1 // SPDX-License-Identifier: GPL-2.0-only
2 /*
3 * Copyright (C) 2004 IBM Corporation
4 * Copyright (C) 2014 Intel Corporation
5 *
6 * Authors:
7 * Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com>
8 * Leendert van Doorn <leendert@watson.ibm.com>
9 * Dave Safford <safford@watson.ibm.com>
10 * Reiner Sailer <sailer@watson.ibm.com>
11 * Kylene Hall <kjhall@us.ibm.com>
12 *
13 * Maintained by: <tpmdd-devel@lists.sourceforge.net>
14 *
15 * TPM chip management routines.
16 */
17
18 #include <linux/poll.h>
19 #include <linux/slab.h>
20 #include <linux/mutex.h>
21 #include <linux/spinlock.h>
22 #include <linux/freezer.h>
23 #include <linux/major.h>
24 #include <linux/tpm_eventlog.h>
25 #include <linux/hw_random.h>
26 #include "tpm.h"
27
28 DEFINE_IDR(dev_nums_idr);
29 static DEFINE_MUTEX(idr_lock);
30
31 struct class *tpm_class;
32 struct class *tpmrm_class;
33 dev_t tpm_devt;
34
tpm_request_locality(struct tpm_chip * chip)35 static int tpm_request_locality(struct tpm_chip *chip)
36 {
37 int rc;
38
39 if (!chip->ops->request_locality)
40 return 0;
41
42 rc = chip->ops->request_locality(chip, 0);
43 if (rc < 0)
44 return rc;
45
46 chip->locality = rc;
47 return 0;
48 }
49
tpm_relinquish_locality(struct tpm_chip * chip)50 static void tpm_relinquish_locality(struct tpm_chip *chip)
51 {
52 int rc;
53
54 if (!chip->ops->relinquish_locality)
55 return;
56
57 rc = chip->ops->relinquish_locality(chip, chip->locality);
58 if (rc)
59 dev_err(&chip->dev, "%s: : error %d\n", __func__, rc);
60
61 chip->locality = -1;
62 }
63
tpm_cmd_ready(struct tpm_chip * chip)64 static int tpm_cmd_ready(struct tpm_chip *chip)
65 {
66 if (!chip->ops->cmd_ready)
67 return 0;
68
69 return chip->ops->cmd_ready(chip);
70 }
71
tpm_go_idle(struct tpm_chip * chip)72 static int tpm_go_idle(struct tpm_chip *chip)
73 {
74 if (!chip->ops->go_idle)
75 return 0;
76
77 return chip->ops->go_idle(chip);
78 }
79
tpm_clk_enable(struct tpm_chip * chip)80 static void tpm_clk_enable(struct tpm_chip *chip)
81 {
82 if (chip->ops->clk_enable)
83 chip->ops->clk_enable(chip, true);
84 }
85
tpm_clk_disable(struct tpm_chip * chip)86 static void tpm_clk_disable(struct tpm_chip *chip)
87 {
88 if (chip->ops->clk_enable)
89 chip->ops->clk_enable(chip, false);
90 }
91
92 /**
93 * tpm_chip_start() - power on the TPM
94 * @chip: a TPM chip to use
95 *
96 * Return:
97 * * The response length - OK
98 * * -errno - A system error
99 */
tpm_chip_start(struct tpm_chip * chip)100 int tpm_chip_start(struct tpm_chip *chip)
101 {
102 int ret;
103
104 tpm_clk_enable(chip);
105
106 if (chip->locality == -1) {
107 ret = tpm_request_locality(chip);
108 if (ret) {
109 tpm_clk_disable(chip);
110 return ret;
111 }
112 }
113
114 ret = tpm_cmd_ready(chip);
115 if (ret) {
116 tpm_relinquish_locality(chip);
117 tpm_clk_disable(chip);
118 return ret;
119 }
120
121 return 0;
122 }
123 EXPORT_SYMBOL_GPL(tpm_chip_start);
124
125 /**
126 * tpm_chip_stop() - power off the TPM
127 * @chip: a TPM chip to use
128 *
129 * Return:
130 * * The response length - OK
131 * * -errno - A system error
132 */
tpm_chip_stop(struct tpm_chip * chip)133 void tpm_chip_stop(struct tpm_chip *chip)
134 {
135 tpm_go_idle(chip);
136 tpm_relinquish_locality(chip);
137 tpm_clk_disable(chip);
138 }
139 EXPORT_SYMBOL_GPL(tpm_chip_stop);
140
141 /**
142 * tpm_try_get_ops() - Get a ref to the tpm_chip
143 * @chip: Chip to ref
144 *
145 * The caller must already have some kind of locking to ensure that chip is
146 * valid. This function will lock the chip so that the ops member can be
147 * accessed safely. The locking prevents tpm_chip_unregister from
148 * completing, so it should not be held for long periods.
