]>
Commit | Line | Data |
---|---|---|
1da177e4 LT |
1 | /* |
2 | * Copyright (C) 2004 IBM Corporation | |
a74f8b36 | 3 | * Copyright (C) 2015 Intel Corporation |
1da177e4 LT |
4 | * |
5 | * Authors: | |
6 | * Leendert van Doorn <leendert@watson.ibm.com> | |
7 | * Dave Safford <safford@watson.ibm.com> | |
8 | * Reiner Sailer <sailer@watson.ibm.com> | |
9 | * Kylene Hall <kjhall@us.ibm.com> | |
10 | * | |
8e81cc13 | 11 | * Maintained by: <tpmdd-devel@lists.sourceforge.net> |
1da177e4 LT |
12 | * |
13 | * Device driver for TCG/TCPA TPM (trusted platform module). | |
3b09825d | 14 | * Specifications at www.trustedcomputinggroup.org |
1da177e4 LT |
15 | * |
16 | * This program is free software; you can redistribute it and/or | |
17 | * modify it under the terms of the GNU General Public License as | |
18 | * published by the Free Software Foundation, version 2 of the | |
19 | * License. | |
3b09825d | 20 | * |
1da177e4 | 21 | */ |
d2efee6e CR |
22 | |
23 | #ifndef __TPM_H__ | |
24 | #define __TPM_H__ | |
25 | ||
1da177e4 | 26 | #include <linux/module.h> |
1da177e4 LT |
27 | #include <linux/delay.h> |
28 | #include <linux/fs.h> | |
6e592a06 | 29 | #include <linux/hw_random.h> |
d081d470 | 30 | #include <linux/mutex.h> |
914e2637 | 31 | #include <linux/sched.h> |
bbc5b212 | 32 | #include <linux/platform_device.h> |
276ad0c1 | 33 | #include <linux/io.h> |
659aaf2b | 34 | #include <linux/tpm.h> |
0dc55365 | 35 | #include <linux/acpi.h> |
313d21ee | 36 | #include <linux/cdev.h> |
a74f8b36 | 37 | #include <linux/highmem.h> |
fd3ec366 | 38 | #include <linux/tpm_eventlog.h> |
c1f92b4b | 39 | #include <crypto/hash_info.h> |
1da177e4 | 40 | |
5e572cab AS |
41 | #ifdef CONFIG_X86 |
42 | #include <asm/intel-family.h> | |
43 | #endif | |
44 | ||
41ab999c KY |
45 | enum tpm_const { |
46 | TPM_MINOR = 224, /* officially assigned */ | |
47 | TPM_BUFSIZE = 4096, | |
15516788 | 48 | TPM_NUM_DEVICES = 65536, |
32d33b29 | 49 | TPM_RETRY = 50, /* 5 seconds */ |
cd9b7631 | 50 | TPM_NUM_EVENT_LOG_FILES = 3, |
41ab999c KY |
51 | }; |
52 | ||
3122a88a KH |
53 | enum tpm_timeout { |
54 | TPM_TIMEOUT = 5, /* msecs */ | |
9f3fc7bc | 55 | TPM_TIMEOUT_RETRY = 100, /* msecs */ |
59f5a6b0 | 56 | TPM_TIMEOUT_RANGE_US = 300, /* usecs */ |
424eaf91 NJ |
57 | TPM_TIMEOUT_POLL = 1, /* msecs */ |
58 | TPM_TIMEOUT_USECS_MIN = 100, /* usecs */ | |
59 | TPM_TIMEOUT_USECS_MAX = 500 /* usecs */ | |
3122a88a | 60 | }; |
1da177e4 LT |
61 | |
62 | /* TPM addresses */ | |
3122a88a | 63 | enum tpm_addr { |
daacdfa6 | 64 | TPM_SUPERIO_ADDR = 0x2E, |
3122a88a | 65 | TPM_ADDR = 0x4E, |
3122a88a KH |
66 | }; |
67 | ||
000a07b0 JG |
68 | /* Indexes the duration array */ |
69 | enum tpm_duration { | |
70 | TPM_SHORT = 0, | |
71 | TPM_MEDIUM = 1, | |
72 | TPM_LONG = 2, | |
076d3564 | 73 | TPM_LONG_LONG = 3, |
000a07b0 | 74 | TPM_UNDEFINED, |
076d3564 | 75 | TPM_NUM_DURATIONS = TPM_UNDEFINED, |
000a07b0 JG |
76 | }; |
77 | ||
32d33b29 | 78 | #define TPM_WARN_RETRY 0x800 |
