1 /* 2 * Copyright (c) 2008, 2009 Michael Shalayeff 3 * Copyright (c) 2009, 2010 Hans-Joerg Hoexer 4 * All rights reserved. 5 * 6 * Permission to use, copy, modify, and distribute this software for any 7 * purpose with or without fee is hereby granted, provided that the above 8 * copyright notice and this permission notice appear in all copies. 9 * 10 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES 11 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF 12 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR 13 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES 14 * WHATSOEVER RESULTING FROM LOSS OF MIND, USE, DATA OR PROFITS, WHETHER IN 15 * AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT 16 * OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. 17 */ 18 19 /* #define TPM_DEBUG */ 20 21 #include <sys/param.h> 22 #include <sys/systm.h> 23 #include <sys/kernel.h> 24 #include <sys/malloc.h> 25 #include <sys/proc.h> 26 27 #include <sys/module.h> 28 #include <sys/conf.h> 29 #include <sys/uio.h> 30 #include <sys/bus.h> 31 32 #include <machine/bus.h> 33 #include <sys/rman.h> 34 #include <machine/resource.h> 35 36 #include <machine/md_var.h> 37 38 #include <isa/isareg.h> 39 #include <isa/isavar.h> 40 #include <dev/tpm/tpmvar.h> 41 42 43 #define TPM_BUFSIZ 1024 44 45 #define TPM_HDRSIZE 10 46 47 #define TPM_PARAM_SIZE 0x0001 48 49 #define IRQUNK -1 50 51 #define TPM_ACCESS 0x0000 /* access register */ 52 #define TPM_ACCESS_ESTABLISHMENT 0x01 /* establishment */ 53 #define TPM_ACCESS_REQUEST_USE 0x02 /* request using locality */ 54 #define TPM_ACCESS_REQUEST_PENDING 0x04 /* pending request */ 55 #define TPM_ACCESS_SEIZE 0x08 /* request locality seize */ 56 #define TPM_ACCESS_SEIZED 0x10 /* locality has been seized */ 57 #define TPM_ACCESS_ACTIVE_LOCALITY 0x20 /* locality is active */ 58 #define TPM_ACCESS_VALID 0x80 /* bits are valid */ 59 #define TPM_ACCESS_BITS \ 60 "\020\01EST\02REQ\03PEND\04SEIZE\05SEIZED\06ACT\010VALID" 61 62 #define TPM_INTERRUPT_ENABLE 0x0008 63 #define TPM_GLOBAL_INT_ENABLE 0x80000000 /* enable ints */ 64 #define TPM_CMD_READY_INT 0x00000080 /* cmd ready enable */ 65 #define TPM_INT_EDGE_FALLING 0x00000018 66 #define TPM_INT_EDGE_RISING 0x00000010 67 #define TPM_INT_LEVEL_LOW 0x00000008 68 #define TPM_INT_LEVEL_HIGH 0x00000000 69 #define TPM_LOCALITY_CHANGE_INT 0x00000004 /* locality change enable */ 70 #define TPM_STS_VALID_INT 0x00000002 /* int on TPM_STS_VALID is set */ 71 #define TPM_DATA_AVAIL_INT 0x00000001 /* int on TPM_STS_DATA_AVAIL is set */ 72 #define TPM_INTERRUPT_ENABLE_BITS \ 73 "\020\040ENA\010RDY\03LOCH\02STSV\01DRDY" 74 75 #define TPM_INT_VECTOR 0x000c /* 8 bit reg for 4 bit irq vector */ 76 #define TPM_INT_STATUS 0x0010 /* bits are & 0x87 from TPM_INTERRUPT_ENABLE */ 77 78 #define TPM_INTF_CAPABILITIES 0x0014 /* capability register */ 79 #define TPM_INTF_BURST_COUNT_STATIC 0x0100 /* TPM_STS_BMASK static */ 80 #define TPM_INTF_CMD_READY_INT 0x0080 /* int on ready supported */ 81 #define TPM_INTF_INT_EDGE_FALLING 0x0040 /* falling edge ints supported */ 82 #define TPM_INTF_INT_EDGE_RISING 0x0020 /* rising edge ints supported */ 83 #define TPM_INTF_INT_LEVEL_LOW 0x0010 /* level-low ints supported */ 84 #define TPM_INTF_INT_LEVEL_HIGH 0x0008 /* level-high ints supported */ 85 #define TPM_INTF_LOCALITY_CHANGE_INT 0x0004 /* locality-change int (mb 1) */ 86 #define TPM_INTF_STS_VALID_INT 0x0002 /* TPM_STS_VALID int supported */ 87 #define TPM_INTF_DATA_AVAIL_INT 0x0001 /* TPM_STS_DATA_AVAIL int supported (mb 1) */ 88 #define TPM_CAPSREQ \ 89 (TPM_INTF_DATA_AVAIL_INT|TPM_INTF_LOCALITY_CHANGE_INT|TPM_INTF_INT_LEVEL_LOW) 90 #define TPM_CAPBITS \ 91 "\020\01IDRDY\02ISTSV\03ILOCH\04IHIGH\05ILOW\06IEDGE\07IFALL\010IRDY\011BCST" 92 93 #define TPM_STS 0x0018 /* status register */ 94 #define TPM_STS_MASK 0x000000ff /* status bits */ 95 #define TPM_STS_BMASK 0x00ffff00 /* ro io burst size */ 96 #define TPM_STS_VALID 0x00000080 /* ro other bits are valid */ 97 #define TPM_STS_CMD_READY 0x00000040 /* rw chip/signal ready */ 98 #define TPM_STS_GO 0x00000020 /* wo start the command */ 99 #define TPM_STS_DATA_AVAIL 0x00000010 /* ro data available */ 100 #define TPM_STS_DATA_EXPECT 0x00000008 /* ro more data to be written */ 101 #define TPM_STS_RESP_RETRY 0x00000002 /* wo resend the response */ 102 #define TPM_STS_BITS "\020\010VALID\07RDY\06GO\05DRDY\04EXPECT\02RETRY" 103 104 #define TPM_DATA 0x0024 105 #define TPM_ID 0x0f00 106 #define TPM_REV 0x0f04 107 #define TPM_SIZE 0x5000 /* five pages of the above */ 108 109 #define TPM_ACCESS_TMO 2000 /* 2sec */ 110 #define TPM_READY_TMO 2000 /* 2sec */ 111 #define TPM_READ_TMO 120000 /* 2 minutes */ 112 #define TPM_BURST_TMO 2000 /* 2sec */ 113 114 #define TPM_LEGACY_BUSY 0x01 115 #define TPM_LEGACY_ABRT 0x01 116 #define TPM_LEGACY_DA 0x02 117 #define TPM_LEGACY_RE 0x04 118 #define TPM_LEGACY_LAST 0x04 119 #define TPM_LEGACY_BITS "\020\01BUSY\2DA\3RE\4LAST" 120 #define TPM_LEGACY_TMO (2*60) /* sec */ 121 #define TPM_LEGACY_SLEEP 5 /* ticks */ 122 #define TPM_LEGACY_DELAY 100 123 124 /* Set when enabling legacy interface in host bridge. */ 125 int tpm_enabled; 126 127 #define TPMSOFTC(dev) \ 128 ((struct tpm_softc *)dev->si_drv1) 129 130 d_open_t tpmopen; 131 d_close_t tpmclose; 132 d_read_t tpmread; 133 d_write_t tpmwrite; 134 d_ioctl_t tpmioctl; 135 136 static struct cdevsw tpm_cdevsw = { 137 .d_version = D_VERSION, 138 .d_flags = D_NEEDGIANT, 139 .d_open = tpmopen, 140 .d_close = tpmclose, 141 .d_read = tpmread, 142 .d_write = tpmwrite, 143 .d_ioctl = tpmioctl, 144 .d_name = "tpm", 145 }; 146 147 const struct { 148 u_int32_t devid; 149 char name[32]; 150 int flags; 151 #define TPM_DEV_NOINTS 0x0001 152 } tpm_devs[] = { 153 { 0x000615d1, "IFX SLD 9630 TT 1.1", 0 }, 154 { 0x000b15d1, "IFX SLB 9635 TT 1.2", 0 }, 155 { 0x100214e4, "Broadcom BCM0102", TPM_DEV_NOINTS }, 156 { 0x00fe1050, "WEC WPCT200", 0 }, 157 { 0x687119fa, "SNS SSX35", 0 }, 158 { 0x2e4d5453, "STM ST19WP18", 0 }, 159 { 0x32021114, "ATML 97SC3203", TPM_DEV_NOINTS }, 160 { 0x10408086, "INTEL INTC0102", 0 }, 161 { 0, "", TPM_DEV_NOINTS }, 162 }; 163 164 int tpm_tis12_irqinit(struct tpm_softc *, int, int); 165 int tpm_tis12_init(struct tpm_softc *, int, const char *); 166 int tpm_tis12_start(struct tpm_softc *, int); 167 int tpm_tis12_read(struct tpm_softc *, void *, int, size_t *, int); 168 int tpm_tis12_write(struct tpm_softc *, void *, int); 169 int tpm_tis12_end(struct tpm_softc *, int, int); 170 171 void tpm_intr(void *); 172 173 int tpm_waitfor_poll(struct tpm_softc *, u_int8_t, int, void *); 174 int tpm_waitfor_int(struct tpm_softc *, u_int8_t, int, void *, int); 175 int tpm_waitfor(struct tpm_softc *, u_int8_t, int, void *); 176 int tpm_request_locality(struct tpm_softc *, int); 177 int tpm_getburst(struct tpm_softc *); 178 u_int8_t tpm_status(struct tpm_softc *); 179 int tpm_tmotohz(int); 180 181 int tpm_legacy_probe(bus_space_tag_t, bus_addr_t); 182 int tpm_legacy_init(struct tpm_softc *, int, const char *); 183 int tpm_legacy_start(struct tpm_softc *, int); 184 int tpm_legacy_read(struct tpm_softc *, void *, int, size_t *, int); 185 int tpm_legacy_write(struct tpm_softc *, void *, int); 186 int tpm_legacy_end(struct tpm_softc *, int, int); 187 188 189 /* 190 * FreeBSD specific code for probing and attaching TPM to device tree. 191 */ 192 #if 0 193 static void 194 tpm_identify(driver_t *driver, device_t parent) 195 { 196 BUS_ADD_CHILD(parent, ISA_ORDER_SPECULATIVE, "tpm", 0); 197 } 198 #endif 199 200 int 201 tpm_attach(device_t dev) 202 { 203 struct tpm_softc *sc = device_get_softc(dev); 204 int irq; 205 206 sc->mem_rid = 0; 207 sc->mem_res = bus_alloc_resource_any(dev, SYS_RES_MEMORY, &sc->mem_rid, 208 RF_ACTIVE); 209 if (sc->mem_res == NULL) 210 return ENXIO; 211 212 sc->sc_bt = rman_get_bustag(sc->mem_res); 213 sc->sc_bh = rman_get_bushandle(sc->mem_res); 214 215 sc->irq_rid = 0; 216 sc->irq_res = bus_alloc_resource_any(dev, SYS_RES_IRQ, &sc->irq_rid, 217 RF_ACTIVE | RF_SHAREABLE); 218 if (sc->irq_res != NULL) 219 irq = rman_get_start(sc->irq_res); 220 else 221 irq = IRQUNK; 222 223 /* In case PnP probe this may contain some initialization. */ 224 tpm_tis12_probe(sc->sc_bt, sc->sc_bh); 225 226 if (tpm_legacy_probe(sc->sc_bt, sc->sc_bh)) { 227 sc->sc_init = tpm_legacy_init; 228 sc->sc_start = tpm_legacy_start; 229 sc->sc_read = tpm_legacy_read; 230 sc->sc_write = tpm_legacy_write; 231 sc->sc_end = tpm_legacy_end; 232 } else { 233 sc->sc_init = tpm_tis12_init; 234 sc->sc_start = tpm_tis12_start; 235 sc->sc_read = tpm_tis12_read; 236 sc->sc_write = tpm_tis12_write; 237 sc->sc_end = tpm_tis12_end; 238 } 239 240 printf("%s", device_get_name(dev)); 241 if ((sc->sc_init)(sc, irq, "tpm")) { 242 tpm_detach(dev); 243 return ENXIO; 244 } 245 246 if (sc->sc_init == tpm_tis12_init && sc->irq_res != NULL && 247 bus_setup_intr(dev, sc->irq_res, INTR_TYPE_TTY, NULL, 248 tpm_intr, sc, &sc->intr_cookie) != 0) { 249 tpm_detach(dev); 250 printf(": cannot establish interrupt\n"); 251 return 1; 252 } 253 254 sc->sc_cdev = make_dev(&tpm_cdevsw, device_get_unit(dev), 255 UID_ROOT, GID_WHEEL, 0600, "tpm"); 256 sc->sc_cdev->si_drv1 = sc; 257 258 return 0; 259 } 260 261 int 262 tpm_detach(device_t dev) 263 { 264 struct tpm_softc * sc = device_get_softc(dev); 265 266 if(sc->intr_cookie){ 267 bus_teardown_intr(dev, sc->irq_res, sc->intr_cookie); 268 } 269 270 if(sc->mem_res){ 271 bus_release_resource(dev, SYS_RES_MEMORY, 272 sc->mem_rid, sc->mem_res); 273 } 274 275 if(sc->irq_res){ 276 bus_release_resource(dev, SYS_RES_IRQ, 277 sc->irq_rid, sc->irq_res); 278 } 279 if(sc->sc_cdev){ 280 destroy_dev(sc->sc_cdev); 281 } 282 283 return 0; 284 } 285 286 287 /* Probe TPM using TIS 1.2 interface. */ 288 int 289 tpm_tis12_probe(bus_space_tag_t bt, bus_space_handle_t bh) 290 { 291 u_int32_t r; 292 u_int8_t save, reg; 293 294 r = bus_space_read_4(bt, bh, TPM_INTF_CAPABILITIES); 295 if (r == 0xffffffff) 296 return 0; 297 298 #ifdef TPM_DEBUG 299 printf("tpm: caps=%b\n", r, TPM_CAPBITS); 300 #endif 301 if ((r & TPM_CAPSREQ) != TPM_CAPSREQ || 302 !(r & (TPM_INTF_INT_EDGE_RISING | TPM_INTF_INT_LEVEL_LOW))) { 303 #ifdef TPM_DEBUG 304 printf("tpm: caps too low (caps=%b)\n", r, TPM_CAPBITS); 305 #endif 306 return 0; 307 } 308 309 save = bus_space_read_1(bt, bh, TPM_ACCESS); 310 bus_space_write_1(bt, bh, TPM_ACCESS, TPM_ACCESS_REQUEST_USE); 311 reg = bus_space_read_1(bt, bh, TPM_ACCESS); 312 if ((reg & TPM_ACCESS_VALID) && (reg & TPM_ACCESS_ACTIVE_LOCALITY) && 313 bus_space_read_4(bt, bh, TPM_ID) != 0xffffffff) 314 return 1; 315 316 bus_space_write_1(bt, bh, TPM_ACCESS, save); 317 return 0; 318 } 319 320 /* 321 * Setup interrupt vector if one is provided and interrupts are know to 322 * work on that particular chip. 323 */ 324 int 325 tpm_tis12_irqinit(struct tpm_softc *sc, int irq, int idx) 326 { 327 u_int32_t r; 328 329 if ((irq == IRQUNK) || (tpm_devs[idx].flags & TPM_DEV_NOINTS)) { 330 sc->sc_vector = IRQUNK; 331 return 0; 332 } 333 334 /* Ack and disable all interrupts. */ 335 bus_space_write_4(sc->sc_bt, sc->sc_bh, TPM_INTERRUPT_ENABLE, 336 bus_space_read_4(sc->sc_bt, sc->sc_bh, TPM_INTERRUPT_ENABLE) & 337 ~TPM_GLOBAL_INT_ENABLE); 338 bus_space_write_4(sc->sc_bt, sc->sc_bh, TPM_INT_STATUS, 339 bus_space_read_4(sc->sc_bt, sc->sc_bh, TPM_INT_STATUS)); 340 341 /* Program interrupt vector. */ 342 bus_space_write_1(sc->sc_bt, sc->sc_bh, TPM_INT_VECTOR, irq); 343 sc->sc_vector = irq; 344 345 /* Program interrupt type. */ 346 if (sc->sc_capabilities & TPM_INTF_INT_EDGE_RISING) 347 r = TPM_INT_EDGE_RISING; 348 else if (sc->sc_capabilities & TPM_INTF_INT_LEVEL_HIGH) 349 r = TPM_INT_LEVEL_HIGH; 350 else 351 r = TPM_INT_LEVEL_LOW; 352 bus_space_write_4(sc->sc_bt, sc->sc_bh, TPM_INTERRUPT_ENABLE, r); 353 354 return 0; 355 } 356 357 /* Setup TPM using TIS 1.2 interface. */ 358 int 359 tpm_tis12_init(struct tpm_softc *sc, int irq, const char *name) 360 { 361 u_int32_t r; 362 int i; 363 364 r = bus_space_read_4(sc->sc_bt, sc->sc_bh, TPM_INTF_CAPABILITIES); 365 #ifdef TPM_DEBUG 366 printf(" caps=%b ", r, TPM_CAPBITS); 367 #endif 368 if ((r & TPM_CAPSREQ) != TPM_CAPSREQ || 369 !(r & (TPM_INTF_INT_EDGE_RISING | TPM_INTF_INT_LEVEL_LOW))) { 370 printf(": capabilities too low (caps=%b)\n", r, TPM_CAPBITS); 371 return 1; 372 } 373 sc->sc_capabilities = r; 374 375 sc->sc_devid = bus_space_read_4(sc->sc_bt, sc->sc_bh, TPM_ID); 376 sc->sc_rev = bus_space_read_1(sc->sc_bt, sc->sc_bh, TPM_REV); 377 378 for (i = 0; tpm_devs[i].devid; i++) 379 if (tpm_devs[i].devid == sc->sc_devid) 380 break; 381 382 if (tpm_devs[i].devid) 383 printf(": %s rev 0x%x\n", tpm_devs[i].name, sc->sc_rev); 384 else 385 printf(": device 0x%08x rev 0x%x\n", sc->sc_devid, sc->sc_rev); 386 387 if (tpm_tis12_irqinit(sc, irq, i)) 388 return 1; 389 390 if (tpm_request_locality(sc, 0)) 391 return 1; 392 393 /* Abort whatever it thought it was doing. */ 394 bus_space_write_1(sc->sc_bt, sc->sc_bh, TPM_STS, TPM_STS_CMD_READY); 395 396 return 0; 397 } 398 399 int 400 tpm_request_locality(struct tpm_softc *sc, int l) 401 { 402 u_int32_t r; 403 int to, rv; 404 405 if (l != 0) 406 return EINVAL; 407 408 if ((bus_space_read_1(sc->sc_bt, sc->sc_bh, TPM_ACCESS) & 409 (TPM_ACCESS_VALID | TPM_ACCESS_ACTIVE_LOCALITY)) == 410 (TPM_ACCESS_VALID | TPM_ACCESS_ACTIVE_LOCALITY)) 411 return 0; 412 413 bus_space_write_1(sc->sc_bt, sc->sc_bh, TPM_ACCESS, 414 TPM_ACCESS_REQUEST_USE); 415 416 to = tpm_tmotohz(TPM_ACCESS_TMO); 417 418 while ((r = bus_space_read_1(sc->sc_bt, sc->sc_bh, TPM_ACCESS) & 419 (TPM_ACCESS_VALID | TPM_ACCESS_ACTIVE_LOCALITY)) != 420 (TPM_ACCESS_VALID | TPM_ACCESS_ACTIVE_LOCALITY) && to--) { 421 rv = tsleep(sc->sc_init, PRIBIO | PCATCH, "tpm_locality", 1); 422 if (rv && rv != EWOULDBLOCK) { 423 #ifdef TPM_DEBUG 424 printf("tpm_request_locality: interrupted %d\n", rv); 425 #endif 426 return rv; 427 } 428 } 429 430 if ((r & (TPM_ACCESS_VALID | TPM_ACCESS_ACTIVE_LOCALITY)) != 431 (TPM_ACCESS_VALID | TPM_ACCESS_ACTIVE_LOCALITY)) { 432 #ifdef TPM_DEBUG 433 printf("tpm_request_locality: access %b\n", r, TPM_ACCESS_BITS); 434 #endif 435 return EBUSY; 436 } 437 438 return 0; 439 } 440 441 int 442 tpm_getburst(struct tpm_softc *sc) 443 { 444 int burst, to, rv; 445 446 to = tpm_tmotohz(TPM_BURST_TMO); 447 448 burst = 0; 449 while (burst == 0 && to--) { 450 /* 451 * Burst count has to be read from bits 8 to 23 without 452 * touching any other bits, eg. the actual status bits 0 453 * to 7. 454 */ 455 burst = bus_space_read_1(sc->sc_bt, sc->sc_bh, TPM_STS + 1); 456 burst |= bus_space_read_1(sc->sc_bt, sc->sc_bh, TPM_STS + 2) 457 << 8; 458 #ifdef TPM_DEBUG 459 printf("tpm_getburst: read %d\n", burst); 460 #endif 461 if (burst) 462 return burst; 463 464 rv = tsleep(sc, PRIBIO | PCATCH, "tpm_getburst", 1); 465 if (rv && rv != EWOULDBLOCK) { 466 return 0; 467 } 468 } 469 470 return 0; 471 } 472 473 u_int8_t 474 tpm_status(struct tpm_softc *sc) 475 { 476 u_int8_t status; 477 478 status = bus_space_read_1(sc->sc_bt, sc->sc_bh, TPM_STS) & 479 TPM_STS_MASK; 480 481 return status; 482 } 483 484 int 485 tpm_tmotohz(int tmo) 486 { 487 struct timeval tv; 488 489 tv.tv_sec = tmo / 1000; 490 tv.tv_usec = 1000 * (tmo % 1000); 491 492 return tvtohz(&tv); 493 } 494 495 /* Save TPM state on suspend. */ 496 int 497 tpm_suspend(device_t dev) 498 { 499 struct tpm_softc *sc = device_get_softc(dev); 500 int why = 1; 501 u_int8_t command[] = { 502 0, 193, /* TPM_TAG_RQU_COMMAND */ 503 0, 0, 0, 10, /* Length in bytes */ 504 0, 0, 0, 156 /* TPM_ORD_SaveStates */ 505 }; 506 507 /* 508 * Power down: We have to issue the SaveStates command. 509 */ 510 sc->sc_write(sc, &command, sizeof(command)); 511 sc->sc_read(sc, &command, sizeof(command), NULL, TPM_HDRSIZE); 512 #ifdef TPM_DEBUG 513 printf("tpm_suspend: power down: %d -> %d\n", sc->sc_suspend, why); 514 #endif 515 sc->sc_suspend = why; 516 517 return 0; 518 } 519 520 /* 521 * Handle resume event. Actually nothing to do as the BIOS is supposed 522 * to restore the previously saved state. 523 */ 524 int 525 tpm_resume(device_t dev) 526 { 527 struct tpm_softc *sc = device_get_softc(dev); 528 int why = 0; 529 #ifdef TPM_DEBUG 530 printf("tpm_resume: resume: %d -> %d\n", sc->sc_suspend, why); 531 #endif 532 sc->sc_suspend = why; 533 534 return 0; 535 } 536 537 /* Dispatch suspend and resume events. */ 538 539 /* Wait for given status bits using polling. */ 540 int 541 tpm_waitfor_poll(struct tpm_softc *sc, u_int8_t mask, int tmo, void *c) 542 { 543 int rv; 544 545 /* 546 * Poll until either the requested condition or a time out is 547 * met. 548 */ 549 while (((sc->sc_stat = tpm_status(sc)) & mask) != mask && tmo--) { 550 rv = tsleep(c, PRIBIO | PCATCH, "tpm_poll", 1); 551 if (rv && rv != EWOULDBLOCK) { 552 #ifdef TPM_DEBUG 553 printf("tpm_waitfor_poll: interrupted %d\n", rv); 554 #endif 555 return rv; 556 } 557 } 558 559 return 0; 560 } 561 562 /* Wait for given status bits using interrupts. */ 563 int 564 tpm_waitfor_int(struct tpm_softc *sc, u_int8_t mask, int tmo, void *c, 565 int inttype) 566 { 567 int rv, to; 568 569 /* Poll and return when condition is already met. */ 570 sc->sc_stat = tpm_status(sc); 571 if ((sc->sc_stat & mask) == mask) 572 return 0; 573 574 /* 575 * Enable interrupt on tpm chip. Note that interrupts on our 576 * level (SPL_TTY) are disabled (see tpm{read,write} et al) and 577 * will not be delivered to the cpu until we call tsleep(9) below. 