149 *
150 * Returns -ERRNO if the chip could not be got.
151 */
tpm_try_get_ops(struct tpm_chip * chip)152 int tpm_try_get_ops(struct tpm_chip *chip)
153 {
154 int rc = -EIO;
155
156 get_device(&chip->dev);
157
158 down_read(&chip->ops_sem);
159 if (!chip->ops)
160 goto out_ops;
161
162 mutex_lock(&chip->tpm_mutex);
163 rc = tpm_chip_start(chip);
164 if (rc)
165 goto out_lock;
166
167 return 0;
168 out_lock:
169 mutex_unlock(&chip->tpm_mutex);
170 out_ops:
171 up_read(&chip->ops_sem);
172 put_device(&chip->dev);
173 return rc;
174 }
175 EXPORT_SYMBOL_GPL(tpm_try_get_ops);
176
177 /**
178 * tpm_put_ops() - Release a ref to the tpm_chip
179 * @chip: Chip to put
180 *
181 * This is the opposite pair to tpm_try_get_ops(). After this returns chip may
182 * be kfree'd.
183 */
tpm_put_ops(struct tpm_chip * chip)184 void tpm_put_ops(struct tpm_chip *chip)
185 {
186 tpm_chip_stop(chip);
187 mutex_unlock(&chip->tpm_mutex);
188 up_read(&chip->ops_sem);
189 put_device(&chip->dev);
190 }
191 EXPORT_SYMBOL_GPL(tpm_put_ops);
192
193 /**
194 * tpm_default_chip() - find a TPM chip and get a reference to it
195 */
tpm_default_chip(void)196 struct tpm_chip *tpm_default_chip(void)
197 {
198 struct tpm_chip *chip, *res = NULL;
199 int chip_num = 0;
200 int chip_prev;
201
202 mutex_lock(&idr_lock);
203
204 do {
205 chip_prev = chip_num;
206 chip = idr_get_next(&dev_nums_idr, &chip_num);
207 if (chip) {
208 get_device(&chip->dev);
209 res = chip;
210 break;
211 }
212 } while (chip_prev != chip_num);
213
214 mutex_unlock(&idr_lock);
215
216 return res;
217 }
218 EXPORT_SYMBOL_GPL(tpm_default_chip);
219
220 /**
221 * tpm_find_get_ops() - find and reserve a TPM chip
222 * @chip: a &struct tpm_chip instance, %NULL for the default chip
223 *
224 * Finds a TPM chip and reserves its class device and operations. The chip must
225 * be released with tpm_put_ops() after use.
226 * This function is for internal use only. It supports existing TPM callers
227 * by accepting NULL, but those callers should be converted to pass in a chip
228 * directly.
229 *
230 * Return:
231 * A reserved &struct tpm_chip instance.
232 * %NULL if a chip is not found.
233 * %NULL if the chip is not available.
234 */
tpm_find_get_ops(struct tpm_chip * chip)235 struct tpm_chip *tpm_find_get_ops(struct tpm_chip *chip)
236 {
237 int rc;
238
239 if (chip) {
240 if (!tpm_try_get_ops(chip))
241 return chip;
242 return NULL;
243 }
244
245 chip = tpm_default_chip();
246 if (!chip)
247 return NULL;
248 rc = tpm_try_get_ops(chip);
249 /* release additional reference we got from tpm_default_chip() */
250 put_device(&chip->dev);
251 if (rc)
252 return NULL;
253 return chip;
254 }
255
256 /**
257 * tpm_dev_release() - free chip memory and the device number
258 * @dev: the character device for the TPM chip
259 *
260 * This is used as the release function for the character device.
