| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1 | /* | 
|  | 2 | * Copyright (C) 2004 IBM Corporation | 
| Jarkko Sakkinen | a74f8b3 | 2015-10-11 12:26:58 +0300 | [diff] [blame] | 3 | * Copyright (C) 2015 Intel Corporation | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 4 | * | 
|  | 5 | * Authors: | 
|  | 6 | * Leendert van Doorn <leendert@watson.ibm.com> | 
|  | 7 | * Dave Safford <safford@watson.ibm.com> | 
|  | 8 | * Reiner Sailer <sailer@watson.ibm.com> | 
|  | 9 | * Kylene Hall <kjhall@us.ibm.com> | 
|  | 10 | * | 
| Kent Yoder | 8e81cc1 | 2007-08-22 14:01:04 -0700 | [diff] [blame] | 11 | * Maintained by: <tpmdd-devel@lists.sourceforge.net> | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 12 | * | 
|  | 13 | * Device driver for TCG/TCPA TPM (trusted platform module). | 
| Bruno E O Meneguele | 3b09825 | 2015-01-17 17:03:30 +0100 | [diff] [blame] | 14 | * Specifications at www.trustedcomputinggroup.org | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 15 | * | 
|  | 16 | * This program is free software; you can redistribute it and/or | 
|  | 17 | * modify it under the terms of the GNU General Public License as | 
|  | 18 | * published by the Free Software Foundation, version 2 of the | 
|  | 19 | * License. | 
| Bruno E O Meneguele | 3b09825 | 2015-01-17 17:03:30 +0100 | [diff] [blame] | 20 | * | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 21 | */ | 
| Christophe Ricard | d2efee6 | 2016-05-04 21:06:22 +0200 | [diff] [blame] | 22 |  | 
|  | 23 | #ifndef __TPM_H__ | 
|  | 24 | #define __TPM_H__ | 
|  | 25 |  | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 26 | #include <linux/module.h> | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 27 | #include <linux/delay.h> | 
|  | 28 | #include <linux/fs.h> | 
| Matthias Kaehlcke | d081d47 | 2007-05-08 00:32:02 -0700 | [diff] [blame] | 29 | #include <linux/mutex.h> | 
| Al Viro | 914e263 | 2006-10-18 13:55:46 -0400 | [diff] [blame] | 30 | #include <linux/sched.h> | 
| Al Viro | bbc5b21 | 2005-11-01 15:14:05 +0000 | [diff] [blame] | 31 | #include <linux/platform_device.h> | 
| Andrew Morton | 276ad0c | 2006-03-25 03:07:35 -0800 | [diff] [blame] | 32 | #include <linux/io.h> | 
| Rajiv Andrade | 659aaf2 | 2009-02-02 15:23:44 -0200 | [diff] [blame] | 33 | #include <linux/tpm.h> | 
| Jarkko Sakkinen | 0dc5536 | 2014-12-12 11:46:35 -0800 | [diff] [blame] | 34 | #include <linux/acpi.h> | 
| Jarkko Sakkinen | 313d21e | 2014-12-12 11:46:37 -0800 | [diff] [blame] | 35 | #include <linux/cdev.h> | 
| Jarkko Sakkinen | a74f8b3 | 2015-10-11 12:26:58 +0300 | [diff] [blame] | 36 | #include <linux/highmem.h> | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 37 |  | 
| Kent Yoder | 41ab999 | 2012-06-07 13:47:14 -0500 | [diff] [blame] | 38 | enum tpm_const { | 
|  | 39 | TPM_MINOR = 224,	/* officially assigned */ | 
|  | 40 | TPM_BUFSIZE = 4096, | 
| Stefan Berger | 1551678 | 2016-02-29 08:53:02 -0500 | [diff] [blame] | 41 | TPM_NUM_DEVICES = 65536, | 
| Duncan Laurie | 32d33b2 | 2013-03-17 14:56:39 -0700 | [diff] [blame] | 42 | TPM_RETRY = 50,		/* 5 seconds */ | 
| Kent Yoder | 41ab999 | 2012-06-07 13:47:14 -0500 | [diff] [blame] | 43 | }; | 
|  | 44 |  | 
| Kylene Hall | 3122a88 | 2005-06-23 22:01:48 -0700 | [diff] [blame] | 45 | enum tpm_timeout { | 
|  | 46 | TPM_TIMEOUT = 5,	/* msecs */ | 
| Duncan Laurie | 32d33b2 | 2013-03-17 14:56:39 -0700 | [diff] [blame] | 47 | TPM_TIMEOUT_RETRY = 100 /* msecs */ | 
| Kylene Hall | 3122a88 | 2005-06-23 22:01:48 -0700 | [diff] [blame] | 48 | }; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 49 |  | 
|  | 50 | /* TPM addresses */ | 
| Kylene Hall | 3122a88 | 2005-06-23 22:01:48 -0700 | [diff] [blame] | 51 | enum tpm_addr { | 
| Kylene Jo Hall | daacdfa | 2005-06-25 14:55:39 -0700 | [diff] [blame] | 52 | TPM_SUPERIO_ADDR = 0x2E, | 
| Kylene Hall | 3122a88 | 2005-06-23 22:01:48 -0700 | [diff] [blame] | 53 | TPM_ADDR = 0x4E, | 
