2 * Implementation of the Xen vTPM device frontend
4 * Author: Daniel De Graaf <dgdegra@tycho.nsa.gov>
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License version 2,
8 * as published by the Free Software Foundation.
10 #include <linux/errno.h>
11 #include <linux/err.h>
12 #include <linux/interrupt.h>
13 #include <xen/events.h>
14 #include <xen/interface/io/tpmif.h>
15 #include <xen/grant_table.h>
16 #include <xen/xenbus.h>
21 struct tpm_chip *chip;
22 struct xenbus_device *dev;
24 struct vtpm_shared_page *shr;
32 VTPM_STATUS_RUNNING = 0x1,
33 VTPM_STATUS_IDLE = 0x2,
34 VTPM_STATUS_RESULT = 0x4,
35 VTPM_STATUS_CANCELED = 0x8,
38 static u8 vtpm_status(struct tpm_chip *chip)
40 struct tpm_private *priv = TPM_VPRIV(chip);
41 switch (priv->shr->state) {
43 return VTPM_STATUS_IDLE | VTPM_STATUS_CANCELED;
44 case VTPM_STATE_FINISH:
45 return VTPM_STATUS_IDLE | VTPM_STATUS_RESULT;
46 case VTPM_STATE_SUBMIT:
47 case VTPM_STATE_CANCEL: /* cancel requested, not yet canceled */
48 return VTPM_STATUS_RUNNING;
54 static bool vtpm_req_canceled(struct tpm_chip *chip, u8 status)
56 return status & VTPM_STATUS_CANCELED;
59 static void vtpm_cancel(struct tpm_chip *chip)
61 struct tpm_private *priv = TPM_VPRIV(chip);
62 priv->shr->state = VTPM_STATE_CANCEL;
64 notify_remote_via_evtchn(priv->evtchn);
67 static unsigned int shr_data_offset(struct vtpm_shared_page *shr)
69 return sizeof(*shr) + sizeof(u32) * shr->nr_extra_pages;
72 static int vtpm_send(struct tpm_chip *chip, u8 *buf, size_t count)
74 struct tpm_private *priv = TPM_VPRIV(chip);
75 struct vtpm_shared_page *shr = priv->shr;
76 unsigned int offset = shr_data_offset(shr);
79 unsigned long duration;
81 if (offset > PAGE_SIZE)
84 if (offset + count > PAGE_SIZE)
87 /* Wait for completion of any existing command or cancellation */
88 if (wait_for_tpm_stat(chip, VTPM_STATUS_IDLE, chip->vendor.timeout_c,
89 &chip->vendor.read_queue, true) < 0) {
94 memcpy(offset + (u8 *)shr, buf, count);
97 shr->state = VTPM_STATE_SUBMIT;
99 notify_remote_via_evtchn(priv->evtchn);
101 ordinal = be32_to_cpu(((struct tpm_input_header*)buf)->ordinal);
102 duration = tpm_calc_ordinal_duration(chip, ordinal);
104 if (wait_for_tpm_stat(chip, VTPM_STATUS_IDLE, duration,
105 &chip->vendor.read_queue, true) < 0) {
106 /* got a signal or timeout, try to cancel */
114 static int vtpm_recv(struct tpm_chip *chip, u8 *buf, size_t count)
116 struct tpm_private *priv = TPM_VPRIV(chip);
117 struct vtpm_shared_page *shr = priv->shr;
118 unsigned int offset = shr_data_offset(shr);
119 size_t length = shr->length;
121 if (shr->state == VTPM_STATE_IDLE)
124 /* In theory the wait at the end of _send makes this one unnecessary */
125 if (wait_for_tpm_stat(chip, VTPM_STATUS_RESULT, chip->vendor.timeout_c,
126 &chip->vendor.read_queue, true) < 0) {
131 if (offset > PAGE_SIZE)
134 if (offset + length > PAGE_SIZE)
135 length = PAGE_SIZE - offset;
140 memcpy(buf, offset + (u8 *)shr, length);
145 ssize_t tpm_show_locality(struct device *dev, struct device_attribute *attr,
148 struct tpm_chip *chip = dev_get_drvdata(dev);