261 */
tpm_dev_release(struct device * dev)262 static void tpm_dev_release(struct device *dev)
263 {
264 struct tpm_chip *chip = container_of(dev, struct tpm_chip, dev);
265
266 mutex_lock(&idr_lock);
267 idr_remove(&dev_nums_idr, chip->dev_num);
268 mutex_unlock(&idr_lock);
269
270 kfree(chip->work_space.context_buf);
271 kfree(chip->work_space.session_buf);
272 kfree(chip->allocated_banks);
273 kfree(chip);
274 }
275
276 /**
277 * tpm_class_shutdown() - prepare the TPM device for loss of power.
278 * @dev: device to which the chip is associated.
279 *
280 * Issues a TPM2_Shutdown command prior to loss of power, as required by the
281 * TPM 2.0 spec. Then, calls bus- and device- specific shutdown code.
282 *
283 * Return: always 0 (i.e. success)
284 */
tpm_class_shutdown(struct device * dev)285 static int tpm_class_shutdown(struct device *dev)
286 {
287 struct tpm_chip *chip = container_of(dev, struct tpm_chip, dev);
288
289 down_write(&chip->ops_sem);
290 if (chip->flags & TPM_CHIP_FLAG_TPM2) {
291 if (!tpm_chip_start(chip)) {
292 tpm2_shutdown(chip, TPM2_SU_CLEAR);
293 tpm_chip_stop(chip);
294 }
295 }
296 chip->ops = NULL;
297 up_write(&chip->ops_sem);
298
299 return 0;
300 }
301
302 /**
303 * tpm_chip_alloc() - allocate a new struct tpm_chip instance
304 * @pdev: device to which the chip is associated
305 * At this point pdev mst be initialized, but does not have to
306 * be registered
307 * @ops: struct tpm_class_ops instance
308 *
309 * Allocates a new struct tpm_chip instance and assigns a free
310 * device number for it. Must be paired with put_device(&chip->dev).
311 */
tpm_chip_alloc(struct device * pdev,const struct tpm_class_ops * ops)312 struct tpm_chip *tpm_chip_alloc(struct device *pdev,
313 const struct tpm_class_ops *ops)
314 {
315 struct tpm_chip *chip;
316 int rc;
317
318 chip = kzalloc(sizeof(*chip), GFP_KERNEL);
319 if (chip == NULL)
320 return ERR_PTR(-ENOMEM);
321
322 mutex_init(&chip->tpm_mutex);
323 init_rwsem(&chip->ops_sem);
324
325 chip->ops = ops;
326
327 mutex_lock(&idr_lock);
328 rc = idr_alloc(&dev_nums_idr, NULL, 0, TPM_NUM_DEVICES, GFP_KERNEL);
329 mutex_unlock(&idr_lock);
330 if (rc < 0) {
331 dev_err(pdev, "No available tpm device numbers\n");
332 kfree(chip);
333 return ERR_PTR(rc);
334 }
335 chip->dev_num = rc;
336
337 device_initialize(&chip->dev);
338
339 chip->dev.class = tpm_class;
340 chip->dev.class->shutdown_pre = tpm_class_shutdown;
341 chip->dev.release = tpm_dev_release;
342 chip->dev.parent = pdev;
343 chip->dev.groups = chip->groups;
344
345 if (chip->dev_num == 0)
346 chip->dev.devt = MKDEV(MISC_MAJOR, TPM_MINOR);
347 else
348 chip->dev.devt = MKDEV(MAJOR(tpm_devt), chip->dev_num);
349
350 rc = dev_set_name(&chip->dev, "tpm%d", chip->dev_num);
351 if (rc)
352 goto out;
353
354 if (!pdev)
355 chip->flags |= TPM_CHIP_FLAG_VIRTUAL;
356
357 cdev_init(&chip->cdev, &tpm_fops);
358 chip->cdev.owner = THIS_MODULE;
359
360 rc = tpm2_init_space(&chip->work_space, TPM2_SPACE_BUFFER_SIZE);
361 if (rc) {
362 rc = -ENOMEM;
363 goto out;
364 }
365
366 chip->locality = -1;
367 return chip;
368
369 out:
370 put_device(&chip->dev);
371 return ERR_PTR(rc);
372 }
373 EXPORT_SYMBOL_GPL(tpm_chip_alloc);
