diff options
Diffstat (limited to 'drivers')
-rw-r--r-- | drivers/misc/Makefile | 1 | ||||
-rw-r--r-- | drivers/tpm/Makefile | 42 | ||||
-rw-r--r-- | drivers/tpm/slb9635_i2c.c | 71 | ||||
-rw-r--r-- | drivers/tpm/slb9635_i2c/compatibility.h | 52 | ||||
-rw-r--r-- | drivers/tpm/slb9635_i2c/ifx_auto.h | 21 | ||||
-rw-r--r-- | drivers/tpm/slb9635_i2c/ifx_v03.c | 15 | ||||
-rw-r--r-- | drivers/tpm/slb9635_i2c/ifx_v05.c | 46 | ||||
-rw-r--r-- | drivers/tpm/slb9635_i2c/tddl.c | 100 | ||||
-rw-r--r-- | drivers/tpm/slb9635_i2c/tddl.h | 31 | ||||
-rw-r--r-- | drivers/tpm/slb9635_i2c/tpm.c | 469 | ||||
-rw-r--r-- | drivers/tpm/slb9635_i2c/tpm.h | 159 | ||||
-rw-r--r-- | drivers/tpm/slb9635_i2c/tpm_proto.c | 427 | ||||
-rw-r--r-- | drivers/tpm/slb9635_i2c/tpm_tis_i2c.c | 568 |
13 files changed, 2002 insertions, 0 deletions
diff --git a/drivers/misc/Makefile b/drivers/misc/Makefile index b152486116e..37382894ad8 100644 --- a/drivers/misc/Makefile +++ b/drivers/misc/Makefile @@ -35,6 +35,7 @@ COBJS-$(CONFIG_NS87308) += ns87308.o COBJS-$(CONFIG_PDSP188x) += pdsp188x.o COBJS-$(CONFIG_STATUS_LED) += status_led.o COBJS-$(CONFIG_TWL4030_LED) += twl4030_led.o +COBJS-$(CONFIG_FSL_PMIC) += fsl_pmic.o COBJS := $(COBJS-y) SRCS := $(COBJS:.o=.c) diff --git a/drivers/tpm/Makefile b/drivers/tpm/Makefile new file mode 100644 index 00000000000..d53c7911ab6 --- /dev/null +++ b/drivers/tpm/Makefile @@ -0,0 +1,42 @@ +# Copyright (c) 2011 The Chromium OS Authors. All rights reserved. +# Use of this source code is governed by a BSD-style license that can be +# found in the LICENSE file. +# + +include $(TOPDIR)/config.mk + +LIB := $(obj)libtpm.a + +IFXDIR = slb9635_i2c + +$(shell mkdir -p $(obj)$(IFXDIR)) + +COBJS-$(CONFIG_INFINEON_TPM_I2C) = slb9635_i2c.o \ + $(IFXDIR)/tpm_proto.o \ + $(IFXDIR)/tpm.o \ + $(IFXDIR)/tpm_tis_i2c.o \ + $(IFXDIR)/tddl.o \ + $(IFXDIR)/ifx_v05.o \ + $(IFXDIR)/ifx_v03.o + +COBJS := $(COBJS-y) +SRCS := $(COBJS:.o=.c) +OBJS := $(addprefix $(obj),$(COBJS)) + +# EXTRA_CFLAGS += -I. -I$(TOPDIR)/include +# CFLAGS += $(EXTRA_CFLAGS) +# HOSTCFLAGS += $(EXTRA_CFLAGS) +# CPPFLAGS += $(EXTRA_CFLAGS) + +all: $(LIB) + +$(LIB): $(obj).depend $(OBJS) + $(AR) $(ARFLAGS) $@ $(OBJS) + +######################################################################### + +include $(SRCTREE)/rules.mk + +sinclude $(obj).depend + +######################################################################### diff --git a/drivers/tpm/slb9635_i2c.c b/drivers/tpm/slb9635_i2c.c new file mode 100644 index 00000000000..41382a11740 --- /dev/null +++ b/drivers/tpm/slb9635_i2c.c @@ -0,0 +1,71 @@ +/* Copyright (c) 2011 The Chromium OS Authors. All rights reserved. + * Use of this source code is governed by a BSD-style license that can be + * found in the LICENSE file. + */ + +#include <common.h> +#include <config.h> +#include <i2c.h> +#include "slb9635_i2c/ifx_auto.h" + +/* api function pointer for different version chip */ +static struct { + int (*open)(void); + int (*close)(void); + int (*sendrecv)(const uint8_t *sendbuf, size_t sbuf_size, + uint8_t *recvbuf, size_t *rbuf_len); +} _tpm_instance = {0}; + + +int tis_init(void) +{ +#ifdef CONFIG_TPM_SLB9635_I2C_V03 + /* prototype version chip detection */ + if (tpm_init_v03() == 0) { + printf("I2C addr(x1A) : v03 prototype\n"); + _tpm_instance.open = tpm_open_v03; + _tpm_instance.close = tpm_close_v03; + _tpm_instance.sendrecv = tpm_sendrecv_v03; + return 0; + } +#endif + +#ifdef CONFIG_TPM_SLB9635_I2C + /* firmware virsion > v05 : production */ + if (tpm_init_v05() == 0) { + printf("I2C addr(x20) : v05 engineering/production\n"); + _tpm_instance.open = tpm_open_v05; + _tpm_instance.close = tpm_close_v05; + _tpm_instance.sendrecv = tpm_sendrecv_v05; + return 0; + } +#endif + _tpm_instance.open = NULL; + _tpm_instance.close = NULL; + _tpm_instance.sendrecv = NULL; + return -1; +} + +int tis_open(void) +{ + if (_tpm_instance.open) + return (*_tpm_instance.open)(); + return -1; +} + +int tis_close(void) +{ + if (_tpm_instance.close) + return (*_tpm_instance.close)(); + return -1; +} + +int tis_sendrecv(const uint8_t *sendbuf, size_t sbuf_size, + uint8_t *recvbuf, size_t *rbuf_len) +{ + if (_tpm_instance.sendrecv) + return (*_tpm_instance.sendrecv)(sendbuf, sbuf_size, recvbuf, + rbuf_len); + return -1; +} + diff --git a/drivers/tpm/slb9635_i2c/compatibility.h b/drivers/tpm/slb9635_i2c/compatibility.h new file mode 100644 index 00000000000..c68a8553ee1 --- /dev/null +++ b/drivers/tpm/slb9635_i2c/compatibility.h @@ -0,0 +1,52 @@ +/* + * Copyright (C) 2011 Infineon Technologies + * + * Authors: + * Peter Huewe <huewe.external@infineon.com> + * + * Version: 2.1.1 + * + * See file CREDITS for list of people who contributed to this + * project. + * + * This program is free software; you can redistribute it and/or + * modify it under the terms of the GNU General Public License as + * published by the Free Software Foundation; either version 2 of + * the License, or (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program; if not, write to the Free Software + * Foundation, Inc., 59 Temple Place, Suite 330, Boston, + * MA 02111-1307 USA + */ + +#ifndef _COMPATIBILITY_H_ +#define _COMPATIBILITY_H_ + +/* all includes from U-Boot */ +#include <linux/types.h> +#include <linux/unaligned/be_byteshift.h> +#include <asm-generic/errno.h> +#include <compiler.h> +#include <common.h> + +/* extended error numbers from linux (see errno.h) */ +#define ECANCELED 125 /* Operation Canceled */ + +#define msleep(t) udelay((t)*1000) + +/* Timer frequency. Corresponds to msec timer resolution*/ +#define HZ 1000 + + +#define dev_dbg(dev, format, arg...) debug(format, ##arg) +#define dev_err(dev, format, arg...) printf(format, ##arg) +#define dev_info(dev, format, arg...) debug(format, ##arg) +#define dbg_printf debug + +#endif diff --git a/drivers/tpm/slb9635_i2c/ifx_auto.h b/drivers/tpm/slb9635_i2c/ifx_auto.h new file mode 100644 index 00000000000..8e61d752819 --- /dev/null +++ b/drivers/tpm/slb9635_i2c/ifx_auto.h @@ -0,0 +1,21 @@ +/* Copyright (c) 2011 The Chromium OS Authors. All rights reserved. + * Use of this source code is governed by a BSD-style license that can be + * found in the LICENSE file. + */ + +#ifndef __tpm_slb9635_i2c_ifx_auto_h__ +#define __tpm_slb9635_i2c_ifx_auto_h__ + +int tpm_init_v03(void); +int