578 */ 579 bus_space_write_4(sc->sc_bt, sc->sc_bh, TPM_INTERRUPT_ENABLE, 580 bus_space_read_4(sc->sc_bt, sc->sc_bh, TPM_INTERRUPT_ENABLE) | 581 inttype); 582 bus_space_write_4(sc->sc_bt, sc->sc_bh, TPM_INTERRUPT_ENABLE, 583 bus_space_read_4(sc->sc_bt, sc->sc_bh, TPM_INTERRUPT_ENABLE) | 584 TPM_GLOBAL_INT_ENABLE); 585 586 /* 587 * Poll once more to remedy the race between previous polling 588 * and enabling interrupts on the tpm chip. 589 */ 590 sc->sc_stat = tpm_status(sc); 591 if ((sc->sc_stat & mask) == mask) { 592 rv = 0; 593 goto out; 594 } 595 596 to = tpm_tmotohz(tmo); 597 #ifdef TPM_DEBUG 598 printf("tpm_waitfor_int: sleeping for %d ticks on %p\n", to, c); 599 #endif 600 /* 601 * tsleep(9) enables interrupts on the cpu and returns after 602 * wake up with interrupts disabled again. Note that interrupts 603 * generated by the tpm chip while being at SPL_TTY are not lost 604 * but held and delivered as soon as the cpu goes below SPL_TTY. 605 */ 606 rv = tsleep(c, PRIBIO | PCATCH, "tpm_intr", to); 607 608 sc->sc_stat = tpm_status(sc); 609 #ifdef TPM_DEBUG 610 printf("tpm_waitfor_int: woke up with rv %d stat %b\n", rv, 611 sc->sc_stat, TPM_STS_BITS); 612 #endif 613 if ((sc->sc_stat & mask) == mask) 614 rv = 0; 615 616 /* Disable interrupts on tpm chip again. */ 617 out: bus_space_write_4(sc->sc_bt, sc->sc_bh, TPM_INTERRUPT_ENABLE, 618 bus_space_read_4(sc->sc_bt, sc->sc_bh, TPM_INTERRUPT_ENABLE) & 619 ~TPM_GLOBAL_INT_ENABLE); 620 bus_space_write_4(sc->sc_bt, sc->sc_bh, TPM_INTERRUPT_ENABLE, 621 bus_space_read_4(sc->sc_bt, sc->sc_bh, TPM_INTERRUPT_ENABLE) & 622 ~inttype); 623 624 return rv; 625 } 626 627 /* 628 * Wait on given status bits, uses interrupts where possible, otherwise polls. 629 */ 630 int 631 tpm_waitfor(struct tpm_softc *sc, u_int8_t b0, int tmo, void *c) 632 { 633 u_int8_t b; 634 int re, to, rv; 635 636 #ifdef TPM_DEBUG 637 printf("tpm_waitfor: b0 %b\n", b0, TPM_STS_BITS); 638 #endif 639 640 /* 641 * If possible, use interrupts, otherwise poll. 642 * 643 * We use interrupts for TPM_STS_VALID and TPM_STS_DATA_AVAIL (if 644 * the tpm chips supports them) as waiting for those can take 645 * really long. The other TPM_STS* are not needed very often 646 * so we do not support them. 647 */ 648 if (sc->sc_vector != IRQUNK) { 649 b = b0; 650 651 /* 652 * Wait for data ready. This interrupt only occurs 653 * when both TPM_STS_VALID and TPM_STS_DATA_AVAIL are asserted. 654 * Thus we don't have to bother with TPM_STS_VALID 655 * separately and can just return. 656 * 657 * This only holds for interrupts! When using polling 658 * both flags have to be waited for, see below. 659 */ 660 if ((b & TPM_STS_DATA_AVAIL) && (sc->sc_capabilities & 661 TPM_INTF_DATA_AVAIL_INT)) 662 return tpm_waitfor_int(sc, b, tmo, c, 663 TPM_DATA_AVAIL_INT); 664 665 /* Wait for status valid bit. */ 666 if ((b & TPM_STS_VALID) && (sc->sc_capabilities & 667 TPM_INTF_STS_VALID_INT)) { 668 rv = tpm_waitfor_int(sc, b, tmo, c, TPM_STS_VALID_INT); 669 if (rv != 0) 670 return rv; 671 else 672 b = b0 & ~TPM_STS_VALID; 673 } 674 675 /* 676 * When all flags are taken care of, return. Otherwise 677 * use polling for eg. TPM_STS_CMD_READY. 678 */ 679 if (b == 0) 680 return 0; 681 } 682 683 re = 3; 684 restart: 685 /* 686 * If requested wait for TPM_STS_VALID before dealing with 687 * any other flag. Eg. when both TPM_STS_DATA_AVAIL and TPM_STS_VALID 688 * are requested, wait for the latter first. 689 */ 690 b = b0; 691 if (b0 & TPM_STS_VALID) 692 b = TPM_STS_VALID; 693 694 to = tpm_tmotohz(tmo); 695 again: 696 if ((rv = tpm_waitfor_poll(sc, b, to, c)) != 0) 697 return rv; 698 699 if ((b & sc->sc_stat) == TPM_STS_VALID) { 700 /* Now wait for other flags. */ 701 b = b0 & ~TPM_STS_VALID; 702 to++; 703 goto again; 704 } 705 706 if ((sc->sc_stat & b) != b) { 707 #ifdef TPM_DEBUG 708 printf("tpm_waitfor: timeout: stat=%b b=%b\n", 709 sc->sc_stat, TPM_STS_BITS, b, TPM_STS_BITS); 710 #endif 711 if (re-- && (b0 & TPM_STS_VALID)) { 712 bus_space_write_1(sc->sc_bt, sc->sc_bh, TPM_STS, 713 TPM_STS_RESP_RETRY); 714 goto restart; 715 } 716 return EIO; 717 } 718 719 return 0; 720 } 721 722 /* Start transaction. */ 723 int 724 tpm_tis12_start(struct tpm_softc *sc, int flag) 725 { 726 int rv; 727 728 if (flag == UIO_READ) { 729 rv = tpm_waitfor(sc, TPM_STS_DATA_AVAIL | TPM_STS_VALID, 730 