374
tpm_put_device(void * dev)375 static void tpm_put_device(void *dev)
376 {
377 put_device(dev);
378 }
379
380 /**
381 * tpmm_chip_alloc() - allocate a new struct tpm_chip instance
382 * @pdev: parent device to which the chip is associated
383 * @ops: struct tpm_class_ops instance
384 *
385 * Same as tpm_chip_alloc except devm is used to do the put_device
386 */
tpmm_chip_alloc(struct device * pdev,const struct tpm_class_ops * ops)387 struct tpm_chip *tpmm_chip_alloc(struct device *pdev,
388 const struct tpm_class_ops *ops)
389 {
390 struct tpm_chip *chip;
391 int rc;
392
393 chip = tpm_chip_alloc(pdev, ops);
394 if (IS_ERR(chip))
395 return chip;
396
397 rc = devm_add_action_or_reset(pdev,
398 tpm_put_device,
399 &chip->dev);
400 if (rc)
401 return ERR_PTR(rc);
402
403 dev_set_drvdata(pdev, chip);
404
405 return chip;
406 }
407 EXPORT_SYMBOL_GPL(tpmm_chip_alloc);
408
tpm_add_char_device(struct tpm_chip * chip)409 static int tpm_add_char_device(struct tpm_chip *chip)
410 {
411 int rc;
412
413 rc = cdev_device_add(&chip->cdev, &chip->dev);
414 if (rc) {
415 dev_err(&chip->dev,
416 "unable to cdev_device_add() %s, major %d, minor %d, err=%d\n",
417 dev_name(&chip->dev), MAJOR(chip->dev.devt),
418 MINOR(chip->dev.devt), rc);
419 return rc;
420 }
421
422 if (chip->flags & TPM_CHIP_FLAG_TPM2 && !tpm_is_firmware_upgrade(chip)) {
423 rc = tpm_devs_add(chip);
424 if (rc)
425 goto err_del_cdev;
426 }
427
428 /* Make the chip available. */
429 mutex_lock(&idr_lock);
430 idr_replace(&dev_nums_idr, chip, chip->dev_num);
431 mutex_unlock(&idr_lock);
432
433 return 0;
434
435 err_del_cdev:
436 cdev_device_del(&chip->cdev, &chip->dev);
437 return rc;
438 }
439
tpm_del_char_device(struct tpm_chip * chip)440 static void tpm_del_char_device(struct tpm_chip *chip)
441 {
442 cdev_device_del(&chip->cdev, &chip->dev);
443
444 /* Make the chip unavailable. */
445 mutex_lock(&idr_lock);
446 idr_replace(&dev_nums_idr, NULL, chip->dev_num);
447 mutex_unlock(&idr_lock);
448
449 /* Make the driver uncallable. */
450 down_write(&chip->ops_sem);
451
452 /*
453 * Check if chip->ops is still valid: In case that the controller
454 * drivers shutdown handler unregisters the controller in its
455 * shutdown handler we are called twice and chip->ops to NULL.
456 */
457 if (chip->ops) {
458 if (chip->flags & TPM_CHIP_FLAG_TPM2) {
459 if (!tpm_chip_start(chip)) {
460 tpm2_shutdown(chip, TPM2_SU_CLEAR);
461 tpm_chip_stop(chip);
462 }
463 }
464 chip->ops = NULL;
465 }
466 up_write(&chip->ops_sem);
467 }
468
tpm_del_legacy_sysfs(struct tpm_chip * chip)469 static void tpm_del_legacy_sysfs(struct tpm_chip *chip)
470 {
471 struct attribute **i;
472
473 if (chip->flags & (TPM_CHIP_FLAG_TPM2 | TPM_CHIP_FLAG_VIRTUAL) ||
474 tpm_is_firmware_upgrade(chip))
475 return;
476
477 sysfs_remove_link(&chip->dev.parent->kobj, "ppi");
478
479 for (i = chip->groups[0]->attrs; *i != NULL; ++i)
480 sysfs_remove_link(&chip->dev.parent->kobj, (*i)->name);
481 }
482
483 /* For compatibility with legacy sysfs paths we provide symlinks from the
484 * parent dev directory to selected names within the tpm chip directory. Old
485 * kernel versions created these files directly under the parent.