149 struct tpm_private *priv = TPM_VPRIV(chip);
150 u8 locality = priv->shr->locality;
152 return sprintf(buf, "%d\n", locality);
155 ssize_t tpm_store_locality(struct device *dev, struct device_attribute *attr,
156 const char *buf, size_t len)
158 struct tpm_chip *chip = dev_get_drvdata(dev);
159 struct tpm_private *priv = TPM_VPRIV(chip);
162 int rv = kstrtou8(buf, 0, &val);
166 priv->shr->locality = val;
171 static const struct file_operations vtpm_ops = {
172 .owner = THIS_MODULE,
177 .release = tpm_release,
180 static DEVICE_ATTR(pubek, S_IRUGO, tpm_show_pubek, NULL);
181 static DEVICE_ATTR(pcrs, S_IRUGO, tpm_show_pcrs, NULL);
182 static DEVICE_ATTR(enabled, S_IRUGO, tpm_show_enabled, NULL);
183 static DEVICE_ATTR(active, S_IRUGO, tpm_show_active, NULL);
184 static DEVICE_ATTR(owned, S_IRUGO, tpm_show_owned, NULL);
185 static DEVICE_ATTR(temp_deactivated, S_IRUGO, tpm_show_temp_deactivated,
187 static DEVICE_ATTR(caps, S_IRUGO, tpm_show_caps, NULL);
188 static DEVICE_ATTR(cancel, S_IWUSR | S_IWGRP, NULL, tpm_store_cancel);
189 static DEVICE_ATTR(durations, S_IRUGO, tpm_show_durations, NULL);
190 static DEVICE_ATTR(timeouts, S_IRUGO, tpm_show_timeouts, NULL);
191 static DEVICE_ATTR(locality, S_IRUGO | S_IWUSR, tpm_show_locality,
194 static struct attribute *vtpm_attrs[] = {
195 &dev_attr_pubek.attr,
197 &dev_attr_enabled.attr,
198 &dev_attr_active.attr,
199 &dev_attr_owned.attr,
200 &dev_attr_temp_deactivated.attr,
202 &dev_attr_cancel.attr,
203 &dev_attr_durations.attr,
204 &dev_attr_timeouts.attr,
205 &dev_attr_locality.attr,
209 static struct attribute_group vtpm_attr_grp = {
213 static const struct tpm_vendor_specific tpm_vtpm = {
214 .status = vtpm_status,
217 .cancel = vtpm_cancel,
218 .req_complete_mask = VTPM_STATUS_IDLE | VTPM_STATUS_RESULT,
219 .req_complete_val = VTPM_STATUS_IDLE | VTPM_STATUS_RESULT,
220 .req_canceled = vtpm_req_canceled,
221 .attr_group = &vtpm_attr_grp,
227 static irqreturn_t tpmif_interrupt(int dummy, void *dev_id)
229 struct tpm_private *priv = dev_id;
231 switch (priv->shr->state) {
232 case VTPM_STATE_IDLE:
233 case VTPM_STATE_FINISH:
234 wake_up_interruptible(&priv->chip->vendor.read_queue);
236 case VTPM_STATE_SUBMIT:
237 case VTPM_STATE_CANCEL:
244 static int setup_chip(struct device *dev, struct tpm_private *priv)
246 struct tpm_chip *chip;
248 chip = tpm_register_hardware(dev, &tpm_vtpm);
252 init_waitqueue_head(&chip->vendor.read_queue);
255 TPM_VPRIV(chip) = priv;
260 /* caller must clean up in case of errors */
261 static int setup_ring(struct xenbus_device *dev, struct tpm_private *priv)
263 struct xenbus_transaction xbt;
264 const char *message = NULL;
267 priv->shr = (void *)__get_free_page(GFP_KERNEL|__GFP_ZERO);
269 xenbus_dev_fatal(dev, -ENOMEM, "allocating shared ring");
273 rv = xenbus_grant_ring(dev, virt_to_mfn(priv->shr));
279 rv = xenbus_alloc_evtchn(dev, &priv->evtchn);
283 rv = bind_evtchn_to_irqhandler(priv->evtchn, tpmif_interrupt, 0,
286 xenbus_dev_fatal(dev, rv, "allocating TPM irq");
289 priv->chip->vendor.irq = rv;
292 rv = xenbus_transaction_start(&xbt);