68d6e671 | 79 | #define TPM_WARN_DOING_SELFTEST 0x802 |
be405411 SB |
80 | #define TPM_ERR_DEACTIVATED 0x6 |
81 | #define TPM_ERR_DISABLED 0x7 | |
c584af19 | 82 | #define TPM_ERR_INVALID_POSTINIT 38 |
be405411 | 83 | |
b9e3238a | 84 | #define TPM_HEADER_SIZE 10 |
7a1d7e6d JS |
85 | |
86 | enum tpm2_const { | |
076d3564 TW |
87 | TPM2_PLATFORM_PCR = 24, |
88 | TPM2_PCR_SELECT_MIN = ((TPM2_PLATFORM_PCR + 7) / 8), | |
89 | }; | |
90 | ||
91 | enum tpm2_timeouts { | |
92 | TPM2_TIMEOUT_A = 750, | |
93 | TPM2_TIMEOUT_B = 2000, | |
94 | TPM2_TIMEOUT_C = 200, | |
95 | TPM2_TIMEOUT_D = 30, | |
96 | TPM2_DURATION_SHORT = 20, | |
97 | TPM2_DURATION_MEDIUM = 750, | |
98 | TPM2_DURATION_LONG = 2000, | |
99 | TPM2_DURATION_LONG_LONG = 300000, | |
100 | TPM2_DURATION_DEFAULT = 120000, | |
7a1d7e6d JS |
101 | }; |
102 | ||
103 | enum tpm2_structures { | |
104 | TPM2_ST_NO_SESSIONS = 0x8001, | |
105 | TPM2_ST_SESSIONS = 0x8002, | |
106 | }; | |
107 | ||
095531f8 JMC |
108 | /* Indicates from what layer of the software stack the error comes from */ |
109 | #define TSS2_RC_LAYER_SHIFT 16 | |
110 | #define TSS2_RESMGR_TPM_RC_LAYER (11 << TSS2_RC_LAYER_SHIFT) | |
111 | ||
7a1d7e6d | 112 | enum tpm2_return_codes { |
745b361e | 113 | TPM2_RC_SUCCESS = 0x0000, |
5ca4c20c | 114 | TPM2_RC_HASH = 0x0083, /* RC_FMT1 */ |
745b361e | 115 | TPM2_RC_HANDLE = 0x008B, |
5ca4c20c | 116 | TPM2_RC_INITIALIZE = 0x0100, /* RC_VER1 */ |
2be8ffed | 117 | TPM2_RC_FAILURE = 0x0101, |
7a1d7e6d | 118 | TPM2_RC_DISABLED = 0x0120, |
095531f8 | 119 | TPM2_RC_COMMAND_CODE = 0x0143, |
5ca4c20c | 120 | TPM2_RC_TESTING = 0x090A, /* RC_WARN */ |
745b361e | 121 | TPM2_RC_REFERENCE_H0 = 0x0910, |
e2fb992d | 122 | TPM2_RC_RETRY = 0x0922, |
7a1d7e6d JS |
123 | }; |
124 | ||
125 | enum tpm2_algorithms { | |
1db15344 | 126 | TPM2_ALG_ERROR = 0x0000, |
7a1d7e6d | 127 | TPM2_ALG_SHA1 = 0x0004, |
954650ef JS |
128 | TPM2_ALG_KEYEDHASH = 0x0008, |
129 | TPM2_ALG_SHA256 = 0x000B, | |
5ca4c20c JS |
130 | TPM2_ALG_SHA384 = 0x000C, |
131 | TPM2_ALG_SHA512 = 0x000D, | |
132 | TPM2_ALG_NULL = 0x0010, | |
133 | TPM2_ALG_SM3_256 = 0x0012, | |
7a1d7e6d JS |
134 | }; |
135 | ||
136 | enum tpm2_command_codes { | |
899102bc TW |
137 | TPM2_CC_FIRST = 0x011F, |
138 | TPM2_CC_HIERARCHY_CONTROL = 0x0121, | |
139 | TPM2_CC_HIERARCHY_CHANGE_AUTH = 0x0129, | |
140 | TPM2_CC_CREATE_PRIMARY = 0x0131, | |
141 | TPM2_CC_SEQUENCE_COMPLETE = 0x013E, | |
142 | TPM2_CC_SELF_TEST = 0x0143, | |
143 | TPM2_CC_STARTUP = 0x0144, | |
144 | TPM2_CC_SHUTDOWN = 0x0145, | |
145 | TPM2_CC_NV_READ = 0x014E, | |
146 | TPM2_CC_CREATE = 0x0153, | |
147 | TPM2_CC_LOAD = 0x0157, | |
148 | TPM2_CC_SEQUENCE_UPDATE = 0x015C, | |
149 | TPM2_CC_UNSEAL = 0x015E, | |
150 | TPM2_CC_CONTEXT_LOAD = 0x0161, | |
151 | TPM2_CC_CONTEXT_SAVE = 0x0162, | |
152 | TPM2_CC_FLUSH_CONTEXT = 0x0165, | |
153 | TPM2_CC_VERIFY_SIGNATURE = 0x0177, | |
154 | TPM2_CC_GET_CAPABILITY = 0x017A, | |
