 1.7.4.2 mrg sc->sc_read)))
716 1.7.4.2 mrg return rv;
717 1.7.4.2 mrg
718 1.7.4.2 mrg /* Still more data? */
719 1.7.4.2 mrg sc->sc_stat = tpm_status(sc);
720 1.7.4.2 mrg if (!err && ((sc->sc_stat & TPM_STS_DATA_AVAIL)
721 1.7.4.2 mrg == TPM_STS_DATA_AVAIL)) {
722 1.7.4.2 mrg #ifdef TPM_DEBUG
723 1.7.4.2 mrg char buf[128];
724 1.7.4.2 mrg snprintb(buf, sizeof(buf), TPM_STS_BITS, sc->sc_stat);
725 1.7.4.2 mrg aprint_debug_dev(sc->sc_dev,
726 1.7.4.2 mrg "%s: read failed stat=%s\n", __func__, buf);
727 1.7.4.2 mrg #endif
728 1.7.4.2 mrg rv = EIO;
729 1.7.4.2 mrg }
730 1.7.4.2 mrg
731 1.7.4.2 mrg bus_space_write_1(sc->sc_bt, sc->sc_bh, TPM_STS,
732 1.7.4.2 mrg TPM_STS_CMD_READY);
733 1.7.4.2 mrg
734 1.7.4.2 mrg /* Release our (0th) locality. */
735 1.7.4.2 mrg bus_space_write_1(sc->sc_bt, sc->sc_bh,TPM_ACCESS,
736 1.7.4.2 mrg TPM_ACCESS_ACTIVE_LOCALITY);
737 1.7.4.2 mrg } else {
738 1.7.4.2 mrg /* Hungry for more? */
739 1.7.4.2 mrg sc->sc_stat = tpm_status(sc);
740 1.7.4.2 mrg if (!err && (sc->sc_stat & TPM_STS_DATA_EXPECT)) {
741 1.7.4.2 mrg #ifdef TPM_DEBUG
742 1.7.4.2 mrg char buf[128];
743 1.7.4.2 mrg snprintb(buf, sizeof(buf), TPM_STS_BITS, sc->sc_stat);
744 1.7.4.2 mrg aprint_debug_dev(sc->sc_dev,
745 1.7.4.2 mrg "%s: write failed stat=%s\n", __func__, buf);
746 1.7.4.2 mrg #endif
747 1.7.4.2 mrg rv = EIO;
748 1.7.4.2 mrg }
749 1.7.4.2 mrg
750 1.7.4.2 mrg bus_space_write_1(sc->sc_bt, sc->sc_bh, TPM_STS,
751 1.7.4.2 mrg err ? TPM_STS_CMD_READY : TPM_STS_GO);
752 1.7.4.2 mrg }
753 1.7.4.2 mrg
754 1.7.4.2 mrg return rv;
755 1.7.4.2 mrg }
756 1.7.4.2 mrg
757 1.7.4.2 mrg int
758 1.7.4.2 mrg tpm_intr(void *v)
759 1.7.4.2 mrg {
760 1.7.4.2 mrg struct tpm_softc *sc = v;
761 1.7.4.2 mrg uint32_t r;
762 1.7.4.2 mrg #ifdef TPM_DEBUG
763 1.7.4.2 mrg static int cnt = 0;
764 1.7.4.2 mrg #endif
765 1.7.4.2 mrg
766 1.7.4.2 mrg r = bus_space_read_4(sc->sc_bt, sc->sc_bh, TPM_INT_STATUS);
767 1.7.4.2 mrg #ifdef TPM_DEBUG
768 1.7.4.2 mrg if (r != 0) {
769 1.7.4.2 mrg char buf[128];
770 1.7.4.2 mrg snprintb(buf, sizeof(buf), TPM_INTERRUPT_ENABLE_BITS, r);
771 1.7.4.2 mrg aprint_debug_dev(sc->sc_dev, "%s: int=%s (%d)\n", __func__,
772 1.7.4.2 mrg buf, cnt);
773 1.7.4.2 mrg } else
774 1.7.4.2 mrg cnt++;
775 1.7.4.2 mrg #endif
776 1.7.4.2 mrg if (!(r & (TPM_CMD_READY_INT | TPM_LOCALITY_CHANGE_INT |
777 1.7.4.2 mrg TPM_STS_VALID_INT | TPM_DATA_AVAIL_INT)))
778 1.7.4.2 mrg #ifdef __FreeBSD__
779 1.7.4.2 mrg return;
780 1.7.4.2 mrg #else
781 1.7.4.2 mrg return 0;