486 */
tpm_add_legacy_sysfs(struct tpm_chip * chip)487 static int tpm_add_legacy_sysfs(struct tpm_chip *chip)
488 {
489 struct attribute **i;
490 int rc;
491
492 if (chip->flags & (TPM_CHIP_FLAG_TPM2 | TPM_CHIP_FLAG_VIRTUAL) ||
493 tpm_is_firmware_upgrade(chip))
494 return 0;
495
496 rc = compat_only_sysfs_link_entry_to_kobj(
497 &chip->dev.parent->kobj, &chip->dev.kobj, "ppi", NULL);
498 if (rc && rc != -ENOENT)
499 return rc;
500
501 /* All the names from tpm-sysfs */
502 for (i = chip->groups[0]->attrs; *i != NULL; ++i) {
503 rc = compat_only_sysfs_link_entry_to_kobj(
504 &chip->dev.parent->kobj, &chip->dev.kobj, (*i)->name, NULL);
505 if (rc) {
506 tpm_del_legacy_sysfs(chip);
507 return rc;
508 }
509 }
510
511 return 0;
512 }
513
514 /*
515 * Some AMD fTPM versions may cause stutter
516 * https://www.amd.com/en/support/kb/faq/pa-410
517 *
518 * Fixes are available in two series of fTPM firmware:
519 * 6.x.y.z series: 6.0.18.6 +
520 * 3.x.y.z series: 3.57.y.5 +
521 */
tpm_amd_is_rng_defective(struct tpm_chip * chip)522 static bool tpm_amd_is_rng_defective(struct tpm_chip *chip)
523 {
524 u32 val1, val2;
525 u64 version;
526 int ret;
527
528 if (!(chip->flags & TPM_CHIP_FLAG_TPM2))
529 return false;
530
531 ret = tpm_request_locality(chip);
532 if (ret)
533 return false;
534
535 ret = tpm2_get_tpm_pt(chip, TPM2_PT_MANUFACTURER, &val1, NULL);
536 if (ret)
537 goto release;
538 if (val1 != 0x414D4400U /* AMD */) {
539 ret = -ENODEV;
540 goto release;
541 }
542 ret = tpm2_get_tpm_pt(chip, TPM2_PT_FIRMWARE_VERSION_1, &val1, NULL);
543 if (ret)
544 goto release;
545 ret = tpm2_get_tpm_pt(chip, TPM2_PT_FIRMWARE_VERSION_2, &val2, NULL);
546
547 release:
548 tpm_relinquish_locality(chip);
549
550 if (ret)
551 return false;
552
553 version = ((u64)val1 << 32) | val2;
554 if ((version >> 48) == 6) {
555 if (version >= 0x0006000000180006ULL)
556 return false;
557 } else if ((version >> 48) == 3) {
558 if (version >= 0x0003005700000005ULL)
559 return false;
560 } else {
561 return false;
562 }
563
564 dev_warn(&chip->dev,
565 "AMD fTPM version 0x%llx causes system stutter; hwrng disabled\n",
566 version);
567
568 return true;
569 }
570
tpm_hwrng_read(struct hwrng * rng,void * data,size_t max,bool wait)571 static int tpm_hwrng_read(struct hwrng *rng, void *data, size_t max, bool wait)
572 {
573 struct tpm_chip *chip = container_of(rng, struct tpm_chip, hwrng);
574
575 return tpm_get_random(chip, data, max);
576 }
577
tpm_add_hwrng(struct tpm_chip * chip)578 static int tpm_add_hwrng(struct tpm_chip *chip)
579 {
580 if (!IS_ENABLED(CONFIG_HW_RANDOM_TPM) || tpm_is_firmware_upgrade(chip) ||
581 tpm_amd_is_rng_defective(chip))
582 return 0;
583
584 snprintf(chip->hwrng_name, sizeof(chip->hwrng_name),
585 "tpm-rng-%d", chip->dev_num);
586 chip->hwrng.name = chip->hwrng_name;
587 chip->hwrng.read = tpm_hwrng_read;
588 return hwrng_register(&chip->hwrng);
589 }
590
tpm_get_pcr_allocation(struct tpm_chip * chip)591 static int tpm_get_pcr_allocation(struct tpm_chip *chip)
592 {
593 int rc;
594
595 if (tpm_is_firmware_upgrade(chip))
596 return 0;
597
598 rc = (chip->flags & TPM_CHIP_FLAG_TPM2) ?