155 | TPM2_CC_GET_RANDOM = 0x017B, | |
156 | TPM2_CC_PCR_READ = 0x017E, | |
157 | TPM2_CC_PCR_EXTEND = 0x0182, | |
158 | TPM2_CC_EVENT_SEQUENCE_COMPLETE = 0x0185, | |
159 | TPM2_CC_HASH_SEQUENCE_START = 0x0186, | |
160 | TPM2_CC_CREATE_LOADED = 0x0191, | |
161 | TPM2_CC_LAST = 0x0193, /* Spec 1.36 */ | |
7a1d7e6d JS |
162 | }; |
163 | ||
164 | enum tpm2_permanent_handles { | |
165 | TPM2_RS_PW = 0x40000009, | |
166 | }; | |
167 | ||
168 | enum tpm2_capabilities { | |
745b361e | 169 | TPM2_CAP_HANDLES = 1, |
58472f5c | 170 | TPM2_CAP_COMMANDS = 2, |
1db15344 | 171 | TPM2_CAP_PCRS = 5, |
7a1d7e6d JS |
172 | TPM2_CAP_TPM_PROPERTIES = 6, |
173 | }; | |
174 | ||
58472f5c JS |
175 | enum tpm2_properties { |
176 | TPM_PT_TOTAL_COMMANDS = 0x0129, | |
177 | }; | |
178 | ||
7a1d7e6d JS |
179 | enum tpm2_startup_types { |
180 | TPM2_SU_CLEAR = 0x0000, | |
181 | TPM2_SU_STATE = 0x0001, | |
182 | }; | |
183 | ||
58472f5c JS |
184 | enum tpm2_cc_attrs { |
185 | TPM2_CC_ATTR_CHANDLES = 25, | |
186 | TPM2_CC_ATTR_RHANDLE = 28, | |
187 | }; | |
188 | ||
4e401fb0 | 189 | #define TPM_VID_INTEL 0x8086 |
1f866057 SB |
190 | #define TPM_VID_WINBOND 0x1050 |
191 | #define TPM_VID_STM 0x104A | |
4e401fb0 | 192 | |
0dc55365 JS |
193 | #define TPM_PPI_VERSION_LEN 3 |
194 | ||
745b361e JS |
195 | struct tpm_space { |
196 | u32 context_tbl[3]; | |
197 | u8 *context_buf; | |
4d57856a JB |
198 | u32 session_tbl[3]; |
199 | u8 *session_buf; | |
745b361e JS |
200 | }; |
201 | ||
afb5abc2 | 202 | enum tpm_chip_flags { |
9b774d5c | 203 | TPM_CHIP_FLAG_TPM2 = BIT(1), |
570a3609 | 204 | TPM_CHIP_FLAG_IRQ = BIT(2), |
2f9f5377 | 205 | TPM_CHIP_FLAG_VIRTUAL = BIT(3), |
d1d253cf | 206 | TPM_CHIP_FLAG_HAVE_TIMEOUTS = BIT(4), |
b5d0ebc9 | 207 | TPM_CHIP_FLAG_ALWAYS_POWERED = BIT(5), |
afb5abc2 JS |
208 | }; |
209 | ||
4d23cc32 NJ |
210 | struct tpm_bios_log { |
211 | void *bios_event_log; | |
212 | void *bios_event_log_end; | |
213 | }; | |
214 | ||
748935ee NJ |
215 | struct tpm_chip_seqops { |
216 | struct tpm_chip *chip; | |
217 | const struct seq_operations *seqops; | |
218 | }; | |
219 | ||
1da177e4 | 220 | struct tpm_chip { |
313d21ee | 221 | struct device dev; |
fdc915f7 | 222 | struct device devs; |
313d21ee | 223 | struct cdev cdev; |
fdc915f7 | 224 | struct cdev cdevs; |
313d21ee | 225 | |
4e26195f JG |
226 | /* A driver callback under ops cannot be run unless ops_sem is held |
227 | * (sometimes implicitly, eg for the sysfs code). ops becomes null | |
228 | * when the driver is unregistered, see tpm_try_get_ops. | |
229 | */ | |
230 | struct rw_semaphore ops_sem; | |
5f82e9f0 | 231 | const struct tpm_class_ops *ops; |
4e26195f | 232 | |
748935ee NJ |
233 | struct tpm_bios_log log; |
234 | struct tpm_chip_seqops bin_log_seqops; | |
235 | struct tpm_chip_seqops ascii_log_seqops; | |
236 | ||
afb5abc2 | 237 | unsigned int flags; |
1da177e4 LT |
238 | |
239 | int dev_num; /* /dev/tpm# */ | |
dc36d32c | 240 | unsigned long is_open; /* only one allowed */ |