782 1.7.4.2 mrg #endif
783 1.7.4.2 mrg if (r & TPM_STS_VALID_INT)
784 1.7.4.2 mrg wakeup(sc);
785 1.7.4.2 mrg
786 1.7.4.2 mrg if (r & TPM_CMD_READY_INT)
787 1.7.4.2 mrg wakeup(sc->sc_write);
788 1.7.4.2 mrg
789 1.7.4.2 mrg if (r & TPM_DATA_AVAIL_INT)
790 1.7.4.2 mrg wakeup(sc->sc_read);
791 1.7.4.2 mrg
792 1.7.4.2 mrg if (r & TPM_LOCALITY_CHANGE_INT)
793 1.7.4.2 mrg wakeup(sc->sc_init);
794 1.7.4.2 mrg
795 1.7.4.2 mrg bus_space_write_4(sc->sc_bt, sc->sc_bh, TPM_INT_STATUS, r);
796 1.7.4.2 mrg
797 1.7.4.2 mrg return 1;
798 1.7.4.2 mrg }
799 1.7.4.2 mrg
800 1.7.4.2 mrg /* Read single byte using legacy interface. */
801 1.7.4.2 mrg static inline uint8_t
802 1.7.4.2 mrg tpm_legacy_in(bus_space_tag_t iot, bus_space_handle_t ioh, int reg)
803 1.7.4.2 mrg {
804 1.7.4.2 mrg bus_space_write_1(iot, ioh, 0, reg);
805 1.7.4.2 mrg return bus_space_read_1(iot, ioh, 1);
806 1.7.4.2 mrg }
807 1.7.4.2 mrg
808 1.7.4.2 mrg /* Write single byte using legacy interface. */
809 1.7.4.2 mrg static inline void
810 1.7.4.2 mrg tpm_legacy_out(bus_space_tag_t iot, bus_space_handle_t ioh, int reg, uint8_t v)
811 1.7.4.2 mrg {
812 1.7.4.2 mrg bus_space_write_1(iot, ioh, 0, reg);
813 1.7.4.2 mrg bus_space_write_1(iot, ioh, 1, v);
814 1.7.4.2 mrg }
815 1.7.4.2 mrg
816 1.7.4.2 mrg /* Probe for TPM using legacy interface. */
817 1.7.4.2 mrg int
818 1.7.4.2 mrg tpm_legacy_probe(bus_space_tag_t iot, bus_addr_t iobase)
819 1.7.4.2 mrg {
820 1.7.4.2 mrg bus_space_handle_t ioh;
821 1.7.4.2 mrg uint8_t r, v;
822 1.7.4.2 mrg int i, rv = 0;
823 1.7.4.2 mrg char id[8];
824 1.7.4.2 mrg
825 1.7.4.2 mrg if (!tpm_enabled || iobase == -1)
826 1.7.4.2 mrg return 0;
827 1.7.4.2 mrg
828 1.7.4.2 mrg if (bus_space_map(iot, iobase, 2, 0, &ioh))
829 1.7.4.2 mrg return 0;
830 1.7.4.2 mrg
831 1.7.4.2 mrg v = bus_space_read_1(iot, ioh, 0);
832 1.7.4.2 mrg if (v == 0xff) {
833 1.7.4.2 mrg bus_space_unmap(iot, ioh, 2);
834 1.7.4.2 mrg return 0;
835 1.7.4.2 mrg }
836 1.7.4.2 mrg r = bus_space_read_1(iot, ioh, 1);
837 1.7.4.2 mrg
838 1.7.4.2 mrg for (i = sizeof(id); i--; )
839 1.7.4.2 mrg id[i] = tpm_legacy_in(iot, ioh, TPM_ID + i);
840 1.7.4.2 mrg
841 1.7.4.2 mrg #ifdef TPM_DEBUG
842 1.7.4.2 mrg printf("tpm_legacy_probe %.4s %d.%d.%d.%d\n",
843 1.7.4.2 mrg &id[4], id[0], id[1], id[2], id[3]);
844 1.7.4.2 mrg #endif
845 1.7.4.2 mrg /*
846 1.7.4.2 mrg * The only chips using the legacy interface we are aware of are
847 1.7.4.2 mrg * by Atmel. For other chips more signature would have to be added.