tpm_open_v03(void); +int tpm_close_v03(void); +int tpm_sendrecv_v03(const uint8_t *sendbuf, size_t buf_size, uint8_t *recvbuf, + size_t *recv_len); +int tpm_init_v05(void); +int tpm_open_v05(void); +int tpm_close_v05(void); +int tpm_sendrecv_v05(const uint8_t *sendbuf, size_t buf_size, uint8_t *recvbuf, + size_t *recv_len); + +#endif /* __tpm_slb9635_i2c_ifx_auto_h__ */ + diff --git a/drivers/tpm/slb9635_i2c/ifx_v03.c b/drivers/tpm/slb9635_i2c/ifx_v03.c new file mode 100644 index 00000000000..5e3ae7e4608 --- /dev/null +++ b/drivers/tpm/slb9635_i2c/ifx_v03.c @@ -0,0 +1,15 @@ +/* Copyright (c) 2011 The Chromium OS Authors. All rights reserved. + * Use of this source code is governed by a BSD-style license that can be + * found in the LICENSE file. + */ + +int tpm_open_v03(void) +{ + return 0; +} + +int tpm_close_v03(void) +{ + return 0; +} + diff --git a/drivers/tpm/slb9635_i2c/ifx_v05.c b/drivers/tpm/slb9635_i2c/ifx_v05.c new file mode 100644 index 00000000000..c39d8e765b3 --- /dev/null +++ b/drivers/tpm/slb9635_i2c/ifx_v05.c @@ -0,0 +1,46 @@ +/* Copyright (c) 2011 The Chromium OS Authors. All rights reserved. + * Use of this source code is governed by a BSD-style license that can be + * found in the LICENSE file. + */ + +#include <config.h> +#include <common.h> +#include <i2c.h> +#include "tddl.h" + +#define TPM_V05_DEFAULT_ADDR (0x20) + +#ifdef CONFIG_TPM_SLB9635_I2C_ADDR +#define TPM_V05_ADDR CONFIG_TPM_SLB9635_I2C_ADDR +#else +#define TPM_V05_ADDR TPM_V05_DEFAULT_ADDR +#endif + +int tpm_init_v05(void) +{ + return i2c_probe(TPM_V05_ADDR ); +} + +int tpm_open_v05(void) +{ + if (TDDL_Open(TPM_V05_ADDR )) + return -1; + return 0; +} + +int tpm_close_v05(void) +{ + if (TDDL_Close()) + return -1; + return 0; +} + +int tpm_sendrecv_v05(const uint8_t *sendbuf, size_t buf_size, + uint8_t *recvbuf, size_t *recv_len) +{ + if (TDDL_TransmitData((uint8_t*)sendbuf, (uint32_t)buf_size, recvbuf, + (uint32_t*)recv_len)) + return -1; + return 0; +} + diff --git a/drivers/tpm/slb9635_i2c/tddl.c b/drivers/tpm/slb9635_i2c/tddl.c new file mode 100644 index 00000000000..0269635ea95 --- /dev/null +++ b/drivers/tpm/slb9635_i2c/tddl.c @@ -0,0 +1,100 @@ +/* + * Copyright (C) 2011 Infineon Technologies + * + * Authors: + * Peter Huewe <huewe.external@infineon.com> + * + * description: Infineon_TPM-I2C - TDDL supporting FW 2010. + * + * See file CREDITS for list of people who contributed to this + * project. + * + * Version: 2.1.1 + * + * This program is free software; you can redistribute it and/or + * modify it under the terms of the GNU General Public License as + * published by the Free Software Foundation; either version 2 of + * the License, or (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program; if not, write to the Free Software + * Foundation, Inc., 59 Temple Place, Suite 330, Boston, + * MA 02111-1307 USA + */ +#include <exports.h> + +#include "tddl.h" +#include "tpm.h" + +/* buffer supporting tpm_transmit */ +uint8_t tmpbuf[TPM_BUFSIZE]; + +/* Open connection to TPM */ +TDDL_RESULT TDDL_Open(uint32_t dev_addr) +{ + int rc; + dbg_printf("INFO: initialising TPM\n"); + rc = tpm_open(dev_addr); + if (rc < 0) { + switch (rc) { + case -EBUSY: return TDDL_E_ALREADY_OPENED; + case -ENODEV: return TDDL_E_COMPONENT_NOT_FOUND; + }; + return TDDL_E_FAIL; + } + return TDDL_SUCCESS; +} + +/* Disconnect from the TPM */ +TDDL_RESULT TDDL_Close(void) +{ + tpm_close(); + return TDDL_SUCCESS; +} + +/* Send the TPM Application Protocol Data Unit (APDU) to the TPM and + * return the response APDU */ +TDDL_RESULT TDDL_TransmitData(uint8_t *pbTransmitBuf, uint32_t dwTransmitBufLen, + uint8_t *pbReceiveBuf, uint32_t *pdwReceiveBufLen) +{ + int len; + uint32_t i; + TDDL_RESULT rc = TDDL_E_FAIL; + + dbg_printf("--> xTDDL_TransmitData()\n"); + + dbg_printf("pbTransmitBuf = "); + for (i = 0; i < dwTransmitBufLen; i++) + dbg_printf("%02x ", pbTransmitBuf[i]); + dbg_printf("\n"); + + /* copy buffer to make sure transmit data may be overwritten */ + memcpy(tmpbuf, pbTransmitBuf, dwTransmitBufLen); + + /* do transmission */ + len = tpm_transmit(tmpbuf, dwTransmitBufLen); + + if (len >= 10) { + memcpy(pbReceiveBuf, tmpbuf, len); + dbg_printf("INFO: copied %d bytes into pbReceiveBuf\n", len); + *pdwReceiveBufLen = len; + rc = TDDL_SUCCESS; + } else { + dbg_printf("ERROR: tpm_transmit() returned %d\n", len); + *pdwReceiveBufLen = 0; + } + + dbg_printf("pbReceiveBuf = "); + for (i = 0; i < (*pdwReceiveBufLen); i++) + dbg_printf("%02x ", pbReceiveBuf[i]); + dbg_printf("\n"); + + dbg_printf("<-- xTDDL_TransmitData()\n"); + + return rc; +} diff --git a/drivers/tpm/slb9635_i2c/tddl.h b/drivers/tpm/slb9635_i2c/tddl.h new file mode 100644 index 00000000000..f1af2473f4b --- /dev/null +++ b/drivers/tpm/slb9635_i2c/tddl.h @@ -0,0 +1,31 @@ +/******************************************************************************* +** +** FILENAME: tddl.h +** COPYRIGHT: Infineon Technologies +** DESCRIPTION: I2C TPM - TDDL API. +** CREATOR: Peter Huewe <huewe.external@infineon.com> +** LICENSE: GPL +** VERSION: 2.1.1 +*******************************************************************************/ +#ifndef _TDDL_H_ +#define _TDDL_H_ + +/* Includes from U-Boot */ +#include <linux/types.h> + +typedef uint32_t TDDL_RESULT; + +#define TDDL_SUCCESS 0x00000000L +#define TDDL_E_FAIL 0x00000001L +#define TDDL_E_COMPONENT_NOT_FOUND (TDDL_E_FAIL + 0x00000001L) +#define TDDL_E_ALREADY_OPENED (TDDL_E_FAIL + 0x00000002L) + + +/* if dev_addr != 0 - redefines TPM device address */ +TDDL_RESULT TDDL_Open(uint32_t dev_addr); + +TDDL_RESULT TDDL_Close(void); + +TDDL_RESULT TDDL_TransmitData(uint8_t *pbTransmitBuf, uint32_t dwTransmitBufLen, + uint8_t *pbReceiveBuf, uint32_t *pdwReceiveBufLen); +#endif diff --git a/drivers/tpm/slb9635_i2c/tpm.c b/drivers/tpm/slb9635_i2c/tpm.c new file mode 100644 index 00000000000..ca6852ec0d3 --- /dev/null +++ b/drivers/tpm/slb9635_i2c/tpm.c @@ -0,0 +1,469 @@ +/* + * Copyright (C) 2011 Infineon Technologies + * + * Authors: + * Peter Huewe <huewe.external@infineon.com> + * + * Description: + * Device driver for TCG/TCPA TPM (trusted platform module). + * Specifications at www.trustedcomputinggroup.org + * + * It is based on the Linux kernel driver tpm.c from Leendert van + * Dorn, Dave Safford, Reiner Sailer, and Kyleen Hall. + * + * Version: 2.1.1 + * + * See file CREDITS for list of people who contributed to this + * project. + * + * This program is free software; you can redistribute it and/or + * modify it under the terms of the GNU General Public License as + * published by the Free Software Foundation, version 2 of the + * License. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program; if not, write to the Free Software + * Foundation, Inc., 59 Temple Place, Suite 330, Boston, + * MA 02111-1307 USA + */ + +#include <malloc.h> +#include "tpm.h" + +/* global structure for tpm chip data */ +struct tpm_chip g_chip; + +enum tpm_duration { + TPM_SHORT = 0, + TPM_MEDIUM = 1, + TPM_LONG = 2, + TPM_UNDEFINED, +}; + +#define TPM_MAX_ORDINAL 243 +#define TPM_MAX_PROTECTED_ORDINAL 12 +#define TPM_PROTECTED_ORDINAL_MASK 0xFF + +/* + * Array with one entry per ordinal defining the maximum amount + * of time the chip could take to return the result. The ordinal + * designation of short, medium or long is defined in a table in + * TCG Specification TPM Main Part 2 TPM Structures Section 17. The + * values of the SHORT, MEDIUM, and LONG durations are retrieved + * from the chip during initialization with a call to tpm_get_timeouts. + */ +static const u8 tpm_protected_ordinal_duration[TPM_MAX_PROTECTED_ORDINAL] = { + TPM_UNDEFINED, /* 0 */ + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, /* 5 */ + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_SHORT, /* 10 */ + TPM_SHORT, +}; + +static const u8 tpm_ordinal_duration[TPM_MAX_ORDINAL] = { + TPM_UNDEFINED, /* 0 */ + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, /* 5 */ + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_SHORT, /* 10 */ + TPM_SHORT, + TPM_MEDIUM, + TPM_LONG, + TPM_LONG, + TPM_MEDIUM, /* 15 */ + TPM_SHORT, + TPM_SHORT, + TPM_MEDIUM, + TPM_LONG, + TPM_SHORT, /* 20 */ + TPM_SHORT, + TPM_MEDIUM, + TPM_MEDIUM, + TPM_MEDIUM, + TPM_SHORT, /* 25 */ + TPM_SHORT, + TPM_MEDIUM, + TPM_SHORT, + TPM_SHORT, + TPM_MEDIUM, /* 30 */ + TPM_LONG, + TPM_MEDIUM, + TPM_SHORT, + TPM_SHORT, + TPM_SHORT, /* 35 */ + TPM_MEDIUM, + TPM_MEDIUM, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_MEDIUM, /* 40 */ + TPM_LONG, + TPM_MEDIUM, + TPM_SHORT, + TPM_SHORT, + TPM_SHORT, /* 45 */ + TPM_SHORT, + TPM_SHORT, + TPM_SHORT, + TPM_LONG, + TPM_MEDIUM, /* 50 */ + TPM_MEDIUM, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, /* 55 */ + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_MEDIUM, /* 60 */ + TPM_MEDIUM, + TPM_MEDIUM, + TPM_SHORT, + TPM_SHORT, + TPM_MEDIUM, /* 65 */ + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_SHORT, /* 70 */ + TPM_SHORT, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, /* 75 */ + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_LONG, /* 80 */ + TPM_UNDEFINED, + TPM_MEDIUM, + TPM_LONG, + TPM_SHORT, + TPM_UNDEFINED, /* 85 */ + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_SHORT, /* 90 */ + TPM_SHORT, + TPM_SHORT, + TPM_SHORT, + TPM_SHORT, + TPM_UNDEFINED, /* 95 */ + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_MEDIUM, /* 100 */ + TPM_SHORT, + TPM_SHORT, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, /* 105 */ + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_SHORT, /* 110 */ + TPM_SHORT, + TPM_SHORT, + TPM_SHORT, + TPM_SHORT, + TPM_SHORT, /* 115 */ + TPM_SHORT, + TPM_SHORT, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_LONG, /* 120 */ + TPM_LONG, + TPM_MEDIUM, + TPM_UNDEFINED, + TPM_SHORT, + TPM_SHORT, /* 125 */ + TPM_SHORT, + TPM_LONG, + TPM_SHORT, + TPM_SHORT, + TPM_SHORT, /* 130 */ + TPM_MEDIUM, + TPM_UNDEFINED, + TPM_SHORT, + TPM_MEDIUM, + TPM_UNDEFINED, /* 135 */ + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_SHORT, /* 140 */ + TPM_SHORT, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, /* 145 */ + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_SHORT, /* 150 */ + TPM_MEDIUM, + TPM_MEDIUM, + TPM_SHORT, + TPM_SHORT, + TPM_UNDEFINED, /* 155 */ + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_SHORT, /* 160 */ + TPM_SHORT, + TPM_SHORT, + TPM_SHORT, + TPM_UNDEFINED, + TPM_UNDEFINED, /* 165 */ + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_LONG, /* 170 */ + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, /* 175 */ + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_MEDIUM, /* 180 */ + TPM_SHORT, + TPM_MEDIUM, + TPM_MEDIUM, + TPM_MEDIUM, + TPM_MEDIUM, /* 185 */ + TPM_SHORT, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, /* 190 */ + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, /* 195 */ + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_SHORT, /* 200 */ + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_SHORT, + TPM_SHORT, /* 205 */ + TPM_SHORT, + TPM_SHORT, + TPM_SHORT, + TPM_SHORT, + TPM_MEDIUM, /* 210 */ + TPM_UNDEFINED, + TPM_MEDIUM, + TPM_MEDIUM, + TPM_MEDIUM, + TPM_UNDEFINED, /* 215 */ + TPM_MEDIUM, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_SHORT, + TPM_SHORT, /* 220 */ + TPM_SHORT, + TPM_SHORT, + TPM_SHORT, + TPM_SHORT, + TPM_UNDEFINED, /* 225 */ + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_SHORT, /* 230 */ + TPM_LONG, + TPM_MEDIUM, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, /* 235 */ + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_UNDEFINED, + TPM_SHORT, /* 240 */ + TPM_UNDEFINED, + TPM_MEDIUM, +}; + +/* + * Returns max number of milliseconds to wait + */ +unsigned long tpm_calc_ordinal_duration(struct tpm_chip *chip, u32 ordinal) +{ + int duration_idx = TPM_UNDEFINED; + int duration = 0; + + if (ordinal < TPM_MAX_ORDINAL) + duration_idx = tpm_ordinal_duration[ordinal]; + else if ((ordinal & TPM_PROTECTED_ORDINAL_MASK) < + TPM_MAX_PROTECTED_ORDINAL) + duration_idx = + tpm_protected_ordinal_duration[ordinal & + TPM_PROTECTED_ORDINAL_MASK]; + + if (duration_idx != TPM_UNDEFINED) + duration = chip->vendor.duration[duration_idx]; + if (duration <= 0) + return 2 * 60 * HZ; /*two minutes timeout*/ + else + return duration; +} + +#define TPM_CMD_COUNT_BYTE 2 +#define TPM_CMD_ORDINAL_BYTE 6 + +ssize_t tpm_transmit(const unsigned char *buf, size_t bufsiz) +{ + ssize_t rc; + u32 count, ordinal; + unsigned long start, stop; + + struct tpm_chip *chip = &g_chip; + + /* switch endianess: big->little */ + count = get_unaligned_be32(buf + TPM_CMD_COUNT_BYTE); + ordinal = get_unaligned_be32(buf + TPM_CMD_ORDINAL_BYTE); + + if (count == 0) { + dev_err(chip->dev, "no data\n"); + return -ENODATA; + } + if (count > bufsiz) { + dev_err(chip->dev, + "invalid count value %x %zx\n", count, bufsiz); + return -E2BIG; + } + + rc = chip->vendor.send(chip, (u8 *) buf, count); + if (rc < 0) { + dev_err(chip->dev, "tpm_transmit: tpm_send: error %zd\n", rc); + goto out; + } + + if (chip->vendor.irq) + goto out_recv; + + start = get_timer(0); + stop = tpm_calc_ordinal_duration(chip, ordinal); + do { + dbg_printf("waiting for status...