| Kylene Hall | 3122a88 | 2005-06-23 22:01:48 -0700 | [diff] [blame] | 54 | }; | 
|  | 55 |  | 
| Jason Gunthorpe | 000a07b | 2013-11-26 13:30:41 -0700 | [diff] [blame] | 56 | /* Indexes the duration array */ | 
|  | 57 | enum tpm_duration { | 
|  | 58 | TPM_SHORT = 0, | 
|  | 59 | TPM_MEDIUM = 1, | 
|  | 60 | TPM_LONG = 2, | 
|  | 61 | TPM_UNDEFINED, | 
|  | 62 | }; | 
|  | 63 |  | 
| Duncan Laurie | 32d33b2 | 2013-03-17 14:56:39 -0700 | [diff] [blame] | 64 | #define TPM_WARN_RETRY          0x800 | 
| Stefan Berger | 68d6e67 | 2011-11-11 12:57:04 -0500 | [diff] [blame] | 65 | #define TPM_WARN_DOING_SELFTEST 0x802 | 
| Stefan Berger | be40541 | 2012-01-17 22:07:30 -0500 | [diff] [blame] | 66 | #define TPM_ERR_DEACTIVATED     0x6 | 
|  | 67 | #define TPM_ERR_DISABLED        0x7 | 
| Jason Gunthorpe | c584af1 | 2012-11-21 13:54:33 -0700 | [diff] [blame] | 68 | #define TPM_ERR_INVALID_POSTINIT 38 | 
| Stefan Berger | be40541 | 2012-01-17 22:07:30 -0500 | [diff] [blame] | 69 |  | 
| Rajiv Andrade | b9e3238 | 2011-11-01 17:00:52 -0200 | [diff] [blame] | 70 | #define TPM_HEADER_SIZE		10 | 
| Jarkko Sakkinen | 7a1d7e6 | 2014-12-12 11:46:38 -0800 | [diff] [blame] | 71 |  | 
|  | 72 | enum tpm2_const { | 
|  | 73 | TPM2_PLATFORM_PCR	= 24, | 
|  | 74 | TPM2_PCR_SELECT_MIN	= ((TPM2_PLATFORM_PCR + 7) / 8), | 
|  | 75 | TPM2_TIMEOUT_A		= 750, | 
|  | 76 | TPM2_TIMEOUT_B		= 2000, | 
|  | 77 | TPM2_TIMEOUT_C		= 200, | 
|  | 78 | TPM2_TIMEOUT_D		= 30, | 
|  | 79 | TPM2_DURATION_SHORT	= 20, | 
|  | 80 | TPM2_DURATION_MEDIUM	= 750, | 
|  | 81 | TPM2_DURATION_LONG	= 2000, | 
|  | 82 | }; | 
|  | 83 |  | 
|  | 84 | enum tpm2_structures { | 
|  | 85 | TPM2_ST_NO_SESSIONS	= 0x8001, | 
|  | 86 | TPM2_ST_SESSIONS	= 0x8002, | 
|  | 87 | }; | 
|  | 88 |  | 
|  | 89 | enum tpm2_return_codes { | 
| Jarkko Sakkinen | 5ca4c20 | 2015-11-05 21:43:06 +0200 | [diff] [blame] | 90 | TPM2_RC_HASH		= 0x0083, /* RC_FMT1 */ | 
|  | 91 | TPM2_RC_INITIALIZE	= 0x0100, /* RC_VER1 */ | 
| Jarkko Sakkinen | 7a1d7e6 | 2014-12-12 11:46:38 -0800 | [diff] [blame] | 92 | TPM2_RC_DISABLED	= 0x0120, | 
| Jarkko Sakkinen | 5ca4c20 | 2015-11-05 21:43:06 +0200 | [diff] [blame] | 93 | TPM2_RC_TESTING		= 0x090A, /* RC_WARN */ | 
| Jarkko Sakkinen | 7a1d7e6 | 2014-12-12 11:46:38 -0800 | [diff] [blame] | 94 | }; | 
|  | 95 |  | 
|  | 96 | enum tpm2_algorithms { | 
|  | 97 | TPM2_ALG_SHA1		= 0x0004, | 
| Jarkko Sakkinen | 954650e | 2015-05-30 08:09:04 +0300 | [diff] [blame] | 98 | TPM2_ALG_KEYEDHASH	= 0x0008, | 
|  | 99 | TPM2_ALG_SHA256		= 0x000B, | 
| Jarkko Sakkinen | 5ca4c20 | 2015-11-05 21:43:06 +0200 | [diff] [blame] | 100 | TPM2_ALG_SHA384		= 0x000C, | 
|  | 101 | TPM2_ALG_SHA512		= 0x000D, | 
|  | 102 | TPM2_ALG_NULL		= 0x0010, | 
|  | 103 | TPM2_ALG_SM3_256	= 0x0012, | 
| Jarkko Sakkinen | 7a1d7e6 | 2014-12-12 11:46:38 -0800 | [diff] [blame] | 104 | }; | 
|  | 105 |  | 
|  | 106 | enum tpm2_command_codes { | 
|  | 107 | TPM2_CC_FIRST		= 0x011F, | 
|  | 108 | TPM2_CC_SELF_TEST	= 0x0143, | 
|  | 109 | TPM2_CC_STARTUP		= 0x0144, | 
|  | 110 | TPM2_CC_SHUTDOWN	= 0x0145, | 
| Jarkko Sakkinen | 954650e | 2015-05-30 08:09:04 +0300 | [diff] [blame] | 111 | TPM2_CC_CREATE		= 0x0153, | 
|  | 112 | TPM2_CC_LOAD		= 0x0157, | 
|  | 113 | TPM2_CC_UNSEAL		= 0x015E, | 
|  | 114 | TPM2_CC_FLUSH_CONTEXT	= 0x0165, | 
| Jarkko Sakkinen | 7a1d7e6 | 2014-12-12 11:46:38 -0800 | [diff] [blame] | 115 | TPM2_CC_GET_CAPABILITY	= 0x017A, | 
|  | 116 | TPM2_CC_GET_RANDOM	= 0x017B, | 
|  | 117 | TPM2_CC_PCR_READ	= 0x017E, | 
|  | 118 | TPM2_CC_PCR_EXTEND	= 0x0182, | 
|  | 119 | TPM2_CC_LAST		= 0x018F, | 
|  | 120 | }; | 
|  | 121 |  | 
|  | 122 | enum tpm2_permanent_handles { | 
|  | 123 | TPM2_RS_PW		= 0x40000009, | 
|  | 124 | }; | 
|  | 125 |  | 
|  | 126 | enum tpm2_capabilities { | 
|  | 127 | TPM2_CAP_TPM_PROPERTIES = 6, | 
|  | 128 | }; | 
|  | 129 |  | 
|  | 130 | enum tpm2_startup_types { | 
|  | 131 | TPM2_SU_CLEAR	= 0x0000, | 
|  | 132 | TPM2_SU_STATE	= 0x0001, | 