TPM_READ_TMO, sc->sc_read); 731 return rv; 732 } 733 734 /* Own our (0th) locality. */ 735 if ((rv = tpm_request_locality(sc, 0)) != 0) 736 return rv; 737 738 sc->sc_stat = tpm_status(sc); 739 if (sc->sc_stat & TPM_STS_CMD_READY) { 740 #ifdef TPM_DEBUG 741 printf("tpm_tis12_start: UIO_WRITE status %b\n", sc->sc_stat, 742 TPM_STS_BITS); 743 #endif 744 return 0; 745 } 746 747 #ifdef TPM_DEBUG 748 printf("tpm_tis12_start: UIO_WRITE readying chip\n"); 749 #endif 750 751 /* Abort previous and restart. */ 752 bus_space_write_1(sc->sc_bt, sc->sc_bh, TPM_STS, TPM_STS_CMD_READY); 753 if ((rv = tpm_waitfor(sc, TPM_STS_CMD_READY, TPM_READY_TMO, 754 sc->sc_write))) { 755 #ifdef TPM_DEBUG 756 printf("tpm_tis12_start: UIO_WRITE readying failed %d\n", rv); 757 #endif 758 return rv; 759 } 760 761 #ifdef TPM_DEBUG 762 printf("tpm_tis12_start: UIO_WRITE readying done\n"); 763 #endif 764 765 return 0; 766 } 767 768 int 769 tpm_tis12_read(struct tpm_softc *sc, void *buf, int len, size_t *count, 770 int flags) 771 { 772 u_int8_t *p = buf; 773 size_t cnt; 774 int rv, n, bcnt; 775 776 #ifdef TPM_DEBUG 777 printf("tpm_tis12_read: len %d\n", len); 778 #endif 779 cnt = 0; 780 while (len > 0) { 781 if ((rv = tpm_waitfor(sc, TPM_STS_DATA_AVAIL | TPM_STS_VALID, 782 TPM_READ_TMO, sc->sc_read))) 783 return rv; 784 785 bcnt = tpm_getburst(sc); 786 n = MIN(len, bcnt); 787 #ifdef TPM_DEBUG 788 printf("tpm_tis12_read: fetching %d, burst is %d\n", n, bcnt); 789 #endif 790 for (; n--; len--) { 791 *p++ = bus_space_read_1(sc->sc_bt, sc->sc_bh, TPM_DATA); 792 cnt++; 793 } 794 795 if ((flags & TPM_PARAM_SIZE) == 0 && cnt >= 6) 796 break; 797 } 798 #ifdef TPM_DEBUG 799 printf("tpm_tis12_read: read %zd bytes, len %d\n", cnt, len); 800 #endif 801 802 if (count) 803 *count = cnt; 804 805 return 0; 806 } 807 808 int 809 tpm_tis12_write(struct tpm_softc *sc, void *buf, int len) 810 { 811 u_int8_t *p = buf; 812 size_t cnt; 813 int rv, r; 814 815 #ifdef TPM_DEBUG 816 printf("tpm_tis12_write: sc %p buf %p len %d\n", sc, buf, len); 817 #endif 818 819 if ((rv = tpm_request_locality(sc, 0)) != 0) 820 return rv; 821 822 cnt = 0; 823 while (cnt < len - 1) { 824 for (r = tpm_getburst(sc); r > 0 && cnt < len - 1; r--) { 825 bus_space_write_1(sc->sc_bt, sc->sc_bh, TPM_DATA, *p++); 826 cnt++; 827 } 828 if ((rv = tpm_waitfor(sc, TPM_STS_VALID, TPM_READ_TMO, sc))) { 829 #ifdef TPM_DEBUG 830 printf("tpm_tis12_write: failed burst rv %d\n", rv); 831 #endif 832 return rv; 833 } 834 sc->sc_stat = tpm_status(sc); 835 if (!(sc->sc_stat & TPM_STS_DATA_EXPECT)) { 836 #ifdef TPM_DEBUG 837 printf("tpm_tis12_write: failed rv %d stat=%b\n", rv, 838 sc->sc_stat, TPM_STS_BITS); 839 #endif 840 return EIO; 841 } 842 } 843 844 bus_space_write_1(sc->sc_bt, sc->sc_bh, TPM_DATA, *p++); 845 cnt++; 846 847 if ((rv = tpm_waitfor(sc, TPM_STS_VALID, TPM_READ_TMO, sc))) { 848 #ifdef TPM_DEBUG 849 printf("tpm_tis12_write: failed last byte rv %d\n", rv); 850 #endif 851 return rv; 852 } 853 if ((sc->sc_stat & TPM_STS_DATA_EXPECT) != 0) { 854 #ifdef TPM_DEBUG 855 printf("tpm_tis12_write: failed rv %d stat=%b\n", rv, 856 sc->sc_stat, TPM_STS_BITS); 857 #endif 858 return EIO; 859 } 860 861 #ifdef TPM_DEBUG 862 printf("tpm_tis12_write: wrote %d byte\n", cnt); 863 #endif 864 865 return 0; 866 } 867 868 /* Finish transaction. */ 869 int 870 tpm_tis12_end(struct tpm_softc *sc, int flag, int err) 871 { 872 int rv = 0; 873 874 if (flag == UIO_READ) { 875 if ((rv = tpm_waitfor(sc, TPM_STS_VALID, TPM_READ_TMO, 876 sc->sc_read))) 877 return rv; 878 879 /* Still more data? */ 880 sc->sc_stat = tpm_status(sc); 881 if (!err && ((sc->sc_stat & TPM_STS_DATA_AVAIL) == TPM_STS_DATA_AVAIL)) { 882 #ifdef TPM_DEBUG 883 printf("tpm_tis12_end: read failed stat=%b\n", 884 sc->sc_stat, TPM_STS_BITS); 885 #endif 886 rv = EIO; 887 } 888 889 bus_space_write_1(sc->sc_bt, sc->sc_bh, TPM_STS, 890 TPM_STS_CMD_READY); 891 892 /* Release our (0th) locality. */ 893 bus_space_write_1(sc->sc_bt, sc->sc_bh,TPM_ACCESS, 894 TPM_ACCESS_ACTIVE_LOCALITY); 895 } else { 896 /* Hungry for more? */ 897 sc->sc_stat = tpm_status(sc); 898 if (!err && (sc->sc_stat & TPM_STS_DATA_EXPECT)) { 899 #ifdef TPM_DEBUG 900 printf("tpm_tis12_end: write failed stat=%b\n", 901 sc->sc_stat, TPM_STS_BITS); 902 #endif 903 rv = EIO; 904 } 905 906 bus_space_write_1(sc->sc_bt, sc->sc_bh, TPM_STS, 907 err ? TPM_STS_CMD_READY : TPM_STS_GO); 908 } 909 910 return rv; 911 } 912 913 void 914 tpm_intr(void *v) 915 { 916 struct tpm_softc *sc = v; 917 u_int32_t r; 918 #ifdef TPM_DEBUG 919 static int cnt = 0; 920 #endif 921 922 r = bus_space_read_4(sc->sc_bt, sc->sc_bh, TPM_INT_STATUS); 923 #ifdef TPM_DEBUG 924 if (r != 0) 925 printf("tpm_intr: int=%b (%d)\n", r, TPM_INTERRUPT_ENABLE_BITS, 926 cnt); 927 else 928 cnt++; 929 #endif 930 if (!