848 1.7.4.2 mrg */
849 1.7.4.2 mrg if (!bcmp(&id[4], "ATML", 4))
850 1.7.4.2 mrg rv = 1;
851 1.7.4.2 mrg
852 1.7.4.2 mrg if (!rv) {
853 1.7.4.2 mrg bus_space_write_1(iot, ioh, r, 1);
854 1.7.4.2 mrg bus_space_write_1(iot, ioh, v, 0);
855 1.7.4.2 mrg }
856 1.7.4.2 mrg bus_space_unmap(iot, ioh, 2);
857 1.7.4.2 mrg
858 1.7.4.2 mrg return rv;
859 1.7.4.2 mrg }
860 1.7.4.2 mrg
861 1.7.4.2 mrg /* Setup TPM using legacy interface. */
862 1.7.4.2 mrg int
863 1.7.4.2 mrg tpm_legacy_init(struct tpm_softc *sc, int irq, const char *name)
864 1.7.4.2 mrg {
865 1.7.4.2 mrg char id[8];
866 1.7.4.2 mrg uint8_t ioh, iol;
867 1.7.4.2 mrg int i;
868 1.7.4.2 mrg
869 1.7.4.2 mrg if ((i = bus_space_map(sc->sc_batm, tpm_enabled, 2, 0, &sc->sc_bahm))) {
870 1.7.4.2 mrg aprint_debug_dev(sc->sc_dev, "cannot map tpm registers (%d)\n",
871 1.7.4.2 mrg i);
872 1.7.4.2 mrg tpm_enabled = 0;
873 1.7.4.2 mrg return 1;
874 1.7.4.2 mrg }
875 1.7.4.2 mrg
876 1.7.4.2 mrg for (i = sizeof(id); i--; )
877 1.7.4.2 mrg id[i] = tpm_legacy_in(sc->sc_bt, sc->sc_bh, TPM_ID + i);
878 1.7.4.2 mrg
879 1.7.4.2 mrg aprint_debug_dev(sc->sc_dev, "%.4s %d.%d @0x%x\n", &id[4], id[0],
880 1.7.4.2 mrg id[1], tpm_enabled);
881 1.7.4.2 mrg iol = tpm_enabled & 0xff;
882 1.7.4.2 mrg ioh = tpm_enabled >> 16;
883 1.7.4.2 mrg tpm_enabled = 0;
884 1.7.4.2 mrg
885 1.7.4.2 mrg return 0;
886 1.7.4.2 mrg }
887 1.7.4.2 mrg
888 1.7.4.2 mrg /* Start transaction. */
889 1.7.4.2 mrg int
890 1.7.4.2 mrg tpm_legacy_start(struct tpm_softc *sc, int flag)
891 1.7.4.2 mrg {
892 1.7.4.2 mrg struct timeval tv;
893 1.7.4.2 mrg uint8_t bits, r;
894 1.7.4.2 mrg int to, rv;
895 1.7.4.2 mrg
896 1.7.4.2 mrg bits = flag == UIO_READ ? TPM_LEGACY_DA : 0;
897 1.7.4.2 mrg tv.tv_sec = TPM_LEGACY_TMO;
898 1.7.4.2 mrg tv.tv_usec = 0;
899 1.7.4.2 mrg to = tvtohz(&tv) / TPM_LEGACY_SLEEP;
900 1.7.4.2 mrg while (((r = bus_space_read_1(sc->sc_batm, sc->sc_bahm, 1)) &
901 1.7.4.2 mrg (TPM_LEGACY_BUSY|bits)) != bits && to--) {
902 1.7.4.2 mrg rv = tsleep(sc, PRIBIO | PCATCH, "legacy_tpm_start",
903 1.7.4.2 mrg TPM_LEGACY_SLEEP);
904 1.7.4.2 mrg if (rv && rv != EWOULDBLOCK)
905 1.7.4.2 mrg return rv;
906 1.7.4.2 mrg }
907 1.7.4.2 mrg
908 1.7.4.2 mrg #if defined(TPM_DEBUG) && !defined(__FreeBSD__)