|  | 133 | }; | 
|  | 134 |  | 
| Stefan Berger | 4e401fb | 2012-01-20 12:58:49 -0500 | [diff] [blame] | 135 | #define TPM_VID_INTEL    0x8086 | 
| Stefan Berger | 1f86605 | 2013-01-22 13:52:35 -0600 | [diff] [blame] | 136 | #define TPM_VID_WINBOND  0x1050 | 
|  | 137 | #define TPM_VID_STM      0x104A | 
| Stefan Berger | 4e401fb | 2012-01-20 12:58:49 -0500 | [diff] [blame] | 138 |  | 
| Jarkko Sakkinen | 0dc5536 | 2014-12-12 11:46:35 -0800 | [diff] [blame] | 139 | #define TPM_PPI_VERSION_LEN		3 | 
|  | 140 |  | 
| Jarkko Sakkinen | afb5abc | 2014-12-12 11:46:34 -0800 | [diff] [blame] | 141 | enum tpm_chip_flags { | 
|  | 142 | TPM_CHIP_FLAG_REGISTERED	= BIT(0), | 
| Jarkko Sakkinen | 9b774d5 | 2015-04-14 17:56:48 +0300 | [diff] [blame] | 143 | TPM_CHIP_FLAG_TPM2		= BIT(1), | 
| Christophe Ricard | 570a360 | 2016-03-31 22:56:56 +0200 | [diff] [blame] | 144 | TPM_CHIP_FLAG_IRQ		= BIT(2), | 
| Stefan Berger | 2f9f537 | 2016-04-18 13:26:14 -0400 | [diff] [blame] | 145 | TPM_CHIP_FLAG_VIRTUAL		= BIT(3), | 
| Enric Balletbo i Serra | d6313fe | 2017-06-27 12:27:24 +0200 | [diff] [blame] | 146 | TPM_CHIP_FLAG_ALWAYS_POWERED	= BIT(5), | 
| Jarkko Sakkinen | afb5abc | 2014-12-12 11:46:34 -0800 | [diff] [blame] | 147 | }; | 
|  | 148 |  | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 149 | struct tpm_chip { | 
| Jarkko Sakkinen | 313d21e | 2014-12-12 11:46:37 -0800 | [diff] [blame] | 150 | struct device dev; | 
|  | 151 | struct cdev cdev; | 
|  | 152 |  | 
| Jason Gunthorpe | 4e26195 | 2016-02-12 20:29:53 -0700 | [diff] [blame] | 153 | /* A driver callback under ops cannot be run unless ops_sem is held | 
|  | 154 | * (sometimes implicitly, eg for the sysfs code). ops becomes null | 
|  | 155 | * when the driver is unregistered, see tpm_try_get_ops. | 
|  | 156 | */ | 
|  | 157 | struct rw_semaphore ops_sem; | 
| Jason Gunthorpe | 5f82e9f | 2013-11-26 13:30:44 -0700 | [diff] [blame] | 158 | const struct tpm_class_ops *ops; | 
| Jason Gunthorpe | 4e26195 | 2016-02-12 20:29:53 -0700 | [diff] [blame] | 159 |  | 
| Jarkko Sakkinen | afb5abc | 2014-12-12 11:46:34 -0800 | [diff] [blame] | 160 | unsigned int flags; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 161 |  | 
|  | 162 | int dev_num;		/* /dev/tpm# */ | 
| Rajiv Andrade | dc36d32 | 2008-10-11 09:04:02 +1100 | [diff] [blame] | 163 | unsigned long is_open;	/* only one allowed */ | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 164 |  | 
| Matthias Kaehlcke | d081d47 | 2007-05-08 00:32:02 -0700 | [diff] [blame] | 165 | struct mutex tpm_mutex;	/* tpm is processing */ | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 166 |  | 
| Christophe Ricard | af782f3 | 2016-03-31 22:56:59 +0200 | [diff] [blame] | 167 | unsigned long timeout_a; /* jiffies */ | 
|  | 168 | unsigned long timeout_b; /* jiffies */ | 
|  | 169 | unsigned long timeout_c; /* jiffies */ | 
|  | 170 | unsigned long timeout_d; /* jiffies */ | 
|  | 171 | bool timeout_adjusted; | 
|  | 172 | unsigned long duration[3]; /* jiffies */ | 
|  | 173 | bool duration_adjusted; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 174 |  | 
| Kylene Jo Hall | 55a82ab | 2006-01-08 01:03:15 -0800 | [diff] [blame] | 175 | struct dentry **bios_dir; | 
|  | 176 |  | 
| Jason Gunthorpe | 062807f | 2016-04-18 13:26:13 -0400 | [diff] [blame] | 177 | const struct attribute_group *groups[3]; | 
| Jarkko Sakkinen | 9b774d5 | 2015-04-14 17:56:48 +0300 | [diff] [blame] | 178 | unsigned int groups_cnt; | 
| Jason Gunthorpe | 062807f | 2016-04-18 13:26:13 -0400 | [diff] [blame] | 179 | #ifdef CONFIG_ACPI | 
| Jarkko Sakkinen | 0dc5536 | 2014-12-12 11:46:35 -0800 | [diff] [blame] | 180 | acpi_handle acpi_dev_handle; | 
|  | 181 | char ppi_version[TPM_PPI_VERSION_LEN + 1]; | 
|  | 182 | #endif /* CONFIG_ACPI */ | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 183 | }; | 
|  | 184 |  | 
| Jarkko Sakkinen | 9b774d5 | 2015-04-14 17:56:48 +0300 | [diff] [blame] | 185 | #define to_tpm_chip(d) container_of(d, struct tpm_chip, dev) | 