(r & (TPM_CMD_READY_INT | TPM_LOCALITY_CHANGE_INT | 931 TPM_STS_VALID_INT | TPM_DATA_AVAIL_INT))) 932 return; 933 if (r & TPM_STS_VALID_INT) 934 wakeup(sc); 935 936 if (r & TPM_CMD_READY_INT) 937 wakeup(sc->sc_write); 938 939 if (r & TPM_DATA_AVAIL_INT) 940 wakeup(sc->sc_read); 941 942 if (r & TPM_LOCALITY_CHANGE_INT) 943 wakeup(sc->sc_init); 944 945 bus_space_write_4(sc->sc_bt, sc->sc_bh, TPM_INT_STATUS, r); 946 947 return; 948 } 949 950 /* Read single byte using legacy interface. */ 951 static inline u_int8_t 952 tpm_legacy_in(bus_space_tag_t iot, bus_space_handle_t ioh, int reg) 953 { 954 bus_space_write_1(iot, ioh, 0, reg); 955 return bus_space_read_1(iot, ioh, 1); 956 } 957 958 #if 0 959 /* Write single byte using legacy interface. */ 960 static inline void 961 tpm_legacy_out(bus_space_tag_t iot, bus_space_handle_t ioh, int reg, u_int8_t v) 962 { 963 bus_space_write_1(iot, ioh, 0, reg); 964 bus_space_write_1(iot, ioh, 1, v); 965 } 966 #endif 967 968 /* Probe for TPM using legacy interface. */ 969 int 970 tpm_legacy_probe(bus_space_tag_t iot, bus_addr_t iobase) 971 { 972 bus_space_handle_t ioh; 973 u_int8_t r, v; 974 int i, rv = 0; 975 char id[8]; 976 977 if (!tpm_enabled || iobase == -1) 978 return 0; 979 980 if (bus_space_map(iot, iobase, 2, 0, &ioh)) 981 return 0; 982 983 v = bus_space_read_1(iot, ioh, 0); 984 if (v == 0xff) { 985 bus_space_unmap(iot, ioh, 2); 986 return 0; 987 } 988 r = bus_space_read_1(iot, ioh, 1); 989 990 for (i = sizeof(id); i--; ) 991 id[i] = tpm_legacy_in(iot, ioh, TPM_ID + i); 992 993 #ifdef TPM_DEBUG 994 printf("tpm_legacy_probe %.4s %d.%d.%d.%d\n", 995 &id[4], id[0], id[1], id[2], id[3]); 996 #endif 997 /* 998 * The only chips using the legacy interface we are aware of are 999 * by Atmel. For other chips more signature would have to be added. 1000 */ 1001 if (!bcmp(&id[4], "ATML", 4)) 1002 rv = 1; 1003 1004 if (!rv) { 1005 bus_space_write_1(iot, ioh, r, 1); 1006 bus_space_write_1(iot, ioh, v, 0); 1007 } 1008 bus_space_unmap(iot, ioh, 2); 1009 1010 return rv; 1011 } 1012 1013 /* Setup TPM using legacy interface. */ 1014 int 1015 tpm_legacy_init(struct tpm_softc *sc, int irq, const char *name) 1016 { 1017 char id[8]; 1018 int i; 1019 1020 if ((i = bus_space_map(sc->sc_batm, tpm_enabled, 2, 0, &sc->sc_bahm))) { 1021 printf(": cannot map tpm registers (%d)\n", i); 1022 tpm_enabled = 0; 1023 return 1; 1024 } 1025 1026 for (i = sizeof(id); i--; ) 1027 id[i] = tpm_legacy_in(sc->sc_bt, sc->sc_bh, TPM_ID + i); 1028 1029 printf(": %.4s %d.%d @0x%x\n", &id[4], id[0], id[1], tpm_enabled); 1030 tpm_enabled = 0; 1031 1032 return 0; 1033 } 1034 1035 /* Start transaction. */ 1036 int 1037 tpm_legacy_start(struct tpm_softc *sc, int flag) 1038 { 1039 struct timeval tv; 1040 u_int8_t bits, r; 1041 int to, rv; 1042 1043 bits = flag == UIO_READ ? TPM_LEGACY_DA : 0; 1044 tv.tv_sec = TPM_LEGACY_TMO; 1045 tv.tv_usec = 0; 1046 to = tvtohz(&tv) / TPM_LEGACY_SLEEP; 1047 while (((r = bus_space_read_1(sc->sc_batm, sc->sc_bahm, 1)) & 1048 (TPM_LEGACY_BUSY|bits)) != bits && to--) { 1049 rv = tsleep(sc, PRIBIO | PCATCH, "legacy_tpm_start", 1050 TPM_LEGACY_SLEEP); 1051 if (rv && rv != EWOULDBLOCK) 1052 return rv; 1053 } 1054 1055 if ((r & (TPM_LEGACY_BUSY|bits)) != bits) 1056 return EIO; 1057 1058 return 0; 1059 } 1060 1061 int 1062 tpm_legacy_read(struct tpm_softc *sc, void *buf, int len, size_t *count, 1063 int flags) 1064 { 1065 u_int8_t *p; 1066 size_t cnt; 1067 int to, rv; 1068 1069 cnt = rv = 0; 1070 for (p = buf; !rv && len > 0; len--) { 1071 for (to = 1000; 1072 !