1da177e4 | 241 | |
6e592a06 JG |
242 | char hwrng_name[64]; |
243 | struct hwrng hwrng; | |
244 | ||
d081d470 | 245 | struct mutex tpm_mutex; /* tpm is processing */ |
1da177e4 | 246 | |
af782f33 CR |
247 | unsigned long timeout_a; /* jiffies */ |
248 | unsigned long timeout_b; /* jiffies */ | |
249 | unsigned long timeout_c; /* jiffies */ | |
250 | unsigned long timeout_d; /* jiffies */ | |
251 | bool timeout_adjusted; | |
076d3564 | 252 | unsigned long duration[TPM_NUM_DURATIONS]; /* jiffies */ |
af782f33 | 253 | bool duration_adjusted; |
1da177e4 | 254 | |
cd9b7631 | 255 | struct dentry *bios_dir[TPM_NUM_EVENT_LOG_FILES]; |
55a82ab3 | 256 | |
062807f2 | 257 | const struct attribute_group *groups[3]; |
9b774d5c | 258 | unsigned int groups_cnt; |
1db15344 NJ |
259 | |
260 | u16 active_banks[7]; | |
062807f2 | 261 | #ifdef CONFIG_ACPI |
0dc55365 JS |
262 | acpi_handle acpi_dev_handle; |
263 | char ppi_version[TPM_PPI_VERSION_LEN + 1]; | |
264 | #endif /* CONFIG_ACPI */ | |
58472f5c | 265 | |
745b361e | 266 | struct tpm_space work_space; |
58472f5c JS |
267 | u32 nr_commands; |
268 | u32 *cc_attrs_tbl; | |
877c57d0 JS |
269 | |
270 | /* active locality */ | |
271 | int locality; | |
1da177e4 LT |
272 | }; |
273 | ||
9b774d5c | 274 | #define to_tpm_chip(d) container_of(d, struct tpm_chip, dev) |
27084efe | 275 | |
08837438 RA |
276 | struct tpm_input_header { |
277 | __be16 tag; | |
278 | __be32 length; | |
279 | __be32 ordinal; | |
348df8db | 280 | } __packed; |
08837438 RA |
281 | |
282 | struct tpm_output_header { | |
283 | __be16 tag; | |
284 | __be32 length; | |
285 | __be32 return_code; | |
348df8db | 286 | } __packed; |
08837438 | 287 | |
06e93279 | 288 | #define TPM_TAG_RQU_COMMAND 193 |
000a07b0 | 289 | |
08837438 RA |
290 | struct stclear_flags_t { |
291 | __be16 tag; | |
292 | u8 deactivated; | |
293 | u8 disableForceClear; | |
294 | u8 physicalPresence; | |
295 | u8 physicalPresenceLock; | |
296 | u8 bGlobalLock; | |
348df8db | 297 | } __packed; |
08837438 RA |
298 | |
299 | struct tpm_version_t { | |
300 | u8 Major; | |
301 | u8 Minor; | |
302 | u8 revMajor; | |
303 | u8 revMinor; | |
348df8db | 304 | } __packed; |
08837438 RA |
305 | |
306 | struct tpm_version_1_2_t { | |
307 | __be16 tag; | |
308 | u8 Major; | |
309 | u8 Minor; | |
310 | u8 revMajor; | |
311 | u8 revMinor; | |
348df8db | 312 | } __packed; |
08837438 RA |
313 | |
314 | struct timeout_t { | |
315 | __be32 a; | |
316 | __be32 b; | |
317 | __be32 c; | |
318 | __be32 d; | |
348df8db | 319 | } __packed; |
08837438 RA |
320 | |
321 | struct duration_t { | |
322 | __be32 tpm_short; | |
323 | __be32 tpm_medium; | |
324 | __be32 tpm_long; | |
348df8db | 325 | } __packed; |
08837438 RA |
326 | |
327 | struct permanent_flags_t { | |
328 | __be16 tag; | |
329 | u8 disable; | |
330 | u8 ownership; | |
331 | u8 deactivated; | |
332 | u8 readPubek; | |
333 | u8 disableOwnerClear; | |
334 | u8 allowMaintenance; | |