294 xenbus_dev_fatal(dev, rv, "starting transaction");
298 rv = xenbus_printf(xbt, dev->nodename,
299 "ring-ref", "%u", priv->ring_ref);
301 message = "writing ring-ref";
302 goto abort_transaction;
305 rv = xenbus_printf(xbt, dev->nodename, "event-channel", "%u",
308 message = "writing event-channel";
309 goto abort_transaction;
312 rv = xenbus_printf(xbt, dev->nodename, "feature-protocol-v2", "1");
314 message = "writing feature-protocol-v2";
315 goto abort_transaction;
318 rv = xenbus_transaction_end(xbt, 0);
322 xenbus_dev_fatal(dev, rv, "completing transaction");
326 xenbus_switch_state(dev, XenbusStateInitialised);
331 xenbus_transaction_end(xbt, 1);
333 xenbus_dev_error(dev, rv, "%s", message);
338 static void ring_free(struct tpm_private *priv)
344 gnttab_end_foreign_access(priv->ring_ref, 0,
345 (unsigned long)priv->shr);
347 free_page((unsigned long)priv->shr);
349 if (priv->chip && priv->chip->vendor.irq)
350 unbind_from_irqhandler(priv->chip->vendor.irq, priv);
355 static int tpmfront_probe(struct xenbus_device *dev,
356 const struct xenbus_device_id *id)
358 struct tpm_private *priv;
361 priv = kzalloc(sizeof(*priv), GFP_KERNEL);
363 xenbus_dev_fatal(dev, -ENOMEM, "allocating priv structure");
367 rv = setup_chip(&dev->dev, priv);
373 rv = setup_ring(dev, priv);
375 tpm_remove_hardware(&dev->dev);
380 tpm_get_timeouts(priv->chip);
382 dev_set_drvdata(&dev->dev, priv->chip);
387 static int tpmfront_remove(struct xenbus_device *dev)
389 struct tpm_chip *chip = dev_get_drvdata(&dev->dev);
390 struct tpm_private *priv = TPM_VPRIV(chip);
391 tpm_remove_hardware(&dev->dev);
393 TPM_VPRIV(chip) = NULL;
397 static int tpmfront_resume(struct xenbus_device *dev)
399 /* A suspend/resume/migrate will interrupt a vTPM anyway */
400 tpmfront_remove(dev);
401 return tpmfront_probe(dev, NULL);
404 static void backend_changed(struct xenbus_device *dev,
405 enum xenbus_state backend_state)
409 switch (backend_state) {
410 case XenbusStateInitialised:
411 case XenbusStateConnected:
412 if (dev->state == XenbusStateConnected)
415 if (xenbus_scanf(XBT_NIL, dev->otherend,
416 "feature-protocol-v2", "%d", &val) < 0)
419 xenbus_dev_fatal(dev, -EINVAL,
420 "vTPM protocol 2 required");
423 xenbus_switch_state(dev, XenbusStateConnected);
426 case XenbusStateClosing:
427 case XenbusStateClosed:
428 device_unregister(&dev->dev);
429 xenbus_frontend_closed(dev);
436 static const struct xenbus_device_id tpmfront_ids[] = {
440 MODULE_ALIAS("xen:vtpm");
442 static DEFINE_XENBUS_DRIVER(tpmfront, ,
443 .probe = tpmfront_probe,
444 .remove = tpmfront_remove,
445 .resume = tpmfront_resume,
446 .otherend_changed = backend_changed,
449 static int __init xen_tpmfront_init(void)
454 return xenbus_register_frontend(&tpmfront_driver);
456 module_init(xen_tpmfront_init);
458 static void __exit xen_tpmfront_exit(void)
460 xenbus_unregister_driver(&tpmfront_driver);
462 module_exit(xen_tpmfront_exit);
464 MODULE_AUTHOR("Daniel De Graaf <dgdegra@tycho.nsa.gov>");
465 MODULE_DESCRIPTION("Xen vTPM Driver");
466 MODULE_LICENSE("GPL");