(bus_space_read_1(sc->sc_batm, sc->sc_bahm, 1) & 1073 TPM_LEGACY_DA); DELAY(1)) 1074 if (!to--) 1075 return EIO; 1076 1077 DELAY(TPM_LEGACY_DELAY); 1078 *p++ = bus_space_read_1(sc->sc_batm, sc->sc_bahm, 0); 1079 cnt++; 1080 } 1081 1082 *count = cnt; 1083 return 0; 1084 } 1085 1086 int 1087 tpm_legacy_write(struct tpm_softc *sc, void *buf, int len) 1088 { 1089 u_int8_t *p; 1090 int n; 1091 1092 for (p = buf, n = len; n--; DELAY(TPM_LEGACY_DELAY)) { 1093 if (!n && len != TPM_BUFSIZ) { 1094 bus_space_write_1(sc->sc_batm, sc->sc_bahm, 1, 1095 TPM_LEGACY_LAST); 1096 DELAY(TPM_LEGACY_DELAY); 1097 } 1098 bus_space_write_1(sc->sc_batm, sc->sc_bahm, 0, *p++); 1099 } 1100 1101 return 0; 1102 } 1103 1104 /* Finish transaction. */ 1105 int 1106 tpm_legacy_end(struct tpm_softc *sc, int flag, int rv) 1107 { 1108 struct timeval tv; 1109 u_int8_t r; 1110 int to; 1111 1112 if (rv || flag == UIO_READ) 1113 bus_space_write_1(sc->sc_batm, sc->sc_bahm, 1, TPM_LEGACY_ABRT); 1114 else { 1115 tv.tv_sec = TPM_LEGACY_TMO; 1116 tv.tv_usec = 0; 1117 to = tvtohz(&tv) / TPM_LEGACY_SLEEP; 1118 while(((r = bus_space_read_1(sc->sc_batm, sc->sc_bahm, 1)) & 1119 TPM_LEGACY_BUSY) && to--) { 1120 rv = tsleep(sc, PRIBIO | PCATCH, "legacy_tpm_end", 1121 TPM_LEGACY_SLEEP); 1122 if (rv && rv != EWOULDBLOCK) 1123 return rv; 1124 } 1125 1126 if (r & TPM_LEGACY_BUSY) 1127 return EIO; 1128 1129 if (r & TPM_LEGACY_RE) 1130 return EIO; /* XXX Retry the loop? */ 1131 } 1132 1133 return rv; 1134 } 1135 1136 int 1137 tpmopen(struct cdev *dev, int flag, int mode, struct thread *td) 1138 { 1139 struct tpm_softc *sc = TPMSOFTC(dev); 1140 1141 if (!sc) 1142 return ENXIO; 1143 1144 if (sc->sc_flags & TPM_OPEN) 1145 return EBUSY; 1146 1147 sc->sc_flags |= TPM_OPEN; 1148 1149 return 0; 1150 } 1151 1152 int 1153 tpmclose(struct cdev *dev, int flag, int mode, struct thread *td) 1154 { 1155 struct tpm_softc *sc = TPMSOFTC(dev); 1156 1157 if (!sc) 1158 return ENXIO; 1159 1160 if (!(sc->sc_flags & TPM_OPEN)) 1161 return EINVAL; 1162 1163 sc->sc_flags &= ~TPM_OPEN; 1164 1165 return 0; 1166 } 1167 1168 int 1169 tpmread(struct cdev *dev, struct uio *uio, int flags) 1170 { 1171 struct tpm_softc *sc = TPMSOFTC(dev); 1172 u_int8_t buf[TPM_BUFSIZ], *p; 1173 size_t cnt; 1174 int n, len, rv, s; 1175 1176 if (!sc) 1177 return ENXIO; 1178 1179 s = spltty(); 1180 if ((rv = (sc->sc_start)(sc, UIO_READ))) { 1181 splx(s); 1182 return rv; 1183 } 1184 1185 #ifdef TPM_DEBUG 1186 printf("tpmread: getting header\n"); 1187 #endif 1188 if ((rv = (sc->sc_read)(sc, buf, TPM_HDRSIZE, &cnt, 0))) { 1189 (sc->sc_end)(sc, UIO_READ, rv); 1190 splx(s); 1191 return rv; 1192 } 1193 1194 len = (buf[2] << 24) | (buf[3] << 16) | (buf[4] << 8) | buf[5]; 1195 #ifdef TPM_DEBUG 1196 printf("tpmread: len %d, io count %d\n", len, uio->uio_resid); 1197 #endif 1198 if (len > uio->uio_resid) { 1199 rv = EIO; 1200 (sc->sc_end)(sc, UIO_READ, rv); 1201 #ifdef TPM_DEBUG 1202 printf("tpmread: bad residual io count 0x%x\n", uio->uio_resid); 1203 #endif 1204 splx(s); 1205 return rv; 1206 } 1207 1208 /* Copy out header. */ 1209 if ((rv = uiomove((caddr_t)buf, cnt, uio))) { 1210 (sc->sc_end)(sc, UIO_READ, rv); 1211 splx(s); 1212 return rv; 1213 } 1214 1215 /* Get remaining part of the answer (if anything is left). */ 1216 for (len -= cnt, p = buf, n = sizeof(buf); len > 0; p = buf, len -= n, 1217 n = sizeof(buf)) { 1218 n = MIN(n, len); 1219 #ifdef TPM_DEBUG 1220 printf("tpmread: n %d len %d\n", n, len); 1221 #endif 1222 if ((rv = (sc->sc_read)(sc, p, n, NULL, TPM_PARAM_SIZE))) { 1223 (sc->sc_end)(sc, UIO_READ, rv); 1224 splx(s); 1225 return rv; 1226 } 1227 p += n; 1228 if ((rv = uiomove((caddr_t)buf, p - buf, uio))) { 1229 (sc->sc_end)(sc, UIO_READ, rv); 1230 splx(s); 1231 return rv; 1232 } 1233 } 1234 1235 rv = (sc->sc_end)(sc, UIO_READ, rv); 1236 splx(s); 1237 return rv; 1238 } 1239 1240 int 1241 tpmwrite(struct cdev *dev, struct uio *uio, int flags) 1242 { 1243 struct tpm_softc *sc = TPMSOFTC(dev); 1244 u_int8_t buf[TPM_BUFSIZ]; 1245 int n, rv, s; 1246 1247 if (!sc) 1248 return ENXIO; 1249 1250 s = spltty(); 1251 1252 #ifdef TPM_DEBUG 1253 printf("tpmwrite: io count %d\n", uio->uio_resid); 1254 #endif 1255 1256 n = MIN(sizeof(buf), uio->uio_resid); 1257 if ((rv = uiomove((caddr_t)buf, n, uio))) { 1258 splx(s); 1259 return rv; 1260 } 1261 1262 if ((rv = (sc->sc_start)(sc, UIO_WRITE))) { 1263 splx(s); 1264 return rv; 1265 } 1266 1267 if ((rv = (sc->sc_write(sc, buf, n)))) { 1268 splx(s); 1269 return rv; 1270 } 1271 1272 rv = (sc->sc_end)(sc, UIO_WRITE, rv); 1273 splx(s); 1274 return rv; 1275 } 1276 1277 int 1278 tpmioctl(struct cdev *dev, u_long cmd, caddr_t data, int flags, 1279 struct thread *td) 1280 { 1281 return ENOTTY; 1282 } 1283