335 | u8 physicalPresenceLifetimeLock; | |
336 | u8 physicalPresenceHWEnable; | |
337 | u8 physicalPresenceCMDEnable; | |
338 | u8 CEKPUsed; | |
339 | u8 TPMpost; | |
340 | u8 TPMpostLock; | |
341 | u8 FIPS; | |
342 | u8 operator; | |
343 | u8 enableRevokeEK; | |
344 | u8 nvLocked; | |
345 | u8 readSRKPub; | |
346 | u8 tpmEstablished; | |
347 | u8 maintenanceDone; | |
348 | u8 disableFullDALogicInfo; | |
348df8db | 349 | } __packed; |
08837438 RA |
350 | |
351 | typedef union { | |
352 | struct permanent_flags_t perm_flags; | |
353 | struct stclear_flags_t stclear_flags; | |
a118cf2a | 354 | __u8 owned; |
08837438 RA |
355 | __be32 num_pcrs; |
356 | struct tpm_version_t tpm_version; | |
357 | struct tpm_version_1_2_t tpm_version_1_2; | |
358 | __be32 manufacturer_id; | |
359 | struct timeout_t timeout; | |
360 | struct duration_t duration; | |
361 | } cap_t; | |
362 | ||
000a07b0 | 363 | enum tpm_capabilities { |
84fda152 JS |
364 | TPM_CAP_FLAG = 4, |
365 | TPM_CAP_PROP = 5, | |
366 | TPM_CAP_VERSION_1_1 = 0x06, | |
367 | TPM_CAP_VERSION_1_2 = 0x1A, | |
000a07b0 JG |
368 | }; |
369 | ||
370 | enum tpm_sub_capabilities { | |
84fda152 JS |
371 | TPM_CAP_PROP_PCR = 0x101, |
372 | TPM_CAP_PROP_MANUFACTURER = 0x103, | |
373 | TPM_CAP_FLAG_PERM = 0x108, | |
374 | TPM_CAP_FLAG_VOL = 0x109, | |
375 | TPM_CAP_PROP_OWNER = 0x111, | |
376 | TPM_CAP_PROP_TIS_TIMEOUT = 0x115, | |
377 | TPM_CAP_PROP_TIS_DURATION = 0x120, | |
000a07b0 JG |
378 | }; |
379 | ||
08837438 RA |
380 | typedef union { |
381 | struct tpm_input_header in; | |
382 | struct tpm_output_header out; | |
383 | } tpm_cmd_header; | |
384 | ||
659aaf2b RA |
385 | struct tpm_pcrread_out { |
386 | u8 pcr_result[TPM_DIGEST_SIZE]; | |
348df8db | 387 | } __packed; |
659aaf2b RA |
388 | |
389 | struct tpm_pcrread_in { | |
390 | __be32 pcr_idx; | |
348df8db | 391 | } __packed; |
659aaf2b | 392 | |
41ab999c KY |
393 | /* 128 bytes is an arbitrary cap. This could be as large as TPM_BUFSIZE - 18 |
394 | * bytes, but 128 is still a relatively large number of random bytes and | |
395 | * anything much bigger causes users of struct tpm_cmd_t to start getting | |
396 | * compiler warnings about stack frame size. */ | |
397 | #define TPM_MAX_RNG_DATA 128 | |
398 | ||
399 | struct tpm_getrandom_out { | |
400 | __be32 rng_data_len; | |
401 | u8 rng_data[TPM_MAX_RNG_DATA]; | |
348df8db | 402 | } __packed; |
41ab999c KY |
403 | |
404 | struct tpm_getrandom_in { | |
405 | __be32 num_bytes; | |
348df8db | 406 | } __packed; |
41ab999c | 407 | |
08837438 | 408 | typedef union { |
659aaf2b RA |
409 | struct tpm_pcrread_in pcrread_in; |
410 | struct tpm_pcrread_out pcrread_out; | |
41ab999c KY |
411 | struct tpm_getrandom_in getrandom_in; |
412 | struct tpm_getrandom_out getrandom_out; | |
08837438 RA |
413 | } tpm_cmd_params; |
414 | ||
415 | struct tpm_cmd_t { | |
416 | tpm_cmd_header header; | |
417 | tpm_cmd_params params; | |
348df8db | 418 | } __packed; |