| Leendert van Doorn | 27084ef | 2006-04-22 02:38:03 -0700 | [diff] [blame] | 186 |  | 
| Kylene Jo Hall | daacdfa | 2005-06-25 14:55:39 -0700 | [diff] [blame] | 187 | static inline int tpm_read_index(int base, int index) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 188 | { | 
| Kylene Jo Hall | daacdfa | 2005-06-25 14:55:39 -0700 | [diff] [blame] | 189 | outb(index, base); | 
|  | 190 | return inb(base+1) & 0xFF; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 191 | } | 
|  | 192 |  | 
| Kylene Jo Hall | daacdfa | 2005-06-25 14:55:39 -0700 | [diff] [blame] | 193 | static inline void tpm_write_index(int base, int index, int value) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 194 | { | 
| Kylene Jo Hall | daacdfa | 2005-06-25 14:55:39 -0700 | [diff] [blame] | 195 | outb(index, base); | 
|  | 196 | outb(value & 0xFF, base+1); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 197 | } | 
| Rajiv Andrade | 0883743 | 2009-02-02 15:23:43 -0200 | [diff] [blame] | 198 | struct tpm_input_header { | 
|  | 199 | __be16	tag; | 
|  | 200 | __be32	length; | 
|  | 201 | __be32	ordinal; | 
| Jason Gunthorpe | 348df8d | 2012-11-21 13:56:45 -0700 | [diff] [blame] | 202 | } __packed; | 
| Rajiv Andrade | 0883743 | 2009-02-02 15:23:43 -0200 | [diff] [blame] | 203 |  | 
|  | 204 | struct tpm_output_header { | 
|  | 205 | __be16	tag; | 
|  | 206 | __be32	length; | 
|  | 207 | __be32	return_code; | 
| Jason Gunthorpe | 348df8d | 2012-11-21 13:56:45 -0700 | [diff] [blame] | 208 | } __packed; | 
| Rajiv Andrade | 0883743 | 2009-02-02 15:23:43 -0200 | [diff] [blame] | 209 |  | 
| Jason Gunthorpe | 000a07b | 2013-11-26 13:30:41 -0700 | [diff] [blame] | 210 | #define TPM_TAG_RQU_COMMAND cpu_to_be16(193) | 
|  | 211 |  | 
| Rajiv Andrade | 0883743 | 2009-02-02 15:23:43 -0200 | [diff] [blame] | 212 | struct	stclear_flags_t { | 
|  | 213 | __be16	tag; | 
|  | 214 | u8	deactivated; | 
|  | 215 | u8	disableForceClear; | 
|  | 216 | u8	physicalPresence; | 
|  | 217 | u8	physicalPresenceLock; | 
|  | 218 | u8	bGlobalLock; | 
| Jason Gunthorpe | 348df8d | 2012-11-21 13:56:45 -0700 | [diff] [blame] | 219 | } __packed; | 
| Rajiv Andrade | 0883743 | 2009-02-02 15:23:43 -0200 | [diff] [blame] | 220 |  | 
|  | 221 | struct	tpm_version_t { | 
|  | 222 | u8	Major; | 
|  | 223 | u8	Minor; | 
|  | 224 | u8	revMajor; | 
|  | 225 | u8	revMinor; | 
| Jason Gunthorpe | 348df8d | 2012-11-21 13:56:45 -0700 | [diff] [blame] | 226 | } __packed; | 
| Rajiv Andrade | 0883743 | 2009-02-02 15:23:43 -0200 | [diff] [blame] | 227 |  | 
|  | 228 | struct	tpm_version_1_2_t { | 
|  | 229 | __be16	tag; | 
|  | 230 | u8	Major; | 
|  | 231 | u8	Minor; | 
|  | 232 | u8	revMajor; | 
|  | 233 | u8	revMinor; | 
| Jason Gunthorpe | 348df8d | 2012-11-21 13:56:45 -0700 | [diff] [blame] | 234 | } __packed; | 
| Rajiv Andrade | 0883743 | 2009-02-02 15:23:43 -0200 | [diff] [blame] | 235 |  | 
|  | 236 | struct	timeout_t { | 
|  | 237 | __be32	a; | 
|  | 238 | __be32	b; | 
|  | 239 | __be32	c; | 
|  | 240 | __be32	d; | 
| Jason Gunthorpe | 348df8d | 2012-11-21 13:56:45 -0700 | [diff] [blame] | 241 | } __packed; | 
| Rajiv Andrade | 0883743 | 2009-02-02 15:23:43 -0200 | [diff] [blame] | 242 |  | 
|  | 243 | struct duration_t { | 
|  | 244 | __be32	tpm_short; | 
|  | 245 | __be32	tpm_medium; | 
|  | 246 | __be32	tpm_long; | 
| Jason Gunthorpe | 348df8d | 2012-11-21 13:56:45 -0700 | [diff] [blame] | 247 | } __packed; | 
| Rajiv Andrade | 0883743 | 2009-02-02 15:23:43 -0200 | [diff] [blame] | 248 |  | 
|  | 249 | struct permanent_flags_t { | 
|  | 250 | __be16	tag; | 
|  | 251 | u8	disable; | 
|  | 252 | u8	ownership; | 
|  | 253 | u8	deactivated; | 
|  | 254 | u8	readPubek; | 
|  | 255 | u8	disableOwnerClear; | 
|  | 256 | u8	allowMaintenance; | 
|  | 257 | u8	physicalPresenceLifetimeLock; | 
|  | 258 | u8	physicalPresenceHWEnable; | 
|  | 259 | u8	physicalPresenceCMDEnable; | 
