Received: by 10.223.185.111 with SMTP id b44csp912596wrg; Fri, 9 Mar 2018 16:41:23 -0800 (PST) X-Google-Smtp-Source: AG47ELt3Qaup523aX26sS5FPpsK8eNyEIibkhGRwh637K5F5gwBrkMpbbwBuT+s0BLxZh9pU9aEZ X-Received: by 10.99.127.86 with SMTP id p22mr296242pgn.157.1520642483211; Fri, 09 Mar 2018 16:41:23 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1520642483; cv=none; d=google.com; s=arc-20160816; b=jLPuICET6CVwwVOW0frUouDwX+e2zmm0EaZzzCsdoxJMJ7BNUhSWdOdGIV2WHjOKaR HEnGGwYS+U0pNWUMG6I/mJvWsJpuuA7Kz+kmtbLtD581cf4Z+QKbMRDX00c1rDOqLbyM aeHZUjo21/iVuguko1CfWvzGhcxh8kGXFsCrqyuFuRW/YpImhQbK27JuvZSj5481bzqS yFKOIo1MzK2V4tDlagyKZOuMC4vxFX/grmOmu7izmrOLkexzq9nlZ9UVXGvAhcefhtWA /fZpzBfF48FJGHo4o5iCz2eEtO4wF5fp8oq5+D26tMZ8g0Q+gdbYrq5S6uAeP2BdJCYP bVJA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=Y8dvhkHF0JjPTZ911vmBPmvHAZKfD3hJSVVtubd24C0=; b=SBnSBAwLf0m1kgrqI5Iqx0HsFwkNIRT0ZOAGj5inEG3eZ2cl8E6DpB35zOBe00C/Qs a1j9BuJL0rUUTqCWYQ8DENtDLqSZkCu4RyPypDnaeJ7Cm0msRqvaAvX4ChUnA+6SI4dE U+sIPqPoyLno+JtY4AkJ1lJUS5rzLzALh29+mZI9HYed38Fyl05Z+PkcOISBOtxRoTEV Oko7Y066CVM5dx3ij0SowCUMyoLxV+k21TLaQXZftCJMh0wpDZLsPXMqFveW7APVhINe N8x0tChbGLuV53C4JwC80xvkZztn9DS+6wNyoeDabvpqIAdjumaBWj4kmnWc1D3FIxn1 WAfw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t75si1753178pfe.77.2018.03.09.16.41.09; Fri, 09 Mar 2018 16:41:23 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933739AbeCJAjN (ORCPT + 99 others); Fri, 9 Mar 2018 19:39:13 -0500 Received: from mail.linuxfoundation.org ([140.211.169.12]:39608 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S933117AbeCJAVd (ORCPT ); Fri, 9 Mar 2018 19:21:33 -0500 Received: from localhost (unknown [185.236.200.248]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id DE5B010F2; Sat, 10 Mar 2018 00:21:32 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jarkko Sakkinen , Alexander Steffen Subject: [PATCH 4.9 06/65] tpm_tis_spi: Use DMA-safe memory for SPI transfers Date: Fri, 9 Mar 2018 16:18:06 -0800 Message-Id: <20180310001825.441937872@linuxfoundation.org> X-Mailer: git-send-email 2.16.2 In-Reply-To: <20180310001824.927996722@linuxfoundation.org> References: <20180310001824.927996722@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.9-stable review patch. If anyone has any objections, please let me know. ------------------ From: Alexander Steffen commit 6b3a13173f23e798e1ba213dd4a2c065a3b8d751 upstream. The buffers used as tx_buf/rx_buf in a SPI transfer need to be DMA-safe. This cannot be guaranteed for the buffers passed to tpm_tis_spi_read_bytes and tpm_tis_spi_write_bytes. Therefore, we need to use our own DMA-safe buffer and copy the data to/from it. The buffer needs to be allocated separately, to ensure that it is cacheline-aligned and not shared