08837438 | 419 | |
c1f92b4b | 420 | |
a74f8b36 JS |
421 | /* A string buffer type for constructing TPM commands. This is based on the |
422 | * ideas of string buffer code in security/keys/trusted.h but is heap based | |
423 | * in order to keep the stack usage minimal. | |
424 | */ | |
425 | ||
426 | enum tpm_buf_flags { | |
427 | TPM_BUF_OVERFLOW = BIT(0), | |
428 | }; | |
429 | ||
430 | struct tpm_buf { | |
431 | struct page *data_page; | |
432 | unsigned int flags; | |
433 | u8 *data; | |
434 | }; | |
435 | ||
ce63c05b | 436 | static inline void tpm_buf_reset(struct tpm_buf *buf, u16 tag, u32 ordinal) |
a74f8b36 JS |
437 | { |
438 | struct tpm_input_header *head; | |
ce63c05b JS |
439 | head = (struct tpm_input_header *)buf->data; |
440 | head->tag = cpu_to_be16(tag); | |
441 | head->length = cpu_to_be32(sizeof(*head)); | |
442 | head->ordinal = cpu_to_be32(ordinal); | |
443 | } | |
a74f8b36 | 444 | |
ce63c05b JS |
445 | static inline int tpm_buf_init(struct tpm_buf *buf, u16 tag, u32 ordinal) |
446 | { | |
a74f8b36 JS |
447 | buf->data_page = alloc_page(GFP_HIGHUSER); |
448 | if (!buf->data_page) | |
449 | return -ENOMEM; | |
450 | ||
451 | buf->flags = 0; | |
452 | buf->data = kmap(buf->data_page); | |
ce63c05b | 453 | tpm_buf_reset(buf, tag, ordinal); |
a74f8b36 JS |
454 | return 0; |
455 | } | |
456 | ||
457 | static inline void tpm_buf_destroy(struct tpm_buf *buf) | |
458 | { | |
459 | kunmap(buf->data_page); | |
460 | __free_page(buf->data_page); | |
461 | } | |
462 | ||
463 | static inline u32 tpm_buf_length(struct tpm_buf *buf) | |
464 | { | |
465 | struct tpm_input_header *head = (struct tpm_input_header *) buf->data; | |
466 | ||
467 | return be32_to_cpu(head->length); | |
468 | } | |
469 | ||
470 | static inline u16 tpm_buf_tag(struct tpm_buf *buf) | |
471 | { | |
472 | struct tpm_input_header *head = (struct tpm_input_header *) buf->data; | |
473 | ||
474 | return be16_to_cpu(head->tag); | |
475 | } | |
476 | ||
477 | static inline void tpm_buf_append(struct tpm_buf *buf, | |
478 | const unsigned char *new_data, | |
479 | unsigned int new_len) | |
480 | { | |
481 | struct tpm_input_header *head = (struct tpm_input_header *) buf->data; | |
482 | u32 len = tpm_buf_length(buf); | |
483 | ||
484 | /* Return silently if overflow has already happened. */ | |
485 | if (buf->flags & TPM_BUF_OVERFLOW) | |
486 | return; | |
487 | ||
488 | if ((len + new_len) > PAGE_SIZE) { | |
489 | WARN(1, "tpm_buf: overflow\n"); | |
490 | buf->flags |= TPM_BUF_OVERFLOW; | |
491 | return; | |
492 | } | |
493 | ||
494 | memcpy(&buf->data[len], new_data, new_len); | |
495 | head->length = cpu_to_be32(len + new_len); | |
496 | } | |
497 | ||
498 | static inline void tpm_buf_append_u8(struct tpm_buf *buf, const u8 value) | |
499 | { | |
500 | tpm_buf_append(buf, &value, 1); | |
501 | } | |
502 | ||
503 | static inline void tpm_buf_append_u16(struct tpm_buf *buf, const u16 value) | |
504 | { | |