|  | 260 | u8	CEKPUsed; | 
|  | 261 | u8	TPMpost; | 
|  | 262 | u8	TPMpostLock; | 
|  | 263 | u8	FIPS; | 
|  | 264 | u8	operator; | 
|  | 265 | u8	enableRevokeEK; | 
|  | 266 | u8	nvLocked; | 
|  | 267 | u8	readSRKPub; | 
|  | 268 | u8	tpmEstablished; | 
|  | 269 | u8	maintenanceDone; | 
|  | 270 | u8	disableFullDALogicInfo; | 
| Jason Gunthorpe | 348df8d | 2012-11-21 13:56:45 -0700 | [diff] [blame] | 271 | } __packed; | 
| Rajiv Andrade | 0883743 | 2009-02-02 15:23:43 -0200 | [diff] [blame] | 272 |  | 
|  | 273 | typedef union { | 
|  | 274 | struct	permanent_flags_t perm_flags; | 
|  | 275 | struct	stclear_flags_t	stclear_flags; | 
|  | 276 | bool	owned; | 
|  | 277 | __be32	num_pcrs; | 
|  | 278 | struct	tpm_version_t	tpm_version; | 
|  | 279 | struct	tpm_version_1_2_t tpm_version_1_2; | 
|  | 280 | __be32	manufacturer_id; | 
|  | 281 | struct timeout_t  timeout; | 
|  | 282 | struct duration_t duration; | 
|  | 283 | } cap_t; | 
|  | 284 |  | 
| Jason Gunthorpe | 000a07b | 2013-11-26 13:30:41 -0700 | [diff] [blame] | 285 | enum tpm_capabilities { | 
|  | 286 | TPM_CAP_FLAG = cpu_to_be32(4), | 
|  | 287 | TPM_CAP_PROP = cpu_to_be32(5), | 
|  | 288 | CAP_VERSION_1_1 = cpu_to_be32(0x06), | 
|  | 289 | CAP_VERSION_1_2 = cpu_to_be32(0x1A) | 
|  | 290 | }; | 
|  | 291 |  | 
|  | 292 | enum tpm_sub_capabilities { | 
|  | 293 | TPM_CAP_PROP_PCR = cpu_to_be32(0x101), | 
|  | 294 | TPM_CAP_PROP_MANUFACTURER = cpu_to_be32(0x103), | 
|  | 295 | TPM_CAP_FLAG_PERM = cpu_to_be32(0x108), | 
|  | 296 | TPM_CAP_FLAG_VOL = cpu_to_be32(0x109), | 
|  | 297 | TPM_CAP_PROP_OWNER = cpu_to_be32(0x111), | 
|  | 298 | TPM_CAP_PROP_TIS_TIMEOUT = cpu_to_be32(0x115), | 
|  | 299 | TPM_CAP_PROP_TIS_DURATION = cpu_to_be32(0x120), | 
|  | 300 |  | 
|  | 301 | }; | 
|  | 302 |  | 
| Rajiv Andrade | 0883743 | 2009-02-02 15:23:43 -0200 | [diff] [blame] | 303 | struct	tpm_getcap_params_in { | 
|  | 304 | __be32	cap; | 
|  | 305 | __be32	subcap_size; | 
|  | 306 | __be32	subcap; | 
| Jason Gunthorpe | 348df8d | 2012-11-21 13:56:45 -0700 | [diff] [blame] | 307 | } __packed; | 
| Rajiv Andrade | 0883743 | 2009-02-02 15:23:43 -0200 | [diff] [blame] | 308 |  | 
|  | 309 | struct	tpm_getcap_params_out { | 
|  | 310 | __be32	cap_size; | 
|  | 311 | cap_t	cap; | 
| Jason Gunthorpe | 348df8d | 2012-11-21 13:56:45 -0700 | [diff] [blame] | 312 | } __packed; | 
| Rajiv Andrade | 0883743 | 2009-02-02 15:23:43 -0200 | [diff] [blame] | 313 |  | 
|  | 314 | struct	tpm_readpubek_params_out { | 
|  | 315 | u8	algorithm[4]; | 
|  | 316 | u8	encscheme[2]; | 
|  | 317 | u8	sigscheme[2]; | 
| Rajiv Andrade | 02a077c | 2010-06-14 13:58:22 -0300 | [diff] [blame] | 318 | __be32	paramsize; | 
| Rajiv Andrade | 0883743 | 2009-02-02 15:23:43 -0200 | [diff] [blame] | 319 | u8	parameters[12]; /*assuming RSA*/ | 
|  | 320 | __be32	keysize; | 
|  | 321 | u8	modulus[256]; | 
|  | 322 | u8	checksum[20]; | 
| Jason Gunthorpe | 348df8d | 2012-11-21 13:56:45 -0700 | [diff] [blame] | 323 | } __packed; | 
| Rajiv Andrade | 0883743 | 2009-02-02 15:23:43 -0200 | [diff] [blame] | 324 |  | 
|  | 325 | typedef union { | 
|  | 326 | struct	tpm_input_header in; | 
|  | 327 | struct	tpm_output_header out; | 
|  | 328 | } tpm_cmd_header; | 
|  | 329 |  | 
| Rajiv Andrade | 659aaf2 | 2009-02-02 15:23:44 -0200 | [diff] [blame] | 330 | struct tpm_pcrread_out { | 
|  | 331 | u8	pcr_result[TPM_DIGEST_SIZE]; | 
| Jason Gunthorpe | 348df8d | 2012-11-21 13:56:45 -0700 | [diff] [blame] | 332 | } __packed; | 
| Rajiv Andrade | 659aaf2 | 2009-02-02 15:23:44 -0200 | [diff] [blame] | 333 |  | 
|  | 334 | struct tpm_pcrread_in { | 
|  | 335 | __be32	pcr_idx; | 
| Jason Gunthorpe | 348df8d | 2012-11-21 13:56:45 -0700 | [diff] [blame] | 336 | } __packed; | 
| Rajiv Andrade | 659aaf2 | 2009-02-02 15:23:44 -0200 | [diff] [blame] | 337 |  | 
|  | 338 | struct tpm_pcrextend_in { | 
|  | 339 | __be32	pcr_idx; | 
|  | 340 | u8	hash[TPM_DIGEST_SIZE]; | 