909 1.7.4.2 mrg char buf[128];
910 1.7.4.2 mrg snprintb(buf, sizeof(buf), TPM_LEGACY_BITS, r);
911 1.7.4.2 mrg aprint_debug_dev(sc->sc_dev, "%s: bits %s\n", device_xname(sc->sc_dev),
912 1.7.4.2 mrg buf);
913 1.7.4.2 mrg #endif
914 1.7.4.2 mrg if ((r & (TPM_LEGACY_BUSY|bits)) != bits)
915 1.7.4.2 mrg return EIO;
916 1.7.4.2 mrg
917 1.7.4.2 mrg return 0;
918 1.7.4.2 mrg }
919 1.7.4.2 mrg
920 1.7.4.2 mrg int
921 1.7.4.2 mrg tpm_legacy_read(struct tpm_softc *sc, void *buf, size_t len, size_t *count,
922 1.7.4.2 mrg int flags)
923 1.7.4.2 mrg {
924 1.7.4.2 mrg uint8_t *p;
925 1.7.4.2 mrg size_t cnt;
926 1.7.4.2 mrg int to, rv;
927 1.7.4.2 mrg
928 1.7.4.2 mrg cnt = rv = 0;
929 1.7.4.2 mrg for (p = buf; !rv && len > 0; len--) {
930 1.7.4.2 mrg for (to = 1000;
931 1.7.4.2 mrg !(bus_space_read_1(sc->sc_batm, sc->sc_bahm, 1) &
932 1.7.4.2 mrg TPM_LEGACY_DA); DELAY(1))
933 1.7.4.2 mrg if (!to--)
934 1.7.4.2 mrg return EIO;
935 1.7.4.2 mrg
936 1.7.4.2 mrg DELAY(TPM_LEGACY_DELAY);
937 1.7.4.2 mrg *p++ = bus_space_read_1(sc->sc_batm, sc->sc_bahm, 0);
938 1.7.4.2 mrg cnt++;
939 1.7.4.2 mrg }
940 1.7.4.2 mrg
941 1.7.4.2 mrg *count = cnt;
942 1.7.4.2 mrg return 0;
943 1.7.4.2 mrg }
944 1.7.4.2 mrg
945 1.7.4.2 mrg int
946 1.7.4.2 mrg tpm_legacy_write(struct tpm_softc *sc, const void *buf, size_t len)
947 1.7.4.2 mrg {
948 1.7.4.2 mrg const uint8_t *p;
949 1.7.4.2 mrg size_t n;
950 1.7.4.2 mrg
951 1.7.4.2 mrg for (p = buf, n = len; n--; DELAY(TPM_LEGACY_DELAY)) {
952 1.7.4.2 mrg if (!n && len != TPM_BUFSIZ) {
953 1.7.4.2 mrg bus_space_write_1(sc->sc_batm, sc->sc_bahm, 1,
954 1.7.4.2 mrg TPM_LEGACY_LAST);
955 1.7.4.2 mrg DELAY(TPM_LEGACY_DELAY);
956 1.7.4.2 mrg }
957 1.7.4.2 mrg bus_space_write_1(sc->sc_batm, sc->sc_bahm, 0, *p++);
958 1.7.4.2 mrg }
959 1.7.4.2 mrg
960 1.7.4.2 mrg return 0;
961 1.7.4.2 mrg }
962 1.7.4.2 mrg
963 1.7.4.2 mrg /* Finish transaction. */
964 1.7.4.2 mrg int
965 1.7.4.2 mrg tpm_legacy_end(struct tpm_softc *sc, int flag, int rv)
966 1.7.4.2 mrg {
967 1.7.4.2 mrg struct timeval tv;
968 1.7.4.2 mrg uint8_t r;
969 1.7.4.2 mrg int to;
970 1.7.4.2 mrg
971 1.7.4.2 mrg if (rv || flag == UIO_READ)
972 1.7.4.2 mrg bus_space_write_1(sc->sc_batm, sc->sc_bahm, 1, TPM_LEGACY_ABRT);