505 | __be16 value2 = cpu_to_be16(value); | |
506 | ||
507 | tpm_buf_append(buf, (u8 *) &value2, 2); | |
508 | } | |
509 | ||
510 | static inline void tpm_buf_append_u32(struct tpm_buf *buf, const u32 value) | |
511 | { | |
512 | __be32 value2 = cpu_to_be32(value); | |
513 | ||
514 | tpm_buf_append(buf, (u8 *) &value2, 4); | |
515 | } | |
516 | ||
313d21ee | 517 | extern struct class *tpm_class; |
fdc915f7 | 518 | extern struct class *tpmrm_class; |
313d21ee JS |
519 | extern dev_t tpm_devt; |
520 | extern const struct file_operations tpm_fops; | |
fdc915f7 | 521 | extern const struct file_operations tpmrm_fops; |
15516788 | 522 | extern struct idr dev_nums_idr; |
313d21ee | 523 | |
627448e8 | 524 | /** |
58bac8cc | 525 | * enum tpm_transmit_flags - flags for tpm_transmit() |
627448e8 | 526 | * |
58bac8cc JS |
527 | * @TPM_TRANSMIT_UNLOCKED: do not lock the chip |
528 | * @TPM_TRANSMIT_NESTED: discard setup steps (power management, | |
529 | * locality) including locking (i.e. implicit | |
530 | * UNLOCKED) | |
627448e8 | 531 | */ |
d4816edf | 532 | enum tpm_transmit_flags { |
58bac8cc JS |
533 | TPM_TRANSMIT_UNLOCKED = BIT(0), |
534 | TPM_TRANSMIT_NESTED = BIT(1), | |
d4816edf JS |
535 | }; |
536 | ||
745b361e JS |
537 | ssize_t tpm_transmit(struct tpm_chip *chip, struct tpm_space *space, |
538 | u8 *buf, size_t bufsiz, unsigned int flags); | |
539 | ssize_t tpm_transmit_cmd(struct tpm_chip *chip, struct tpm_space *space, | |
62c09e12 | 540 | void *buf, size_t bufsiz, |
745b361e | 541 | size_t min_rsp_body_length, unsigned int flags, |
c659af78 | 542 | const char *desc); |
19cbe4f6 | 543 | int tpm_startup(struct tpm_chip *chip); |
d4abd956 | 544 | int tpm_get_timeouts(struct tpm_chip *); |
cae8b441 | 545 | int tpm1_auto_startup(struct tpm_chip *chip); |
d4abd956 | 546 | int tpm_do_selftest(struct tpm_chip *chip); |
70a3199a TW |
547 | |
548 | int tpm1_get_timeouts(struct tpm_chip *chip); | |
b2d6e6de | 549 | unsigned long tpm1_calc_ordinal_duration(struct tpm_chip *chip, u32 ordinal); |
1ad6640c TW |
550 | int tpm1_pcr_extend(struct tpm_chip *chip, int pcr_idx, const u8 *hash, |
551 | const char *log_msg); | |
f4d916b7 TW |
552 | ssize_t tpm1_getcap(struct tpm_chip *chip, u32 subcap_id, cap_t *cap, |
553 | const char *desc, size_t min_cap_length); | |
d856c00f | 554 | unsigned long tpm_calc_ordinal_duration(struct tpm_chip *chip, u32 ordinal); |
d4abd956 JS |
555 | int tpm_pm_suspend(struct device *dev); |
556 | int tpm_pm_resume(struct device *dev); | |
f84fdff0 | 557 | |
9f3fc7bc HA |
558 | static inline void tpm_msleep(unsigned int delay_msec) |
559 | { | |
5ef924d9 NJ |
560 | usleep_range((delay_msec * 1000) - TPM_TIMEOUT_RANGE_US, |
561 | delay_msec * 1000); | |
9f3fc7bc HA |
562 | }; |
563 | ||
fc1d52b7 | 564 | struct tpm_chip *tpm_find_get_ops(struct tpm_chip *chip); |
4e26195f JG |
565 | __must_check int tpm_try_get_ops(struct tpm_chip *chip); |
566 | void tpm_put_ops(struct tpm_chip *chip); | |
567 | ||