| Jason Gunthorpe | 348df8d | 2012-11-21 13:56:45 -0700 | [diff] [blame] | 341 | } __packed; | 
| Rajiv Andrade | 659aaf2 | 2009-02-02 15:23:44 -0200 | [diff] [blame] | 342 |  | 
| Kent Yoder | 41ab999 | 2012-06-07 13:47:14 -0500 | [diff] [blame] | 343 | /* 128 bytes is an arbitrary cap. This could be as large as TPM_BUFSIZE - 18 | 
|  | 344 | * bytes, but 128 is still a relatively large number of random bytes and | 
|  | 345 | * anything much bigger causes users of struct tpm_cmd_t to start getting | 
|  | 346 | * compiler warnings about stack frame size. */ | 
|  | 347 | #define TPM_MAX_RNG_DATA	128 | 
|  | 348 |  | 
|  | 349 | struct tpm_getrandom_out { | 
|  | 350 | __be32 rng_data_len; | 
|  | 351 | u8     rng_data[TPM_MAX_RNG_DATA]; | 
| Jason Gunthorpe | 348df8d | 2012-11-21 13:56:45 -0700 | [diff] [blame] | 352 | } __packed; | 
| Kent Yoder | 41ab999 | 2012-06-07 13:47:14 -0500 | [diff] [blame] | 353 |  | 
|  | 354 | struct tpm_getrandom_in { | 
|  | 355 | __be32 num_bytes; | 
| Jason Gunthorpe | 348df8d | 2012-11-21 13:56:45 -0700 | [diff] [blame] | 356 | } __packed; | 
| Kent Yoder | 41ab999 | 2012-06-07 13:47:14 -0500 | [diff] [blame] | 357 |  | 
| Jason Gunthorpe | c584af1 | 2012-11-21 13:54:33 -0700 | [diff] [blame] | 358 | struct tpm_startup_in { | 
|  | 359 | __be16	startup_type; | 
|  | 360 | } __packed; | 
|  | 361 |  | 
| Rajiv Andrade | 0883743 | 2009-02-02 15:23:43 -0200 | [diff] [blame] | 362 | typedef union { | 
|  | 363 | struct	tpm_getcap_params_out getcap_out; | 
|  | 364 | struct	tpm_readpubek_params_out readpubek_out; | 
|  | 365 | u8	readpubek_out_buffer[sizeof(struct tpm_readpubek_params_out)]; | 
|  | 366 | struct	tpm_getcap_params_in getcap_in; | 
| Rajiv Andrade | 659aaf2 | 2009-02-02 15:23:44 -0200 | [diff] [blame] | 367 | struct	tpm_pcrread_in	pcrread_in; | 
|  | 368 | struct	tpm_pcrread_out	pcrread_out; | 
|  | 369 | struct	tpm_pcrextend_in pcrextend_in; | 
| Kent Yoder | 41ab999 | 2012-06-07 13:47:14 -0500 | [diff] [blame] | 370 | struct	tpm_getrandom_in getrandom_in; | 
|  | 371 | struct	tpm_getrandom_out getrandom_out; | 
| Jason Gunthorpe | c584af1 | 2012-11-21 13:54:33 -0700 | [diff] [blame] | 372 | struct tpm_startup_in startup_in; | 
| Rajiv Andrade | 0883743 | 2009-02-02 15:23:43 -0200 | [diff] [blame] | 373 | } tpm_cmd_params; | 
|  | 374 |  | 
|  | 375 | struct tpm_cmd_t { | 
|  | 376 | tpm_cmd_header	header; | 
|  | 377 | tpm_cmd_params	params; | 
| Jason Gunthorpe | 348df8d | 2012-11-21 13:56:45 -0700 | [diff] [blame] | 378 | } __packed; | 
| Rajiv Andrade | 0883743 | 2009-02-02 15:23:43 -0200 | [diff] [blame] | 379 |  | 
| Jarkko Sakkinen | a74f8b3 | 2015-10-11 12:26:58 +0300 | [diff] [blame] | 380 | /* A string buffer type for constructing TPM commands. This is based on the | 
|  | 381 | * ideas of string buffer code in security/keys/trusted.h but is heap based | 
|  | 382 | * in order to keep the stack usage minimal. | 
|  | 383 | */ | 
|  | 384 |  | 
|  | 385 | enum tpm_buf_flags { | 
|  | 386 | TPM_BUF_OVERFLOW	= BIT(0), | 
|  | 387 | }; | 
|  | 388 |  | 
|  | 389 | struct tpm_buf { | 
|  | 390 | struct page *data_page; | 
|  | 391 | unsigned int flags; | 
|  | 392 | u8 *data; | 
|  | 393 | }; | 
|  | 394 |  | 
| Jarkko Sakkinen | 954650e | 2015-05-30 08:09:04 +0300 | [diff] [blame] | 395 | static inline int tpm_buf_init(struct tpm_buf *buf, u16 tag, u32 ordinal) | 
| Jarkko Sakkinen | a74f8b3 | 2015-10-11 12:26:58 +0300 | [diff] [blame] | 396 | { | 
|  | 397 | struct tpm_input_header *head; | 
|  | 398 |  | 
|  | 399 | buf->data_page = alloc_page(GFP_HIGHUSER); | 
|  | 400 | if (!buf->data_page) | 
|  | 401 | return -ENOMEM; | 
|  | 402 |  | 
|  | 403 | buf->flags = 0; | 
|  | 404 | buf->data = kmap(buf->data_page); | 
|  | 405 |  | 
|  | 406 | head = (struct tpm_input_header *) buf->data; | 
|  | 407 |  | 
|  | 408 | head->tag = cpu_to_be16(tag); | 
|  | 409 | head->length = cpu_to_be32(sizeof(*head)); | 