973 1.7.4.2 mrg else {
974 1.7.4.2 mrg tv.tv_sec = TPM_LEGACY_TMO;
975 1.7.4.2 mrg tv.tv_usec = 0;
976 1.7.4.2 mrg to = tvtohz(&tv) / TPM_LEGACY_SLEEP;
977 1.7.4.2 mrg while(((r = bus_space_read_1(sc->sc_batm, sc->sc_bahm, 1)) &
978 1.7.4.2 mrg TPM_LEGACY_BUSY) && to--) {
979 1.7.4.2 mrg rv = tsleep(sc, PRIBIO | PCATCH, "legacy_tpm_end",
980 1.7.4.2 mrg TPM_LEGACY_SLEEP);
981 1.7.4.2 mrg if (rv && rv != EWOULDBLOCK)
982 1.7.4.2 mrg return rv;
983 1.7.4.2 mrg }
984 1.7.4.2 mrg
985 1.7.4.2 mrg #if defined(TPM_DEBUG) && !defined(__FreeBSD__)
986 1.7.4.2 mrg char buf[128];
987 1.7.4.2 mrg snprintb(buf, sizeof(buf), TPM_LEGACY_BITS, r);
988 1.7.4.2 mrg aprint_debug_dev(sc->sc_dev, "%s: bits %s\n",
989 1.7.4.2 mrg device_xname(sc->sc_dev), buf);
990 1.7.4.2 mrg #endif
991 1.7.4.2 mrg if (r & TPM_LEGACY_BUSY)
992 1.7.4.2 mrg return EIO;
993 1.7.4.2 mrg
994 1.7.4.2 mrg if (r & TPM_LEGACY_RE)
995 1.7.4.2 mrg return EIO; /* XXX Retry the loop? */
996 1.7.4.2 mrg }
997 1.7.4.2 mrg
998 1.7.4.2 mrg return rv;
999 1.7.4.2 mrg }
1000 1.7.4.2 mrg
1001 1.7.4.2 mrg int
1002 1.7.4.2 mrg tpmopen(dev_t dev, int flag, int mode, struct lwp *l)
1003 1.7.4.2 mrg {
1004 1.7.4.2 mrg struct tpm_softc *sc = device_lookup_private(&tpm_cd, TPMUNIT(dev));
1005 1.7.4.2 mrg
1006 1.7.4.2 mrg if (!sc)
1007 1.7.4.2 mrg return ENXIO;
1008 1.7.4.2 mrg
1009 1.7.4.2 mrg if (sc->sc_flags & TPM_OPEN)
1010 1.7.4.2 mrg return EBUSY;
1011 1.7.4.2 mrg
1012 1.7.4.2 mrg sc->sc_flags |= TPM_OPEN;
1013 1.7.4.2 mrg
1014 1.7.4.2 mrg return 0;
1015 1.7.4.2 mrg }
1016 1.7.4.2 mrg
1017 1.7.4.2 mrg int
1018 1.7.4.2 mrg tpmclose(dev_t dev, int flag, int mode, struct lwp *l)
1019 1.7.4.2 mrg {
1020 1.7.4.2 mrg struct tpm_softc *sc = device_lookup_private(&tpm_cd, TPMUNIT(dev));
1021 1.7.4.2 mrg
1022 1.7.4.2 mrg if (!sc)
1023 1.7.4.2 mrg return ENXIO;
1024 1.7.4.2 mrg
1025 1.7.4.2 mrg if (!(sc->sc_flags & TPM_OPEN))
1026 1.7.4.2 mrg return EINVAL;
1027 1.7.4.2 mrg
1028 1.7.4.2 mrg sc->sc_flags &= ~TPM_OPEN;
1029 1.7.4.2 mrg
1030 1.7.4.2 mrg return 0;
1031 1.7.4.2 mrg }
1032 1.7.4.2 mrg
1033 1.7.4.2 mrg int
1034 1.7.4.2 mrg tpmread(dev_t dev, struct uio *uio, int flags)
1035 1.7.4.2 mrg {
