Received: by 10.223.185.116 with SMTP id b49csp5467545wrg; Wed, 7 Mar 2018 12:15:55 -0800 (PST) X-Google-Smtp-Source: AG47ELvUKhZTDytHwXAAkyVBFkczhY//dSETjQP0oSnz3mQeogCUXabW/WbQkhO3KzKf7yORhJnr X-Received: by 10.99.191.15 with SMTP id v15mr19094072pgf.396.1520453755593; Wed, 07 Mar 2018 12:15:55 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1520453755; cv=none; d=google.com; s=arc-20160816; b=tvZduBC3sPkuCPkluZCrRX+SpQ3XsDSU/D9/ZQGMQ8C+XeEzxk1Lcoy/pgJQedO65P OLbKG0FbhvUUBIBmwL0xlJo1FPz6C/kc+RuYELDJI5lQL6ppefeOer7GS3vilk0u98q/ ad/iiDKQXhz+zF0NATqDW7rWh5dkXvFenXmaMAI+89WC2HTKVpIIE5UdZWbkvqn5yf7n HNF0KkmjDRCKF9eVHhQTXdZ65+XoFlXcTyBv3QhxMpoblViBTdkAMIfrPfpbWOMnH60I ywQhEVzJoG8tDLCvVtUjFb8XNBQ9iX++OgK4KTmveIWEdzx+p/Kdf6klyjWL3RfBcAjE 2LOw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=y483zz9B1mDiK4VfVNECzMibvRAAzX5qL7jaW7F0sUs=; b=LADaklAOVMK44v0D48IXL5km4UTsHw2Xo4BSwJ1ieH55Vcc6JrpGittsr2AkBOJ3gD 9sUhUPtfzBcDfhgMMjJqAjbxaNDpYxHrUPcj1/p5BGhxJmPZ244LIwUATjqo2lPBpEzJ kJ+2Wp5wuN+albZRBLQZbWxIinE3lKOLldQ+758ZQkU/VeHiEmLRON3gcopFDT/jURST dPU+K3V2u+I3UB6SYtm8yHQQwxI8Luwer3ao23loMXVRsUgmkti2J1VH+zbjeue1eInE aACzfQatCQGJ5wNKcy2CKDJjORDMYJohFc2y8Fg/LBp2PXDGAv6L/zyTDw/7pIv0m8qg 0tVw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e18si11839230pgv.684.2018.03.07.12.15.41; Wed, 07 Mar 2018 12:15:55 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S965180AbeCGToy (ORCPT + 99 others); Wed, 7 Mar 2018 14:44:54 -0500 Received: from mail.linuxfoundation.org ([140.211.169.12]:43952 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S965153AbeCGTou (ORCPT ); Wed, 7 Mar 2018 14:44:50 -0500 Received: from localhost (unknown [185.236.200.248]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id DE146F16; Wed, 7 Mar 2018 19:44:49 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jarkko Sakkinen , Alexander Steffen Subject: [PATCH 4.14 009/110] tpm_tis_spi: Use DMA-safe memory for SPI transfers Date: Wed, 7 Mar 2018 11:37:52 -0800 Message-Id: <20180307191040.937945823@linuxfoundation.org> X-Mailer: git-send-email 2.16.2 In-Reply-To: <20180307191039.748351103@linuxfoundation.org> References: <20180307191039.748351103@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Alexander Steffen commit 6b3a13173f23e798e1ba213dd4a2c065a3b8d751 upstream. The buffers used as tx_buf/rx_buf in a SPI transfer need to be DMA-safe. This cannot be guaranteed for the buffers passed to tpm_tis_spi_read_bytes and tpm_tis_spi_write_bytes. Therefore, we need to use our own DMA-safe buffer and copy the data to/from it. The buffer needs to be allocated separately, to ensure that it is cacheline-aligned and not shared with other data, so that DMA can work