|  | 410 | head->ordinal = cpu_to_be32(ordinal); | 
|  | 411 |  | 
|  | 412 | return 0; | 
|  | 413 | } | 
|  | 414 |  | 
|  | 415 | static inline void tpm_buf_destroy(struct tpm_buf *buf) | 
|  | 416 | { | 
|  | 417 | kunmap(buf->data_page); | 
|  | 418 | __free_page(buf->data_page); | 
|  | 419 | } | 
|  | 420 |  | 
|  | 421 | static inline u32 tpm_buf_length(struct tpm_buf *buf) | 
|  | 422 | { | 
|  | 423 | struct tpm_input_header *head = (struct tpm_input_header *) buf->data; | 
|  | 424 |  | 
|  | 425 | return be32_to_cpu(head->length); | 
|  | 426 | } | 
|  | 427 |  | 
|  | 428 | static inline u16 tpm_buf_tag(struct tpm_buf *buf) | 
|  | 429 | { | 
|  | 430 | struct tpm_input_header *head = (struct tpm_input_header *) buf->data; | 
|  | 431 |  | 
|  | 432 | return be16_to_cpu(head->tag); | 
|  | 433 | } | 
|  | 434 |  | 
|  | 435 | static inline void tpm_buf_append(struct tpm_buf *buf, | 
|  | 436 | const unsigned char *new_data, | 
|  | 437 | unsigned int new_len) | 
|  | 438 | { | 
|  | 439 | struct tpm_input_header *head = (struct tpm_input_header *) buf->data; | 
|  | 440 | u32 len = tpm_buf_length(buf); | 
|  | 441 |  | 
|  | 442 | /* Return silently if overflow has already happened. */ | 
|  | 443 | if (buf->flags & TPM_BUF_OVERFLOW) | 
|  | 444 | return; | 
|  | 445 |  | 
|  | 446 | if ((len + new_len) > PAGE_SIZE) { | 
|  | 447 | WARN(1, "tpm_buf: overflow\n"); | 
|  | 448 | buf->flags |= TPM_BUF_OVERFLOW; | 
|  | 449 | return; | 
|  | 450 | } | 
|  | 451 |  | 
|  | 452 | memcpy(&buf->data[len], new_data, new_len); | 
|  | 453 | head->length = cpu_to_be32(len + new_len); | 
|  | 454 | } | 
|  | 455 |  | 
|  | 456 | static inline void tpm_buf_append_u8(struct tpm_buf *buf, const u8 value) | 
|  | 457 | { | 
|  | 458 | tpm_buf_append(buf, &value, 1); | 
|  | 459 | } | 
|  | 460 |  | 
|  | 461 | static inline void tpm_buf_append_u16(struct tpm_buf *buf, const u16 value) | 
|  | 462 | { | 
|  | 463 | __be16 value2 = cpu_to_be16(value); | 
|  | 464 |  | 
|  | 465 | tpm_buf_append(buf, (u8 *) &value2, 2); | 
|  | 466 | } | 
|  | 467 |  | 
|  | 468 | static inline void tpm_buf_append_u32(struct tpm_buf *buf, const u32 value) | 
|  | 469 | { | 
|  | 470 | __be32 value2 = cpu_to_be32(value); | 
|  | 471 |  | 
|  | 472 | tpm_buf_append(buf, (u8 *) &value2, 4); | 
|  | 473 | } | 
|  | 474 |  | 
| Jarkko Sakkinen | 313d21e | 2014-12-12 11:46:37 -0800 | [diff] [blame] | 475 | extern struct class *tpm_class; | 
|  | 476 | extern dev_t tpm_devt; | 
|  | 477 | extern const struct file_operations tpm_fops; | 
| Stefan Berger | 1551678 | 2016-02-29 08:53:02 -0500 | [diff] [blame] | 478 | extern struct idr dev_nums_idr; | 
| Jarkko Sakkinen | 313d21e | 2014-12-12 11:46:37 -0800 | [diff] [blame] | 479 |  | 
| Jarkko Sakkinen | d4816ed | 2016-08-16 22:00:38 +0300 | [diff] [blame] | 480 | enum tpm_transmit_flags { | 
|  | 481 | TPM_TRANSMIT_UNLOCKED	= BIT(0), | 
|  | 482 | }; | 
|  | 483 |  | 
|  | 484 | ssize_t tpm_transmit(struct tpm_chip *chip, const u8 *buf, size_t bufsiz, | 
|  | 485 | unsigned int flags); | 
|  | 486 | ssize_t tpm_transmit_cmd(struct tpm_chip *chip, const void *cmd, int len, | 
|  | 487 | unsigned int flags, const char *desc); | 
| Jason Gunthorpe | 062807f | 2016-04-18 13:26:13 -0400 | [diff] [blame] | 488 | ssize_t tpm_getcap(struct tpm_chip *chip, __be32 subcap_id, cap_t *cap, | 
|  | 489 | const char *desc); | 
| Jarkko Sakkinen | d4abd95 | 2016-06-25 23:33:09 +0300 | [diff] [blame] | 490 | int tpm_get_timeouts(struct tpm_chip *); | 
| Jason Gunthorpe | cae8b44 | 2016-07-12 11:41:49 -0600 | [diff] [blame] | 491 | int tpm1_auto_startup(struct tpm_chip *chip); | 
| Jarkko Sakkinen | d4abd95 | 2016-06-25 23:33:09 +0300 | [diff] [blame] | 492 | int tpm_do_selftest(struct tpm_chip *chip); | 
|  | 493 | unsigned long tpm_calc_ordinal_duration(struct tpm_chip *chip, u32 ordinal); | 
|  | 494 | int tpm_pm_suspend(struct device *dev); | 
|  | 495 | int tpm_pm_resume(struct device *dev); | 