599 tpm2_get_pcr_allocation(chip) :
600 tpm1_get_pcr_allocation(chip);
601
602 if (rc > 0)
603 return -ENODEV;
604
605 return rc;
606 }
607
608 /*
609 * tpm_chip_register() - create a character device for the TPM chip
610 * @chip: TPM chip to use.
611 *
612 * Creates a character device for the TPM chip and adds sysfs attributes for
613 * the device. As the last step this function adds the chip to the list of TPM
614 * chips available for in-kernel use.
615 *
616 * This function should be only called after the chip initialization is
617 * complete.
618 */
tpm_chip_register(struct tpm_chip * chip)619 int tpm_chip_register(struct tpm_chip *chip)
620 {
621 int rc;
622
623 rc = tpm_chip_start(chip);
624 if (rc)
625 return rc;
626 rc = tpm_auto_startup(chip);
627 if (rc) {
628 tpm_chip_stop(chip);
629 return rc;
630 }
631
632 rc = tpm_get_pcr_allocation(chip);
633 tpm_chip_stop(chip);
634 if (rc)
635 return rc;
636
637 tpm_sysfs_add_device(chip);
638
639 tpm_bios_log_setup(chip);
640
641 tpm_add_ppi(chip);
642
643 rc = tpm_add_hwrng(chip);
644 if (rc)
645 goto out_ppi;
646
647 rc = tpm_add_char_device(chip);
648 if (rc)
649 goto out_hwrng;
650
651 rc = tpm_add_legacy_sysfs(chip);
652 if (rc) {
653 tpm_chip_unregister(chip);
654 return rc;
655 }
656
657 return 0;
658
659 out_hwrng:
660 if (IS_ENABLED(CONFIG_HW_RANDOM_TPM) && !tpm_is_firmware_upgrade(chip))
661 hwrng_unregister(&chip->hwrng);
662 out_ppi:
663 tpm_bios_log_teardown(chip);
664
665 return rc;
666 }
667 EXPORT_SYMBOL_GPL(tpm_chip_register);
668
669 /*
670 * tpm_chip_unregister() - release the TPM driver
671 * @chip: TPM chip to use.
672 *
673 * Takes the chip first away from the list of available TPM chips and then
674 * cleans up all the resources reserved by tpm_chip_register().
675 *
676 * Once this function returns the driver call backs in 'op's will not be
677 * running and will no longer start.
678 *
679 * NOTE: This function should be only called before deinitializing chip
680 * resources.
681 */
tpm_chip_unregister(struct tpm_chip * chip)682 void tpm_chip_unregister(struct tpm_chip *chip)
683 {
684 tpm_del_legacy_sysfs(chip);
685 if (IS_ENABLED(CONFIG_HW_RANDOM_TPM) && !tpm_is_firmware_upgrade(chip))
686 hwrng_unregister(&chip->hwrng);
687 tpm_bios_log_teardown(chip);
688 if (chip->flags & TPM_CHIP_FLAG_TPM2 && !tpm_is_firmware_upgrade(chip))
689 tpm_devs_remove(chip);
690 tpm_del_char_device(chip);
691 }
692 EXPORT_SYMBOL_GPL(tpm_chip_unregister);
693