with other data, so that DMA can work correctly. Fixes: 0edbfea537d1 ("tpm/tpm_tis_spi: Add support for spi phy") Cc: stable@vger.kernel.org Reviewed-by: Jarkko Sakkinen Signed-off-by: Alexander Steffen Signed-off-by: Jarkko Sakkinen Signed-off-by: Greg Kroah-Hartman --- drivers/char/tpm/tpm_tis_spi.c | 45 ++++++++++++++++++++++++----------------- 1 file changed, 27 insertions(+), 18 deletions(-) --- a/drivers/char/tpm/tpm_tis_spi.c +++ b/drivers/char/tpm/tpm_tis_spi.c @@ -47,9 +47,7 @@ struct tpm_tis_spi_phy { struct tpm_tis_data priv; struct spi_device *spi_device; - - u8 tx_buf[4]; - u8 rx_buf[4]; + u8 *iobuf; }; static inline struct tpm_tis_spi_phy *to_tpm_tis_spi_phy(struct tpm_tis_data *data) @@ -72,14 +70,14 @@ static int tpm_tis_spi_transfer(struct t while (len) { transfer_len = min_t(u16, len, MAX_SPI_FRAMESIZE); - phy->tx_buf[0] = (in ? 0x80 : 0) | (transfer_len - 1); - phy->tx_buf[1] = 0xd4; - phy->tx_buf[2] = addr >> 8; - phy->tx_buf[3] = addr; + phy->iobuf[0] = (in ? 0x80 : 0) | (transfer_len - 1); + phy->iobuf[1] = 0xd4; + phy->iobuf[2] = addr >> 8; + phy->iobuf[3] = addr; memset(&spi_xfer, 0, sizeof(spi_xfer)); - spi_xfer.tx_buf = phy->tx_buf; - spi_xfer.rx_buf = phy->rx_buf; + spi_xfer.tx_buf = phy->iobuf; + spi_xfer.rx_buf = phy->iobuf; spi_xfer.len = 4; spi_xfer.cs_change = 1; @@ -89,9 +87,9 @@ static int tpm_tis_spi_transfer(struct t if (ret < 0) goto exit; - if ((phy->rx_buf[3] & 0x01) == 0) { + if ((phy->iobuf[3] & 0x01) == 0) { // handle SPI wait states - phy->tx_buf[0] = 0; + phy->iobuf[0] = 0; for (i = 0; i < TPM_RETRY; i++) { spi_xfer.len = 1; @@ -100,7 +98,7 @@ static int tpm_tis_spi_transfer(struct t ret = spi_sync_locked(phy->spi_device, &m); if (ret < 0) goto exit; - if (phy->rx_buf[0] & 0x01) + if (phy->iobuf[0] & 0x01) break; } @@ -113,8 +111,14 @@ static int tpm_tis_spi_transfer(struct t spi_xfer.cs_change = 0; spi_xfer.len = transfer_len; spi_xfer.delay_usecs = 5; - spi_xfer.tx_buf = out; - spi_xfer.rx_buf = in; + + if (in) { + spi_xfer.tx_buf = NULL; + } else if (out) { + spi_xfer.rx_buf = NULL; + memcpy(phy->iobuf, out, transfer_len); + out += transfer_len; + } spi_message_init(&m); spi_message_add_tail(&spi_xfer, &m); @@ -122,11 +126,12 @@ static int tpm_tis_spi_transfer(struct t if (ret < 0) goto exit; - len -= transfer_len; - if (in) + if (in) { + memcpy(in, phy->iobuf, transfer_len); in += transfer_len; - if (out) - out += transfer_len; + } + + len -= transfer_len; } exit: @@ -192,6 +197,10 @@ static int tpm_tis_spi_probe(struct spi_ phy->spi_device = dev; + phy->iobuf = devm_kmalloc(&dev->dev, MAX_SPI_FRAMESIZE, GFP_KERNEL); + if (!phy->iobuf) + return -ENOMEM; + return tpm_tis_core_init(&dev->dev, &phy->priv, -1, &tpm_spi_phy_ops, NULL); }