\n"); + u8 status = chip->vendor.status(chip); + if ((status & chip->vendor.req_complete_mask) == + chip->vendor.req_complete_val) { + dbg_printf("...got it;\n"); + goto out_recv; + } + + if ((status == chip->vendor.req_canceled)) { + dev_err(chip->dev, "Operation Canceled\n"); + rc = -ECANCELED; + goto out; + } + msleep(TPM_TIMEOUT); + } while (get_timer(start) < stop); + + chip->vendor.cancel(chip); + dev_err(chip->dev, "Operation Timed out\n"); + rc = -ETIME; + goto out; + +out_recv: + + dbg_printf("out_recv: reading response...\n"); + rc = chip->vendor.recv(chip, (u8 *) buf, TPM_BUFSIZE); + if (rc < 0) + dev_err(chip->dev, "tpm_transmit: tpm_recv: error %zd\n", rc); +out: + return rc; +} + +#define TPM_ERROR_SIZE 10 + +enum tpm_capabilities { + TPM_CAP_PROP = cpu_to_be32(5), +}; + +enum tpm_sub_capabilities { + TPM_CAP_PROP_TIS_TIMEOUT = cpu_to_be32(0x115), + TPM_CAP_PROP_TIS_DURATION = cpu_to_be32(0x120), +}; + +static ssize_t transmit_cmd(struct tpm_chip *chip, struct tpm_cmd_t *cmd, + int len, const char *desc) +{ + int err; + + len = tpm_transmit((u8 *) cmd, len); + if (len < 0) + return len; + if (len == TPM_ERROR_SIZE) { + err = be32_to_cpu(cmd->header.out.return_code); + dev_dbg(chip->dev, "A TPM error (%d) occurred %s\n", err, desc); + return err; + } + return 0; +} + +struct tpm_chip *tpm_register_hardware(const struct tpm_vendor_specific *entry) +{ + struct tpm_chip *chip; + + /* Driver specific per-device data */ + chip = &g_chip; + memcpy(&chip->vendor, entry, sizeof(struct tpm_vendor_specific)); + chip->is_open = 1; + + return chip; +} + +int tpm_open(uint32_t dev_addr) +{ + int rc; + if (g_chip.is_open) + return -EBUSY; + rc = tpm_vendor_init(dev_addr); + if (rc < 0) + g_chip.is_open = 0; + return rc; +} + +void tpm_close(void) +{ + if (g_chip.is_open) { + tpm_vendor_cleanup(&g_chip); + g_chip.is_open = 0; + } +} diff --git a/drivers/tpm/slb9635_i2c/tpm.h b/drivers/tpm/slb9635_i2c/tpm.h new file mode 100644 index 00000000000..23eb472f1c3 --- /dev/null +++ b/drivers/tpm/slb9635_i2c/tpm.h @@ -0,0 +1,159 @@ +/* + * Copyright (C) 2011 Infineon Technologies + * + * Authors: + * Peter Huewe <huewe.external@infineon.com> + * + * Version: 2.1.1 + * + * Description: + * Device driver for TCG/TCPA TPM (trusted platform module). + * Specifications at www.trustedcomputinggroup.org + * + * It is based on the Linux kernel driver tpm.c from Leendert van + * Dorn, Dave Safford, Reiner Sailer, and Kyleen Hall. + * + * + * See file CREDITS for list of people who contributed to this + * project. + * + * This program is free software; you can redistribute it and/or + * modify it under the terms of the GNU General Public License as + * published by the Free Software Foundation, version 2 of the + * License. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program; if not, write to the Free Software + * Foundation, Inc., 59 Temple Place, Suite 330, Boston, + * MA 02111-1307 USA + */ + +#ifndef _TPM_H_ +#define _TPM_H_ + +#include "compatibility.h" + +enum tpm_timeout { + TPM_TIMEOUT = 5, /* msecs */ +}; + +/* Size of external transmit buffer (used in tpm_transmit)*/ +#define TPM_BUFSIZE 4096 + +/* Index of fields in TPM command buffer */ +#define TPM_CMD_SIZE_BYTE 2 +#define TPM_CMD_ORDINAL_BYTE 6 + +/* Index of Count field in TPM response buffer */ +#define TPM_RSP_SIZE_BYTE 2 +#define TPM_RSP_RC_BYTE 6 + +struct tpm_chip; + +struct tpm_vendor_specific { + const u8 req_complete_mask; + const u8 req_complete_val; + const u8 req_canceled; + int irq; + int (*recv) (struct tpm_chip *, u8 *, size_t); + int (*send) (struct tpm_chip *, u8 *, size_t); + void (*cancel) (struct tpm_chip *); + u8(*status) (struct tpm_chip *); + int locality; + unsigned long timeout_a, timeout_b, timeout_c, timeout_d; /* msec */ + unsigned long duration[3]; /* msec */ +}; + +struct tpm_chip { + int is_open; + struct tpm_vendor_specific vendor; +}; + +struct tpm_input_header { + __be16 tag; + __be32 length; + __be32 ordinal; +} __attribute__ ((packed)); + +struct tpm_output_header { + __be16 tag; + __be32 length; + __be32 return_code; +} __attribute__ ((packed)); + +struct timeout_t { + __be32 a; + __be32 b; + __be32 c; + __be32 d; +} __attribute__ ((packed)); + +struct duration_t { + __be32 tpm_short; + __be32 tpm_medium; + __be32 tpm_long; +} __attribute__ ((packed)); + +typedef union { + struct timeout_t timeout; + struct duration_t duration; +} cap_t; + +struct tpm_getcap_params_in { + __be32 cap; + __be32 subcap_size; + __be32 subcap; +} __attribute__ ((packed)); + +struct tpm_getcap_params_out { + __be32 cap_size; + cap_t cap; +} __attribute__ ((packed)); + +typedef union { + struct tpm_input_header in; + struct tpm_output_header out; +} tpm_cmd_header; + +typedef union { + struct tpm_getcap_params_out getcap_out; + struct tpm_getcap_params_in getcap_in; +} tpm_cmd_params; + +struct tpm_cmd_t { + tpm_cmd_header header; + tpm_cmd_params params; +} __attribute__ ((packed)); + + +/* ---------- Interface for TPM vendor ------------ */ + +extern struct tpm_chip *tpm_register_hardware( + const struct tpm_vendor_specific *); + +extern int tpm_vendor_init(uint32_t dev_addr); + +extern void tpm_vendor_cleanup(struct tpm_chip *chip); + +/* ---------- Interface for TDDL ------------------- */ + +/* + * if dev_addr != 0 - redefines TPM device address + * Returns < 0 on error, 0 on success. + */ +extern int tpm_open(uint32_t dev_addr); + +extern void tpm_close(void); + +/* + * Transmit bufsiz bytes out of buf to TPM and get results back in buf, too. + * Returns < 0 on error, 0 on success. + */ +extern ssize_t tpm_transmit(const unsigned char *buf, size_t bufsiz); + +#endif diff --git a/drivers/tpm/slb9635_i2c/tpm_proto.c b/drivers/tpm/slb9635_i2c/tpm_proto.c new file mode 100644 index 00000000000..dc485a9ed15 --- /dev/null +++ b/drivers/tpm/slb9635_i2c/tpm_proto.c @@ -0,0 +1,427 @@ +/* Copyright (c) 2011 The Chromium OS Authors. All rights reserved. + * Use of this source code is governed by a BSD-style license that can be + * found in the LICENSE file. + */ + +#include <config.h> +#include <common.h> +#include <i2c.h> + + +/* infineon prototype i2c tpm's internal registers + */ +#define INFINEON_TPM_CHIP (0x1A) +#define REG_RDATA (0xA4) +#define REG_WDATA (0xA5) +#define REG_STAT (0xA7) +/* i2c timeout value and polling period + */ +#define I2CBUSY_WAIT_MS (1ul) +#define TIMEOUT_REG_MS (1000ul) + +/* error code follows u-boot standard + * 0 : success + * non zero : failed + */ +enum { + E_TIMEOUT = -7, + E_CHECKSUM = -6, + E_SIZE = -5, + E_MEMORY = -4, + E_DATA = -3, + E_PARAMETER = -2, + E_GENERAL = -1, + S_OK = 0, + E_WARNING = 1 +}; + +/* tpm chip timeout value on read/write + * TODO: + * find the correct timeout when tpm in i2c mode. but since this is the + * prototype i2c tpm chip, spec is not as clear as lpc tpm chip. just use + * the maximum wait time as the timeout value. + */ +#define TIMEOUT_READ_MS (3000ul) +#define TIMEOUT_WRITE_MS (1000ul) + +/* tpm stat register bits + */ +#define TPM_RECEIVE_DATA_AVAILABLE (1u) +#define TPM_TRANSMIT_FIFO_NOTFULL (1u << 7) + +/* tpm transport and vendor layers + */ +enum { + TSPT_VER = 0, + TSPT_CTRL = 1, + TSPT_LEN_H = 2, + TSPT_LEN_L = 3, + TSPT_CSUM1 = 4, + VEND_VERS = 5, + VEND_CHA = 6, + VEND_LEN_0 = 7, + VEND_LEN_1 = 8, + VEND_LEN_2 = 9, + VEND_LEN_3 = 10, + DATA_START = 11 +}; + +/* infineon prototype chip specific header + */ +#define VENDOR_HEADER_SIZE (6) +#define TSPT_HEADER_SIZE (5) +#define TSPT_TAIL_SIZE (1) +#define TPM_I2C_HEADER_SIZE (TSPT_HEADER_SIZE+VENDOR_HEADER_SIZE) +#define PACKED_EXTRA_SIZE (TPM_I2C_HEADER_SIZE+TSPT_TAIL_SIZE) +#define TPM_TRANSPORT_VER (0x02) +#define TPM_VENDOR_VERS (0x01) +#define TPM_VENDOR_CHA_TPM12MSC (0x0B) +/* infineon prototype chip specific data bit value + */ +#define TPM_TRANSPORT_CTRL_E_BIT (1u << 5) +#define TPM_TRANSPORT_CTRL_D_BIT (1u << 2) + +/* FIXME: (should modify drivers/i2c/tegra2_i2c.c) + * following two functions only exist in i2c_tegra2.c driver + * the impl should be what defined in u-boot header file + * int i2c_read(chip, addr_ignore, 0, *buffer, length); + */ +extern int i2c_read_data(uchar chip, uchar *buffer, int len); +extern int i2c_write_data(uchar chip, uchar *buffer, int len); + +typedef struct s_inf_stat_reg { + uint8_t status; + uint8_t len_h; + uint8_t len_l; + uint8_t checksum; +} t_inf_stat_reg; + + +/* TODO: consider implement scatter buffers + * it is possible to use scattered buffers for send/recv + * but current impl used single buffer on stack + */ +#define HUGE_BUFFER_SIZE 300 + +#ifdef VBOOT_DEBUG +#define vboot_debug printf +#else +#define vboot_debug debug +#endif /* VBOOT_DEBUG */ + +#define TPM_CHECK(XACTION) do { \ + int ret_code = XACTION; \ + if (ret_code) { \ + vboot_debug("#FAIL(%d) - infineon_tpm:%d\n", \ + ret_code, __LINE__); \ + return ret_code; \ + } \ +} while (0) + +/* XOR checksum */ +static uint8_t xor_checksum(const uint8_t *array, size_t len) +{ + uint8_t checksum = 0; + if (len == 0 || array == NULL) + return 0; + while (len++) { + checksum ^= *array++; + } + return checksum; +} + +static inline void tpm_i2c_debug_dump(const uint8_t *data, int dir_w, + size_t len) +{ +#ifdef VBOOT_DEBUG + uint32_t i; + size_t data_len = len - DATA_START - 1; + printf("%c - transport header %02x %02x %02x %02x %02x\n", + dir_w ? 'W' : 'R', data[0], data[1], data[2], data[3], data[4]); + printf(" - vendor header %02x %02x %02x %02x %02x %02x", + data[5], data[6], data[7], data[8], data[9], data[10]); + for (i = 0; i < data_len; i++) { + if (0 == (i & 0xf)) { + printf("\n - payload "); + } + printf("%02x ", data[i + DATA_START]); + } + printf("\n - checksum %02x\n", data[DATA_START + data_len]); +#endif /* VBOOT_DEBUG */ +} + +/* 'to' buffer must be 6 bytes more larger than 'from' byte length */ +static int tpm_i2c_pack(uint8_t *to, const uint8_t *from, size_t data_len) +{ + size_t transport_length = data_len + VENDOR_HEADER_SIZE; + if (to == NULL || from == NULL) + return E_PARAMETER; + /* infineon prototype chip maximum data length */ + if (transport_length > 0xffff) + return E_SIZE; + + /* build transport header */ + to[TSPT_VER ] = TPM_TRANSPORT_VER; // fixed : 0x02 + to[TSPT_CTRL ] = TPM_TRANSPORT_CTRL_D_BIT; // normal data : 0x04 + to[TSPT_LEN_H] = 0xff & (transport_length >> 8); + to[TSPT_LEN_L] = 0xff & transport_length; + to[TSPT_CSUM1] = xor_checksum(to, 4); + /* build vendor header */ + to[VEND_VERS ] = TPM_VENDOR_VERS; // fixed : 0x01 + to[VEND_CHA ] = TPM_VENDOR_CHA_TPM12MSC; // fixed : 0x0B + to[VEND_LEN_0] = 0; + to[VEND_LEN_1] = 0; + to[VEND_LEN_2] = 0xff & (data_len >> 8); + to[VEND_LEN_3] = 0xff & data_len; + /* clone payload body */ + memcpy(to + TPM_I2C_HEADER_SIZE, from, data_len); + /* calculate tail checksum */ + to[DATA_START + data_len] = xor_checksum(to + VEND_VERS, + transport_length); + tpm_i2c_debug_dump(to, 1, DATA_START + data_len + 1); + return 0; +} + +/* verify and extract transport payload */ +static int tpm_i2c_unpack(uint8_t *to, const uint8_t *from, size_t * pcopy_size) +{ + size_t transport_len, data_len; + + /* verify pointers + */ + if (to == NULL || from == NULL || pcopy_size == NULL) + return E_PARAMETER; + /* verify version, header checksum, control errorbit + */ + if (from[TSPT_VER ] != TPM_TRANSPORT_VER) + return E_DATA; + if (from[TSPT_CSUM1 ] != xor_checksum(from, 4)) + return E_CHECKSUM; + if (0 != (from[TSPT_CTRL ] & TPM_TRANSPORT_CTRL_E_BIT)) + return E_DATA; + /* verify payload size + */ + transport_len = ((size_t)from[TSPT_LEN_H] << 8) + + (size_t)from[TSPT_LEN_L]; + data_len = ((size_t)from[VEND_LEN_2] << 8) + (size_t)from[VEND_LEN_3]; + if (transport_len != (data_len + VENDOR_HEADER_SIZE)) + return E_SIZE; + /* verify payload checksum + */ + if (xor_checksum(from + TSPT_HEADER_SIZE, VENDOR_HEADER_SIZE + + data_len) != from[DATA_START + data_len]) + return E_CHECKSUM; + /* extract payload + */ + memcpy(to, from + DATA_START, data_len); + *pcopy_size = data_len; + tpm_i2c_debug_dump(from, 0, DATA_START + data_len + 1); + return 0; +} + +static int tpm_i2c_reg(uint8_t *reg) +{ + ulong stime = get_timer(0); + while (i2c_write_data((uchar)INFINEON_TPM_CHIP, reg, 1)) { + /* i2c busy, wait 1ms */ + udelay(I2CBUSY_WAIT_MS * 1000); + if (get_timer(stime) > TIMEOUT_REG_MS) + return E_TIMEOUT; + } + return 0; +} + +static int tpm_i2c_read_status(t_inf_stat_reg *preg) +{ + uint8_t s_reg[8]; + uint8_t stat[4]; + s_reg[0] = (uchar)REG_STAT; + TPM_CHECK(tpm_i2c_reg(s_reg)); + TPM_CHECK(i2c_read_data((uchar)INFINEON_TPM_CHIP, (uchar*)stat, 4)); + if (stat[3] != xor_checksum(stat, 3)) + return E_CHECKSUM; + if (preg) { + preg->status = stat[0]; + preg->len_h = stat[1]; + preg->len_l = stat[2]; + preg->checksum = stat[3]; + return 0; + } + return 0; +} + +static int tpm_i2c_write_data(const uint8_t *data, size_t len) +{ + uint8_t w_reg[8]; + uint8_t packed_buffer[HUGE_BUFFER_SIZE]; + w_reg[0] = (uchar)REG_WDATA; + + /* check max buffer size + */ + if (len > (HUGE_BUFFER_SIZE - TPM_I2C_HEADER_SIZE - 1)) + return E_SIZE; + /* pack data for transport + */ + TPM_CHECK(tpm_i2c_pack(packed_buffer, data, len)); + /* write to fifo + */ + TPM_CHECK(tpm_i2c_reg(w_reg)); + TPM_CHECK(i2c_write_data((uchar)INFINEON_TPM_CHIP, + (uchar*)packed_buffer, len + PACKED_EXTRA_SIZE)); + return 0; +} + +static int tpm_i2c_read_data(uint8_t *payload, size_t read_len, + size_t *payload_len) +{ + uint8_t r_reg[8]; + uint8_t packed_buffer[HUGE_BUFFER_SIZE]; + size_t temp_size = 0; + r_reg[0] = (uchar)REG_RDATA; + + if (read_len > HUGE_BUFFER_SIZE) + return E_SIZE; + /* read data into packed buffer + */ + TPM_CHECK(tpm_i2c_reg(r_reg)); + TPM_CHECK(i2c_read_data((uchar)INFINEON_TPM_CHIP, + (uchar*)packed_buffer, read_len)); + if (payload == NULL) + return 0; + /* unpack buffer + */ + TPM_CHECK(tpm_i2c_unpack(payload, packed_buffer, payload_len ? + payload_len : &temp_size)); + return 0; +} + +static int tpm_prepare_write(ulong timeout_us) +{ + t_inf_stat_reg st_reg; + ulong stime = get_timer(0); + + TPM_CHECK(tpm_i2c_read_status(&st_reg)); + if ((st_reg.status & TPM_TRANSMIT_FIFO_NOTFULL) != 0) + return 0; + /* when write, flush all data in read buffer first + */ + if ((st_reg.status & TPM_RECEIVE_DATA_AVAILABLE) != 0) + TPM_CHECK(tpm_i2c_read_data(NULL, (size_t)st_reg.len_h * 256 + + st_reg.len_l, NULL)); + + do { + TPM_CHECK(tpm_i2c_read_status(&st_reg)); + } while ((get_timer(stime) < timeout_us) && + (st_reg.status & TPM_TRANSMIT_FIFO_NOTFULL) == 0); + + if ((st_reg.status & TPM_TRANSMIT_FIFO_NOTFULL) == 0) + return E_TIMEOUT; + return 0; +} + +static int tpm_prepare_read(ulong timeout_us) +{ + t_inf_stat_reg st_reg; + ulong stime = get_timer(0); + + do { + TPM_CHECK(tpm_i2c_read_status(&st_reg)); + } while ((get_timer(stime) < timeout_us) && + (st_reg.status & TPM_RECEIVE_DATA_AVAILABLE) == 0); + + return (st_reg.status & TPM_RECEIVE_DATA_AVAILABLE) == 0 ? + E_TIMEOUT : 0; +} + +/* TPM API + */ +int tpm_status_v03(int *ready_write, int *ready_read, size_t *p_len) +{ + t_inf_stat_reg reg; + + TPM_CHECK(tpm_i2c_read_status(®)); + /* exception case in prototype spec, error + */ + if (reg.status == 0xff && reg.len_h == 0xff && reg.len_l == 0xff) + return E_GENERAL; + /* verify status checksum + */ + if ((reg.status ^ reg.len_h ^ reg.len_l) != reg.checksum) + return E_CHECKSUM; + /* data available + */ + if (ready_read) + *ready_read = (reg.status & TPM_RECEIVE_DATA_AVAILABLE) ? 1 : 0; + /* data length + */ + if (p_len) { + if (*ready_read) + *p_len = ((size_t)reg.len_h << 8) + (size_t)reg.len_l; + else + *p_len = 0; + } + /* device writable + */ + if (ready_write) + *ready_write = (reg.status & TPM_TRANSMIT_FIFO_NOTFULL) ? 1 : 0; + return 0; +} + + +int tpm_init_v03(void) +{ + int ready_write = 0, ready_read = 0; + size_t read_len = 0; + int ret_code; + #if defined(CONFIG_I2C_MULTI_BUS) + i2c_set_bus_num(CONFIG_INFINEON_TPM_I2C_BUS); + #endif + ret_code = i2c_probe(INFINEON_TPM_CHIP); + #ifdef VBOOT_DEBUG + printf("v03 probe : %s\n", ret_code ? "N/A" : "found"); + #endif /* VBOOT_DEBUG */ + if (ret_code) + return ret_code; + ret_code = tpm_status_v03(&ready_write, &ready_read, &read_len); + #ifdef VBOOT_DEBUG + printf("status : %d\n\tw[%c] r[%c : %u]\n", ret_code, + ready_write ? 'y' : 'n', + ready_read ? 'y' : 'n', read_len); + #endif /* VBOOT_DEBUG */ + if (ret_code) + return ret_code; + TPM_CHECK(tpm_prepare_write(TIMEOUT_WRITE_MS)); + return 0; +} + +int tpm_sendrecv_v03(const uint8_t *sendbuf, size_t buf_size, uint8_t *recvbuf, + size_t *recv_len) +{ + int ready_write = 0, ready_read = 0; + size_t read_length = 0; + TPM_CHECK(tpm_prepare_write(TIMEOUT_WRITE_MS)); + TPM_CHECK(tpm_i2c_write_data(sendbuf, buf_size)); + TPM_CHECK(tpm_prepare_read(TIMEOUT_READ_MS)); + TPM_CHECK(tpm_status_v03(&ready_write, &ready_read, &read_length)); + if (read_length == 0) + return E_GENERAL; + if (recv_len) { + /* *recv_len sets the maximum data can be feched + * if *recv_len == 0, means the buffer is large enough to read any tpm + * response + */ + if (*recv_len != 0 && *recv_len < read_length) + return E_SIZE; + } + if (recvbuf) { + TPM_CHECK(tpm_i2c_read_data(recvbuf, read_length, NULL)); + /* update recv_len only on success */ + if (recv_len) + *recv_len = read_length; + } else { + /* discard data in read buffer */ + TPM_CHECK(tpm_prepare_write(TIMEOUT_WRITE_MS)); + } + return 0; +} + diff --git a/drivers/tpm/slb9635_i2c/tpm_tis_i2c.c b/drivers/tpm/slb9635_i2c/tpm_tis_i2c.c new file mode 100644 index 00000000000..9874827b39b --- /dev/null +++ b/drivers/tpm/slb9635_i2c/tpm_tis_i2c.c @@ -0,0 +1,568 @@ +/* + * Copyright (C) 2011 Infineon Technologies + * + * Authors: + * Peter Huewe <huewe.external@infineon.com> + * + * Description: + * Device driver for TCG/TCPA TPM (trusted platform module). + * Specifications at www.trustedcomputinggroup.org + * + * This device driver implements the TPM interface as defined in + * the TCG TPM Interface Spec version 1.2, revision 1.0 and the + * Infineon I2C Protocol Stack Specification v0.20. + * + * It is based on the Linux kernel driver tpm.c from Leendert van + * Dorn, Dave Safford, Reiner Sailer, and Kyleen Hall. + * + * Version: 2.1.1 + * + * See file CREDITS for list of people who contributed to this + * project. + * + * This program is free software; you can redistribute it and/or + * modify it under the terms of the GNU General Public License as + * published by the Free Software Foundation, version 2 of the + * License. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program; if not, write to the Free Software + * Foundation, Inc., 59 Temple Place, Suite 330, Boston, + * MA 02111-1307 USA + */ + +#include <common.h> +#include <i2c.h> +#include <linux/types.h> + +#include "compatibility.h" +#include "tpm.h" + +/* max. buffer size supported by our tpm */ +#ifdef TPM_BUFSIZE +#undef TPM_BUFSIZE +#endif +#define TPM_BUFSIZE 1260 +/* Address of the TPM on the I2C bus */ +#define TPM_I2C_ADDR 0x20 +/* max. number of iterations after i2c NAK */ +#define MAX_COUNT 3 + +#define SLEEP_DURATION 60 /*in usec*/ + +/* max. number of iterations after i2c NAK for 'long' commands + * we need this especially for sending TPM_READY, since the cleanup after the + * transtion to the ready state may take some time, but it is unpredictable + * how long it will take. + */ +#define MAX_COUNT_LONG 50 + +#define SLEEP_DURATION_LONG 210 /* in usec */ + +/* expected value for DIDVID register */ +#define TPM_TIS_I2C_DID_VID 0x000b15d1L + +/* Structure to store I2C TPM specific stuff */ +struct tpm_inf_dev { + uint addr; + u8 buf[TPM_BUFSIZE + sizeof(u8)]; /* max. buffer size + addr */ +}; + +static struct tpm_inf_dev tpm_dev = { + .addr = TPM_I2C_ADDR +}; + +/* I2C Read/Write Functions from U-Boot +* Unfortunately we have to use these functions directly, due to the wakeup +* behaviour of the tpm +*/ +extern int i2c_read_data(uchar chip, uchar *buffer, int len); +extern int i2c_write_data(uchar chip, uchar *buffer, int len); + +/* + * iic_tpm_read() - read from TPM register + * @addr: register address to read from + * @buffer: provided by caller + * @len: number of bytes to read + * + * Read len bytes from TPM register and put them into + * buffer (little-endian format, i.e. first byte is put into buffer[0]). + * + * NOTE: TPM is big-endian for multi-byte values. Multi-byte + * values have to be swapped. + * + * Return -EIO on error, 0 on success. + */ +int iic_tpm_read(u8 addr, u8 *buffer, size_t len) +{ + int rc; + int count; + uint myaddr = addr; + /* we have to use uint here, uchar hangs the board */ + + for (count = 0; count < MAX_COUNT; count++) { + rc = i2c_write_data(tpm_dev.addr, (uchar *) &myaddr, 1); + if (rc == 0) + break; /*success, break to skip sleep*/ + + udelay(SLEEP_DURATION); + } + + if (rc) + return -rc; + + /* After the TPM has successfully received the register address it needs + * some time, thus we're sleeping here again, before retrieving the data + */ + for (count = 0; count < MAX_COUNT; count++) { + udelay(SLEEP_DURATION); + rc = i2c_read_data(tpm_dev.addr, buffer, len); + if (rc == 0) + break; /*success, break to skip sleep*/ + + } + + if (rc) + return -rc; + + return 0; +} + +static int iic_tpm_write_generic(u8 addr, u8 *buffer, size_t len, + unsigned int sleep_time, + u8 max_count) +{ + int rc = 0; + int count; + + /* prepare send buffer */ + tpm_dev.buf[0] = addr; + memcpy(&(tpm_dev.buf[1]), buffer, len); + + for (count = 0; count < max_count; count++) { + rc = i2c_write_data(tpm_dev.addr, tpm_dev.buf, len + 1); + if (rc == 0) + break; /*success, break to skip sleep*/ + + udelay(sleep_time); + } + + if (rc) + return -rc; + + return 0; +} + +/* + * iic_tpm_write() - write to TPM register + * @addr: register address to write to + * @buffer: containing data to be written + * @len: number of bytes to write + * + * Write len bytes from provided buffer to TPM register (little + * endian format, i.e. buffer[0] is written as first byte). + * + * NOTE: TPM is big-endian for multi-byte values. Multi-byte + * values have to be swapped. + * + * NOTE: use this function instead of the iic_tpm_write_generic function. + * + * Return -EIO on error, 0 on success + */ +static int iic_tpm_write(u8 addr, u8 *buffer, size_t len) +{ + return iic_tpm_write_generic(addr, buffer, len, SLEEP_DURATION, + MAX_COUNT); +} + +/* + * This function is needed especially for the cleanup situation after + * sending TPM_READY + * */ +static int iic_tpm_write_long(u8 addr, u8 *buffer, size_t len) +{ + return iic_tpm_write_generic(addr, buffer, len, SLEEP_DURATION_LONG, + MAX_COUNT_LONG); +} + +#define TPM_HEADER_SIZE 10 + +enum tis_access { + TPM_ACCESS_VALID = 0x80, + TPM_ACCESS_ACTIVE_LOCALITY = 0x20, + TPM_ACCESS_REQUEST_PENDING = 0x04, + TPM_ACCESS_REQUEST_USE = 0x02, +}; + +enum tis_status { + TPM_STS_VALID = 0x80, + TPM_STS_COMMAND_READY = 0x40, + TPM_STS_GO = 0x20, + TPM_STS_DATA_AVAIL = 0x10, + TPM_STS_DATA_EXPECT = 0x08, +}; + +enum tis_defaults { + TIS_SHORT_TIMEOUT = 750, /* ms */ + TIS_LONG_TIMEOUT = 2000, /* 2 sec */ +}; + +#define TPM_ACCESS(l) (0x0000 | ((l) << 4)) +#define TPM_STS(l) (0x0001 | ((l) << 4)) +#define TPM_DATA_FIFO(l) (0x0005 | ((l) << 4)) +#define TPM_DID_VID(l) (0x0006 | ((l) << 4)) + +static int check_locality(struct tpm_chip *chip, int loc) +{ + u8 buf; + int rc; + + rc = iic_tpm_read(TPM_ACCESS(loc), &buf, 1); + if (rc < 0) + return rc; + + if ((buf & (TPM_ACCESS_ACTIVE_LOCALITY | TPM_ACCESS_VALID)) == + (TPM_ACCESS_ACTIVE_LOCALITY | TPM_ACCESS_VALID)) { + chip->vendor.locality = loc; + return loc; + } + + return -1; +} + +static void release_locality(struct tpm_chip *chip, int loc, int force) +{ + u8 buf; + if (iic_tpm_read(TPM_ACCESS(loc), &buf, 1) < 0) + return; + + if (force || (buf & (TPM_ACCESS_REQUEST_PENDING | TPM_ACCESS_VALID)) == + (TPM_ACCESS_REQUEST_PENDING | TPM_ACCESS_VALID)) { + buf = TPM_ACCESS_ACTIVE_LOCALITY; + iic_tpm_write(TPM_ACCESS(loc), &buf, 1); + } +} + +static int request_locality(struct tpm_chip *chip, int loc) +{ + unsigned long start, stop; + u8 buf = TPM_ACCESS_REQUEST_USE; + + if (check_locality(chip, loc) >= 0) + return loc; /* we already have the locality */ + + iic_tpm_write(TPM_ACCESS(loc), &buf, 1); + + /* wait for burstcount */ + start = get_timer(0); + stop = chip->vendor.timeout_a; + do { + if (check_locality(chip, loc) >= 0) + return loc; + msleep(TPM_TIMEOUT); + } while (get_timer(start) < stop); + + return -1; +} + +static u8 tpm_tis_i2c_status(struct tpm_chip *chip) +{ + /* NOTE: since i2c read may fail, return 0 in this case --> time-out */ + u8 buf; + if (iic_tpm_read(TPM_STS(chip->vendor.locality), &buf, 1) < 0) + return 0; + else + return buf; +} + +static void tpm_tis_i2c_ready(struct tpm_chip *chip) +{ + /* this causes the current command to be aborted */ + u8 buf = TPM_STS_COMMAND_READY; + iic_tpm_write_long(TPM_STS(chip->vendor.locality), &buf, 1); +} + +static ssize_t get_burstcount(struct tpm_chip *chip) +{ + unsigned long start, stop; + ssize_t burstcnt; + u8 buf[3]; + + /* wait for burstcount */ + /* which timeout value, spec has 2 answers (c & d) */ + start = get_timer(0); + stop = chip->vendor.timeout_d; + do { + /* Note: STS is little endian */ + if (iic_tpm_read(TPM_STS(chip->vendor.locality) + 1, buf, 3) < 0) + burstcnt = 0; + else + burstcnt = (buf[2] << 16) + (buf[1] << 8) + buf[0]; + + if (burstcnt) + return burstcnt; + msleep(TPM_TIMEOUT); + } while (get_timer(start) < stop); + return -EBUSY; +} + +static int wait_for_stat(struct tpm_chip *chip, u8 mask, unsigned long timeout, + int *status) +{ + unsigned long start, stop; + + /* check current status */ + *status = tpm_tis_i2c_status(chip); + if ((*status & mask) == mask) + return 0; + + start = get_timer(0); + stop = timeout; + do { + msleep(TPM_TIMEOUT); + *status = tpm_tis_i2c_status(chip); + if ((*status & mask) == mask) + return 0; + + } while (get_timer(start) < stop); + + return -ETIME; +} + +static int recv_data(struct tpm_chip *chip, u8 *buf, size_t count) +{ + size_t size = 0; + ssize_t burstcnt; + int rc; + + while (size < count) { + burstcnt = get_burstcount(chip); + + /* burstcount < 0 = tpm is busy */ + if (burstcnt < 0) + return burstcnt; + + /* limit received data to max. left */ + if (burstcnt > (count - size)) + burstcnt = count - size; + + rc = iic_tpm_read(TPM_DATA_FIFO(chip->vendor.locality), + &(buf[size]), + burstcnt); + if (rc == 0) + size += burstcnt; + + } + return size; +} + +static int tpm_tis_i2c_recv(struct tpm_chip *chip, u8 *buf, size_t count) +{ + int size = 0; + int expected, status; + + if (count < TPM_HEADER_SIZE) { + size = -EIO; + goto out; + } + + /* read first 10 bytes, including tag, paramsize, and result */ + size = recv_data(chip, buf, TPM_HEADER_SIZE); + if (size < TPM_HEADER_SIZE) { + dev_err(chip->dev, "Unable to read header\n"); + goto out; + } + + expected = get_unaligned_be32(buf + TPM_RSP_SIZE_BYTE); + if ((size_t)expected > count) { + size = -EIO; + goto out; + } + + size += recv_data(chip, &buf[TPM_HEADER_SIZE], + expected - TPM_HEADER_SIZE); + if (size < expected) { + dev_err(chip->dev, "Unable to read remainder of result\n"); + size = -ETIME; + goto out; + } + + wait_for_stat(chip, TPM_STS_VALID, chip->vendor.timeout_c, &status); + if (status & TPM_STS_DATA_AVAIL) { /* retry? */ + dev_err(chip->dev, "Error left over data\n"); + size = -EIO; + goto out; + } + +out: + tpm_tis_i2c_ready(chip); + /* The TPM needs some time to clean up here, + * so we sleep rather than keeping the bus busy + */ + msleep(2); + release_locality(chip, chip->vendor.locality, 0); + + return size; +} + +static int tpm_tis_i2c_send(struct tpm_chip *chip, u8 *buf, size_t len) +{ + int rc, status; + ssize_t burstcnt; + size_t count = 0; + u8 sts = TPM_STS_GO; + + if (len > TPM_BUFSIZE) + return -E2BIG; /* command is too long for our tpm, sorry */ + + if (request_locality(chip, 0) < 0) + return -EBUSY; + + status = tpm_tis_i2c_status(chip); + if ((status & TPM_STS_COMMAND_READY) == 0) { + tpm_tis_i2c_ready(chip); + if (wait_for_stat + (chip, TPM_STS_COMMAND_READY, + chip->vendor.timeout_b, &status) < 0) { + rc = -ETIME; + goto out_err; + } + } + + while (count < len - 1) { + burstcnt = get_burstcount(chip); + + /* burstcount < 0 = tpm is busy */ + if (burstcnt < 0) + return burstcnt; + + if (burstcnt > (len-1-count)) + burstcnt = len-1-count; + +#ifdef CONFIG_TPM_I2C_BURST_LIMITATION + if (burstcnt > CONFIG_TPM_I2C_BURST_LIMITATION) + burstcnt = CONFIG_TPM_I2C_BURST_LIMITATION; +#endif /* CONFIG_TPM_I2C_BURST_LIMITATION */ + + rc = iic_tpm_write(TPM_DATA_FIFO(chip->vendor.locality), + &(buf[count]), burstcnt); + if (rc == 0) + count += burstcnt; + + wait_for_stat(chip, TPM_STS_VALID, + chip->vendor.timeout_c, &status); + + if ((status & TPM_STS_DATA_EXPECT) == 0) { + rc = -EIO; + goto out_err; + } + + } + + /* write last byte */ + iic_tpm_write(TPM_DATA_FIFO(chip->vendor.locality), &(buf[count]), 1); + wait_for_stat(chip, TPM_STS_VALID, chip->vendor.timeout_c, &status); + if ((status & TPM_STS_DATA_EXPECT) != 0) { + rc = -EIO; + goto out_err; + } + + /* go and do it */ + iic_tpm_write(TPM_STS(chip->vendor.locality), &sts, 1); + + return len; +out_err: + tpm_tis_i2c_ready(chip); + /* The TPM needs some time to clean up here, + * so we sleep rather than keeping the bus busy + */ + msleep(2); + release_locality(chip, chip->vendor.locality, 0); + + return rc; +} + +static struct tpm_vendor_specific tpm_tis_i2c = { + .status = tpm_tis_i2c_status, + .recv = tpm_tis_i2c_recv, + .send = tpm_tis_i2c_send, + .cancel = tpm_tis_i2c_ready, + .req_complete_mask = TPM_STS_DATA_AVAIL | TPM_STS_VALID, + .req_complete_val = TPM_STS_DATA_AVAIL | TPM_STS_VALID, + .req_canceled = TPM_STS_COMMAND_READY, +}; + +/* initialisation of i2c tpm */ + + +int tpm_vendor_init(uint32_t dev_addr) +{ + u32 vendor; + uint old_addr; + int rc = 0; + struct tpm_chip *chip; + + old_addr = tpm_dev.addr; + if (dev_addr != 0) + tpm_dev.addr = dev_addr; + + chip = tpm_register_hardware(&tpm_tis_i2c); + if (chip < 0) { + rc = -ENODEV; + goto out_err; + } + + /* Disable interrupts (not supported) */ + chip->vendor.irq = 0; + + /* Default timeouts */ + chip->vendor.timeout_a = TIS_SHORT_TIMEOUT; + chip->vendor.timeout_b = TIS_LONG_TIMEOUT; + chip->vendor.timeout_c = TIS_SHORT_TIMEOUT; + chip->vendor.timeout_d = TIS_SHORT_TIMEOUT; + + if (request_locality(chip, 0) != 0) { + rc = -ENODEV; + goto out_err; + } + + /* read four bytes from DID_VID register */ + if (iic_tpm_read(TPM_DID_VID(0), (uchar *)&vendor, 4) < 0) { + rc = -EIO; + goto out_release; + } + + /* create DID_VID register value, after swapping to little-endian */ + vendor = be32_to_cpu(vendor); + + if (vendor != TPM_TIS_I2C_DID_VID) { + rc = -ENODEV; + goto out_release; + } + + dev_info(dev, "1.2 TPM (device-id 0x%X)\n", vendor >> 16); + + /* + * A timeout query to TPM can be placed here. + * Standard timeout values are used so far + */ + + return 0; + +out_release: + release_locality(chip, 0, 1); + +out_err: + tpm_dev.addr = old_addr; + return rc; +} + +void tpm_vendor_cleanup(struct tpm_chip *chip) +{ + release_locality(chip, chip->vendor.locality, 1); +} |