Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752868AbbH2Oi6 (ORCPT ); Sat, 29 Aug 2015 10:38:58 -0400 Received: from mga14.intel.com ([192.55.52.115]:14042 "EHLO mga14.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752494AbbH2Oi5 (ORCPT ); Sat, 29 Aug 2015 10:38:57 -0400 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.17,429,1437462000"; d="scan'208";a="793351240" Date: Sat, 29 Aug 2015 17:38:52 +0300 From: Jarkko Sakkinen To: Jarkko Sakkinen Cc: tpmdd-devel@lists.sourceforge.net, linux-kernel@vger.kernel.org, Peter Huewe , Marcel Selhorst , Jason Gunthorpe Subject: Re: [PATCH RFC] tpm, tpm_tis: detect TPM2 devices Message-ID: <20150829143852.GA12555@intel.com> References: <1440858966-12431-1-git-send-email-jarkko.sakkinen@linux.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1440858966-12431-1-git-send-email-jarkko.sakkinen@linux.intel.com> Organization: Intel Finland Oy - BIC 0357606-4 - Westendinkatu 7, 02160 Espoo User-Agent: Mutt/1.5.23 (2014-03-12) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 6010 Lines: 195 Did this already over two weeks ago but haven't been able to test this at all since I'm still waiting the delivery of NUC5i5MYHE. It's a NUC with a discrete TPM 2.0 chip (ST Electronics if I remember right). Very useful machine for TPM2 testing... /Jarkko On Sat, Aug 29, 2015 at 05:36:06PM +0300, Jarkko Sakkinen wrote: > It turned out that the root cause in b371616b8 was not entirely correct > for https://bugzilla.kernel.org/show_bug.cgi?id=98181. > > All TPM 2.0 FIFO and CRB devices have the same HID. For FIFO devices > the start method is 6 as it is defined in > > http://www.trustedcomputinggroup.org/resources/tcg_acpi_specification > > This patch changes FIFO and CRB drivers so that they check start method > value and initialize only if the start method has a proper value for > that particular interface. > > Signed-off-by: Jarkko Sakkinen > --- > drivers/char/tpm/tpm.h | 7 +++++++ > drivers/char/tpm/tpm_crb.c | 20 +++++--------------- > drivers/char/tpm/tpm_tis.c | 45 +++++++++++++++++++++++++++++++++++++++++++-- > 3 files changed, 55 insertions(+), 17 deletions(-) > > diff --git a/drivers/char/tpm/tpm.h b/drivers/char/tpm/tpm.h > index f8319a0..39be5ac 100644 > --- a/drivers/char/tpm/tpm.h > +++ b/drivers/char/tpm/tpm.h > @@ -115,6 +115,13 @@ enum tpm2_startup_types { > TPM2_SU_STATE = 0x0001, > }; > > +enum tpm2_start_method { > + TPM2_START_ACPI = 2, > + TPM2_START_FIFO = 6, > + TPM2_START_CRB = 7, > + TPM2_START_CRB_WITH_ACPI = 8, > +}; > + > struct tpm_chip; > > struct tpm_vendor_specific { > diff --git a/drivers/char/tpm/tpm_crb.c b/drivers/char/tpm/tpm_crb.c > index 1267322..b4564b6 100644 > --- a/drivers/char/tpm/tpm_crb.c > +++ b/drivers/char/tpm/tpm_crb.c > @@ -34,12 +34,6 @@ enum crb_defaults { > CRB_ACPI_START_INDEX = 1, > }; > > -enum crb_start_method { > - CRB_SM_ACPI_START = 2, > - CRB_SM_CRB = 7, > - CRB_SM_CRB_WITH_ACPI_START = 8, > -}; > - > struct acpi_tpm2 { > struct acpi_table_header hdr; > u16 platform_class; > @@ -233,13 +227,9 @@ static int crb_acpi_add(struct acpi_device *device) > return -ENODEV; > } > > - /* At least some versions of AMI BIOS have a bug that TPM2 table has > - * zero address for the control area and therefore we must fail. > - */ > - if (!buf->control_area_pa) { > - dev_err(dev, "TPM2 ACPI table has a zero address for the control area\n"); > - return -EINVAL; > - } > + /* Should the FIFO driver handle this? */ > + if (buf->start_method == TPM2_START_FIFO) > + return -ENODEV; > > if (buf->hdr.length < sizeof(struct acpi_tpm2)) { > dev_err(dev, "TPM2 ACPI table has wrong size"); > @@ -259,11 +249,11 @@ static int crb_acpi_add(struct acpi_device *device) > * report only ACPI start but in practice seems to require both > * ACPI start and CRB start. > */ > - if (sm == CRB_SM_CRB || sm == CRB_SM_CRB_WITH_ACPI_START || > + if (sm == TPM2_START_CRB || sm == TPM2_START_FIFO || > !strcmp(acpi_device_hid(device), "MSFT0101")) > priv->flags |= CRB_FL_CRB_START; > > - if (sm == CRB_SM_ACPI_START || sm == CRB_SM_CRB_WITH_ACPI_START) > + if (sm == TPM2_START_ACPI || sm == TPM2_START_CRB_WITH_ACPI) > priv->flags |= CRB_FL_ACPI_START; > > priv->cca = (struct crb_control_area __iomem *) > diff --git a/drivers/char/tpm/tpm_tis.c b/drivers/char/tpm/tpm_tis.c > index f2dffa7..4760804 100644 > --- a/drivers/char/tpm/tpm_tis.c > +++ b/drivers/char/tpm/tpm_tis.c > @@ -28,6 +28,7 @@ > #include > #include > #include > +#include > #include "tpm.h" > > enum tis_access { > @@ -91,7 +92,7 @@ struct priv_data { > }; > > #if defined(CONFIG_PNP) && defined(CONFIG_ACPI) > -static int is_itpm(struct pnp_dev *dev) > +static int has_hid(struct pnp_dev *dev, const char *hid) > { > struct acpi_device *acpi = pnp_acpi_device(dev); > struct acpi_hardware_id *id; > @@ -100,17 +101,49 @@ static int is_itpm(struct pnp_dev *dev) > return 0; > > list_for_each_entry(id, &acpi->pnp.ids, list) { > - if (!strcmp("INTC0102", id->id)) > + if (!strcmp(hid, id->id)) > return 1; > } > > return 0; > } > + > +static inline int is_itpm(struct pnp_dev *dev) > +{ > + return has_hid(dev, "INTC0102"); > +} > + > +static inline int validate_pnp_dev(struct pnp_dev *dev) > +{ > + struct acpi_table_tpm2 *tbl; > + acpi_status st; > + > + if (!has_hid(dev, "MSFT0101")) > + return 0; > + > + st = acpi_get_table(ACPI_SIG_TPM2, 1, > + (struct acpi_table_header **) &tbl); > + if (ACPI_FAILURE(st)) { > + dev_err(&dev->dev, "failed to get TPM2 ACPI table\n"); > + return -ENODEV; > + } > + > + /* Should the CRB driver handle this? */ > + if (le32_to_cpu(tbl->start_method) != TPM2_START_FIFO) > + return -ENODEV: > + > + retuurn 0; > +} > #else > static inline int is_itpm(struct pnp_dev *dev) > { > return 0; > } > + > +static inline int validate_pnp_dev(struct pnp_dev *dev) > +{ > + return 0; > +} > #endif > > /* Before we attempt to access the TPM we must see that the valid bit is set. > @@ -893,6 +926,11 @@ static int tpm_tis_pnp_init(struct pnp_dev *pnp_dev, > resource_size_t start, len; > unsigned int irq = 0; > acpi_handle acpi_dev_handle = NULL; > + int ret; > + > + ret = validate_pnp_dev(pnp_dev); > + if (ret) > + return ret; > > start = pnp_mem_start(pnp_dev, 0); > len = pnp_mem_len(pnp_dev, 0); > @@ -921,6 +959,9 @@ static struct pnp_device_id tpm_pnp_tbl[] = { > {"BCM0102", 0}, /* Broadcom */ > {"NSC1200", 0}, /* National */ > {"ICO0102", 0}, /* Intel */ > +#ifdef CONFIG_ACPI > + {"MSFT0101", 0}, /* TPM 2.0 */ > +#endif > /* Add new here */ > {"", 0}, /* User Specified */ > {"", 0} /* Terminator */ > -- > 2.5.0 > -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/