1036 1.7.4.2 mrg struct tpm_softc *sc = device_lookup_private(&tpm_cd, TPMUNIT(dev));
1037 1.7.4.2 mrg uint8_t buf[TPM_BUFSIZ], *p;
1038 1.7.4.2 mrg size_t cnt, len, n;
1039 1.7.4.2 mrg int rv, s;
1040 1.7.4.2 mrg
1041 1.7.4.2 mrg if (!sc)
1042 1.7.4.2 mrg return ENXIO;
1043 1.7.4.2 mrg
1044 1.7.4.2 mrg s = spltty();
1045 1.7.4.2 mrg if ((rv = (*sc->sc_start)(sc, UIO_READ)))
1046 1.7.4.2 mrg goto out;
1047 1.7.4.2 mrg
1048 1.7.4.2 mrg #ifdef TPM_DEBUG
1049 1.7.4.2 mrg aprint_debug_dev(sc->sc_dev, "%s: getting header\n", __func__);
1050 1.7.4.2 mrg #endif
1051 1.7.4.2 mrg if ((rv = (*sc->sc_read)(sc, buf, TPM_HDRSIZE, &cnt, 0))) {
1052 1.7.4.2 mrg (*sc->sc_end)(sc, UIO_READ, rv);
1053 1.7.4.2 mrg goto out;
1054 1.7.4.2 mrg }
1055 1.7.4.2 mrg
1056 1.7.4.2 mrg len = (buf[2] << 24) | (buf[3] << 16) | (buf[4] << 8) | buf[5];
1057 1.7.4.2 mrg #ifdef TPM_DEBUG
1058 1.7.4.2 mrg aprint_debug_dev(sc->sc_dev, "%s: len %zu, io count %zu\n", __func__,
1059 1.7.4.2 mrg len, uio->uio_resid);
1060 1.7.4.2 mrg #endif
1061 1.7.4.2 mrg if (len > uio->uio_resid) {
1062 1.7.4.2 mrg rv = EIO;
1063 1.7.4.2 mrg (*sc->sc_end)(sc, UIO_READ, rv);
1064 1.7.4.2 mrg #ifdef TPM_DEBUG
1065 1.7.4.2 mrg aprint_debug_dev(sc->sc_dev,
1066 1.7.4.2 mrg "%s: bad residual io count 0x%zx\n", __func__,
1067 1.7.4.2 mrg uio->uio_resid);
1068 1.7.4.2 mrg #endif
1069 1.7.4.2 mrg goto out;
1070 1.7.4.2 mrg }
1071 1.7.4.2 mrg
1072 1.7.4.2 mrg /* Copy out header. */
1073 1.7.4.2 mrg if ((rv = uiomove(buf, cnt, uio))) {
1074 1.7.4.2 mrg #ifdef TPM_DEBUG
1075 1.7.4.2 mrg aprint_debug_dev(sc->sc_dev,
1076 1.7.4.2 mrg "%s: uiomove failed %d\n", __func__, rv);
1077 1.7.4.2 mrg #endif
1078 1.7.4.2 mrg (*sc->sc_end)(sc, UIO_READ, rv);
1079 1.7.4.2 mrg goto out;
1080 1.7.4.2 mrg }
1081 1.7.4.2 mrg
1082 1.7.4.2 mrg /* Get remaining part of the answer (if anything is left). */
1083 1.7.4.2 mrg for (len -= cnt, p = buf, n = sizeof(buf); len > 0; p = buf, len -= n,
1084 1.7.4.2 mrg n = sizeof(buf)) {
1085 1.7.4.2 mrg n = MIN(n, len);
1086 1.7.4.2 mrg #ifdef TPM_DEBUG
1087 1.7.4.2 mrg aprint_debug_dev(sc->sc_dev, "%s: n %zu len %zu\n", __func__,
1088 1.7.4.2 mrg n, len);
1089 1.7.4.2 mrg #endif
1090 1.7.4.2 mrg if ((rv = (*sc->sc_read)(sc, p, n, NULL, TPM_PARAM_SIZE))) {