d4abd956 JS |
568 | struct tpm_chip *tpm_chip_alloc(struct device *dev, |
569 | const struct tpm_class_ops *ops); | |
570 | struct tpm_chip *tpmm_chip_alloc(struct device *pdev, | |
571 | const struct tpm_class_ops *ops); | |
572 | int tpm_chip_register(struct tpm_chip *chip); | |
573 | void tpm_chip_unregister(struct tpm_chip *chip); | |
afb5abc2 | 574 | |
062807f2 | 575 | void tpm_sysfs_add_device(struct tpm_chip *chip); |
afdba32e | 576 | |
000a07b0 JG |
577 | int tpm_pcr_read_dev(struct tpm_chip *chip, int pcr_idx, u8 *res_buf); |
578 | ||
f84fdff0 | 579 | #ifdef CONFIG_ACPI |
9b774d5c | 580 | extern void tpm_add_ppi(struct tpm_chip *chip); |
f84fdff0 | 581 | #else |
9b774d5c | 582 | static inline void tpm_add_ppi(struct tpm_chip *chip) |
1631cfb7 GW |
583 | { |
584 | } | |
f84fdff0 | 585 | #endif |
7a1d7e6d | 586 | |
2d56c718 | 587 | static inline u32 tpm2_rc_value(u32 rc) |
7d761119 JS |
588 | { |
589 | return (rc & BIT(7)) ? rc & 0xff : rc; | |
590 | } | |
591 | ||
70a3199a | 592 | int tpm2_get_timeouts(struct tpm_chip *chip); |
7a1d7e6d | 593 | int tpm2_pcr_read(struct tpm_chip *chip, int pcr_idx, u8 *res_buf); |
c1f92b4b NJ |
594 | int tpm2_pcr_extend(struct tpm_chip *chip, int pcr_idx, u32 count, |
595 | struct tpm2_digest *digests); | |
ce63c05b | 596 | int tpm2_get_random(struct tpm_chip *chip, u8 *dest, size_t max); |
9aa36b39 JS |
597 | void tpm2_flush_context_cmd(struct tpm_chip *chip, u32 handle, |
598 | unsigned int flags); | |
954650ef JS |
599 | int tpm2_seal_trusted(struct tpm_chip *chip, |
600 | struct trusted_key_payload *payload, | |
601 | struct trusted_key_options *options); | |
602 | int tpm2_unseal_trusted(struct tpm_chip *chip, | |
603 | struct trusted_key_payload *payload, | |
604 | struct trusted_key_options *options); | |
7a1d7e6d JS |
605 | ssize_t tpm2_get_tpm_pt(struct tpm_chip *chip, u32 property_id, |
606 | u32 *value, const char *desc); | |
607 | ||
cae8b441 | 608 | int tpm2_auto_startup(struct tpm_chip *chip); |
d4abd956 JS |
609 | void tpm2_shutdown(struct tpm_chip *chip, u16 shutdown_type); |
610 | unsigned long tpm2_calc_ordinal_duration(struct tpm_chip *chip, u32 ordinal); | |
d4abd956 | 611 | int tpm2_probe(struct tpm_chip *chip); |
58472f5c | 612 | int tpm2_find_cc(struct tpm_chip *chip, u32 cc); |
745b361e | 613 | int tpm2_init_space(struct tpm_space *space); |
4d57856a | 614 | void tpm2_del_space(struct tpm_chip *chip, struct tpm_space *space); |
745b361e JS |
615 | int tpm2_prepare_space(struct tpm_chip *chip, struct tpm_space *space, u32 cc, |
616 | u8 *cmd); | |
617 | int tpm2_commit_space(struct tpm_chip *chip, struct tpm_space *space, | |
618 | u32 cc, u8 *buf, size_t *bufsiz); | |
fd3ec366 | 619 | |
fd3ec366 TW |
620 | int tpm_bios_log_setup(struct tpm_chip *chip); |
621 | void tpm_bios_log_teardown(struct tpm_chip *chip); | |
9e1b74a6 TS |
622 | int tpm_dev_common_init(void); |
623 | void tpm_dev_common_exit(void); | |
d2efee6e | 624 | #endif |