|  | 496 | int wait_for_tpm_stat(struct tpm_chip *chip, u8 mask, unsigned long timeout, | 
|  | 497 | wait_queue_head_t *queue, bool check_cancel); | 
| Xiaoyan Zhang | f84fdff | 2012-08-22 18:47:22 +0800 | [diff] [blame] | 498 |  | 
| Jarkko Sakkinen | afb5abc | 2014-12-12 11:46:34 -0800 | [diff] [blame] | 499 | struct tpm_chip *tpm_chip_find_get(int chip_num); | 
| Jason Gunthorpe | 4e26195 | 2016-02-12 20:29:53 -0700 | [diff] [blame] | 500 | __must_check int tpm_try_get_ops(struct tpm_chip *chip); | 
|  | 501 | void tpm_put_ops(struct tpm_chip *chip); | 
|  | 502 |  | 
| Jarkko Sakkinen | d4abd95 | 2016-06-25 23:33:09 +0300 | [diff] [blame] | 503 | struct tpm_chip *tpm_chip_alloc(struct device *dev, | 
|  | 504 | const struct tpm_class_ops *ops); | 
|  | 505 | struct tpm_chip *tpmm_chip_alloc(struct device *pdev, | 
|  | 506 | const struct tpm_class_ops *ops); | 
|  | 507 | int tpm_chip_register(struct tpm_chip *chip); | 
|  | 508 | void tpm_chip_unregister(struct tpm_chip *chip); | 
| Jarkko Sakkinen | afb5abc | 2014-12-12 11:46:34 -0800 | [diff] [blame] | 509 |  | 
| Jason Gunthorpe | 062807f | 2016-04-18 13:26:13 -0400 | [diff] [blame] | 510 | void tpm_sysfs_add_device(struct tpm_chip *chip); | 
| Jason Gunthorpe | afdba32 | 2013-11-26 13:30:40 -0700 | [diff] [blame] | 511 |  | 
| Jason Gunthorpe | 000a07b | 2013-11-26 13:30:41 -0700 | [diff] [blame] | 512 | int tpm_pcr_read_dev(struct tpm_chip *chip, int pcr_idx, u8 *res_buf); | 
|  | 513 |  | 
| Xiaoyan Zhang | f84fdff | 2012-08-22 18:47:22 +0800 | [diff] [blame] | 514 | #ifdef CONFIG_ACPI | 
| Jarkko Sakkinen | 9b774d5 | 2015-04-14 17:56:48 +0300 | [diff] [blame] | 515 | extern void tpm_add_ppi(struct tpm_chip *chip); | 
| Xiaoyan Zhang | f84fdff | 2012-08-22 18:47:22 +0800 | [diff] [blame] | 516 | #else | 
| Jarkko Sakkinen | 9b774d5 | 2015-04-14 17:56:48 +0300 | [diff] [blame] | 517 | static inline void tpm_add_ppi(struct tpm_chip *chip) | 
| Gang Wei | 1631cfb | 2012-10-09 17:35:22 +0800 | [diff] [blame] | 518 | { | 
|  | 519 | } | 
| Xiaoyan Zhang | f84fdff | 2012-08-22 18:47:22 +0800 | [diff] [blame] | 520 | #endif | 
| Jarkko Sakkinen | 7a1d7e6 | 2014-12-12 11:46:38 -0800 | [diff] [blame] | 521 |  | 
| Jarkko Sakkinen | 326f9b0 | 2017-01-25 23:00:22 +0200 | [diff] [blame] | 522 | static inline inline u32 tpm2_rc_value(u32 rc) | 
|  | 523 | { | 
|  | 524 | return (rc & BIT(7)) ? rc & 0xff : rc; | 
|  | 525 | } | 
|  | 526 |  | 
| Jarkko Sakkinen | 7a1d7e6 | 2014-12-12 11:46:38 -0800 | [diff] [blame] | 527 | int tpm2_pcr_read(struct tpm_chip *chip, int pcr_idx, u8 *res_buf); | 
|  | 528 | int tpm2_pcr_extend(struct tpm_chip *chip, int pcr_idx, const u8 *hash); | 
|  | 529 | int tpm2_get_random(struct tpm_chip *chip, u8 *out, size_t max); | 
| Jarkko Sakkinen | 954650e | 2015-05-30 08:09:04 +0300 | [diff] [blame] | 530 | int tpm2_seal_trusted(struct tpm_chip *chip, | 
|  | 531 | struct trusted_key_payload *payload, | 
|  | 532 | struct trusted_key_options *options); | 
|  | 533 | int tpm2_unseal_trusted(struct tpm_chip *chip, | 
|  | 534 | struct trusted_key_payload *payload, | 
|  | 535 | struct trusted_key_options *options); | 
| Jarkko Sakkinen | 7a1d7e6 | 2014-12-12 11:46:38 -0800 | [diff] [blame] | 536 | ssize_t tpm2_get_tpm_pt(struct tpm_chip *chip, u32 property_id, | 
|  | 537 | u32 *value, const char *desc); | 
|  | 538 |  | 
| Jason Gunthorpe | cae8b44 | 2016-07-12 11:41:49 -0600 | [diff] [blame] | 539 | int tpm2_auto_startup(struct tpm_chip *chip); | 
| Jarkko Sakkinen | d4abd95 | 2016-06-25 23:33:09 +0300 | [diff] [blame] | 540 | void tpm2_shutdown(struct tpm_chip *chip, u16 shutdown_type); | 
|  | 541 | unsigned long tpm2_calc_ordinal_duration(struct tpm_chip *chip, u32 ordinal); | 
| Jarkko Sakkinen | d4abd95 | 2016-06-25 23:33:09 +0300 | [diff] [blame] | 542 | int tpm2_probe(struct tpm_chip *chip); | 
| Christophe Ricard | d2efee6 | 2016-05-04 21:06:22 +0200 | [diff] [blame] | 543 | #endif |