correctly. Fixes: 0edbfea537d1 ("tpm/tpm_tis_spi: Add support for spi phy") Cc: stable@vger.kernel.org Reviewed-by: Jarkko Sakkinen Signed-off-by: Alexander Steffen Signed-off-by: Jarkko Sakkinen Signed-off-by: Greg Kroah-Hartman --- drivers/char/tpm/tpm_tis_spi.c | 45 ++++++++++++++++++++++++----------------- 1 file changed, 27 insertions(+), 18 deletions(-) --- a/drivers/char/tpm/tpm_tis_spi.c +++ b/drivers/char/tpm/tpm_tis_spi.c @@ -46,9 +46,7 @@ struct tpm_tis_spi_phy { struct tpm_tis_data priv; struct spi_device *spi_device; - - u8 tx_buf[4]; - u8 rx_buf[4]; + u8 *iobuf; }; static inline struct tpm_tis_spi_phy *to_tpm_tis_spi_phy(struct tpm_tis_data *data) @@ -71,14 +69,14 @@ static int tpm_tis_spi_transfer(struct t while (len) { transfer_len = min_t(u16, len, MAX_SPI_FRAMESIZE); - phy->tx_buf[0] = (in ? 0x80 : 0) | (transfer_len - 1); - phy->tx_buf[1] = 0xd4; - phy->tx_buf[2] = addr >> 8; - phy->tx_buf[3] = addr; + phy->iobuf[0] = (in ? 0x80 : 0) | (transfer_len - 1); + phy->iobuf[1] = 0xd4; + phy->iobuf[2] = addr >> 8; + phy->iobuf[3] = addr; memset(&spi_xfer, 0, sizeof(spi_xfer)); - spi_xfer.tx_buf = phy->tx_buf; - spi_xfer.rx_buf = phy->rx_buf; + spi_xfer.tx_buf = phy->iobuf; + spi_xfer.rx_buf = phy->iobuf; spi_xfer.len = 4; spi_xfer.cs_change = 1; @@ -88,9 +86,9 @@ static int tpm_tis_spi_transfer(struct t if (ret < 0) goto exit; - if ((phy->rx_buf[3] & 0x01) == 0) { + if ((phy->iobuf[3] & 0x01) == 0) { // handle SPI wait states - phy->tx_buf[0] = 0; + phy->iobuf[0] = 0; for (i = 0; i < TPM_RETRY; i++) { spi_xfer.len = 1; @@ -99,7 +97,7 @@ static int tpm_tis_spi_transfer(struct t ret = spi_sync_locked(phy->spi_device, &m); if (ret < 0) goto exit; - if (phy->rx_buf[0] & 0x01) + if (phy->iobuf[0] & 0x01) break; } @@ -112,8 +110,14 @@ static int tpm_tis_spi_transfer(struct t spi_xfer.cs_change = 0; spi_xfer.len = transfer_len; spi_xfer.delay_usecs = 5; - spi_xfer.tx_buf = out; - spi_xfer.rx_buf = in; + + if (in) { + spi_xfer.tx_buf = NULL; + } else if (out) { + spi_xfer.rx_buf = NULL; + memcpy(phy->iobuf, out, transfer_len); + out += transfer_len; + } spi_message_init(&m); spi_message_add_tail(&spi_xfer, &m); @@ -121,11 +125,12 @@ static int tpm_tis_spi_transfer(struct t if (ret < 0) goto exit; - len -= transfer_len; - if (in) + if (in) { + memcpy(in, phy->iobuf, transfer_len); in += transfer_len; - if (out) - out += transfer_len; + } + + len -= transfer_len; } exit: @@ -191,6 +196,10 @@ static int tpm_tis_spi_probe(struct spi_ phy->spi_device = dev; + phy->iobuf = devm_kmalloc(&dev->dev, MAX_SPI_FRAMESIZE, GFP_KERNEL); + if (!phy->iobuf) + return -ENOMEM; + return tpm_tis_core_init(&dev->dev, &phy->priv, -1, &tpm_spi_phy_ops, NULL); }