1091 1.7.4.2 mrg (*sc->sc_end)(sc, UIO_READ, rv);
1092 1.7.4.2 mrg goto out;
1093 1.7.4.2 mrg }
1094 1.7.4.2 mrg p += n;
1095 1.7.4.2 mrg if ((rv = uiomove(buf, p - buf, uio))) {
1096 1.7.4.2 mrg #ifdef TPM_DEBUG
1097 1.7.4.2 mrg aprint_debug_dev(sc->sc_dev,
1098 1.7.4.2 mrg "%s: uiomove failed %d\n", __func__, rv);
1099 1.7.4.2 mrg #endif
1100 1.7.4.2 mrg (*sc->sc_end)(sc, UIO_READ, rv);
1101 1.7.4.2 mrg goto out;
1102 1.7.4.2 mrg }
1103 1.7.4.2 mrg }
1104 1.7.4.2 mrg
1105 1.7.4.2 mrg rv = (*sc->sc_end)(sc, UIO_READ, rv);
1106 1.7.4.2 mrg out:
1107 1.7.4.2 mrg splx(s);
1108 1.7.4.2 mrg return rv;
1109 1.7.4.2 mrg }
1110 1.7.4.2 mrg
1111 1.7.4.2 mrg int
1112 1.7.4.2 mrg tpmwrite(dev_t dev, struct uio *uio, int flags)
1113 1.7.4.2 mrg {
1114 1.7.4.2 mrg struct tpm_softc *sc = device_lookup_private(&tpm_cd, TPMUNIT(dev));
1115 1.7.4.2 mrg uint8_t buf[TPM_BUFSIZ];
1116 1.7.4.2 mrg int n, rv, s;
1117 1.7.4.2 mrg
1118 1.7.4.2 mrg if (!sc)
1119 1.7.4.2 mrg return ENXIO;
1120 1.7.4.2 mrg
1121 1.7.4.2 mrg s = spltty();
1122 1.7.4.2 mrg
1123 1.7.4.2 mrg #ifdef TPM_DEBUG
1124 1.7.4.2 mrg aprint_debug_dev(sc->sc_dev, "%s: io count %zu\n", __func__,
1125 1.7.4.2 mrg uio->uio_resid);
1126 1.7.4.2 mrg #endif
1127 1.7.4.2 mrg
1128 1.7.4.2 mrg n = MIN(sizeof(buf), uio->uio_resid);
1129 1.7.4.2 mrg if ((rv = uiomove(buf, n, uio))) {
1130 1.7.4.2 mrg #ifdef TPM_DEBUG
1131 1.7.4.2 mrg aprint_debug_dev(sc->sc_dev,
1132 1.7.4.2 mrg "%s: uiomove failed %d\n", __func__, rv);
1133 1.7.4.2 mrg #endif
1134 1.7.4.2 mrg splx(s);
1135 1.7.4.2 mrg return rv;
1136 1.7.4.2 mrg }
1137 1.7.4.2 mrg
1138 1.7.4.2 mrg if ((rv = (*sc->sc_start)(sc, UIO_WRITE))) {
1139 1.7.4.2 mrg splx(s);
1140 1.7.4.2 mrg return rv;
1141 1.7.4.2 mrg }
1142 1.7.4.2 mrg
1143 1.7.4.2 mrg if ((rv = (*sc->sc_write)(sc, buf, n))) {
1144 1.7.4.2 mrg splx(s);
1145 1.7.4.2 mrg return rv;
1146 1.7.4.2 mrg }
1147 1.7.4.2 mrg
1148 1.7.4.2 mrg rv = (*sc->sc_end)(sc, UIO_WRITE, rv);
1149 1.7.4.2 mrg splx(s);
1150 1.7.4.2 mrg return rv;
1151 1.7.4.2 mrg }
1152 1.7.4.2 mrg
1153 1.7.4.2 mrg int
1154 1.7.4.2 mrg tpmioctl(dev_t dev, u_long cmd, void *data, int flags, struct lwp *l)
1155 1.7.4.2 mrg {
1156 1.7.4.2 mrg return ENOTTY;
1157 1.7.4.2 mrg }
1158