xref: /linux/drivers/char/tpm/tpm-chip.c (revision 24168c5e6dfbdd5b414f048f47f75d64533296ca)
1 // SPDX-License-Identifier: GPL-2.0-only
2 /*
3  * Copyright (C) 2004 IBM Corporation
4  * Copyright (C) 2014 Intel Corporation
5  *
6  * Authors:
7  * Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com>
8  * Leendert van Doorn <leendert@watson.ibm.com>
9  * Dave Safford <safford@watson.ibm.com>
10  * Reiner Sailer <sailer@watson.ibm.com>
11  * Kylene Hall <kjhall@us.ibm.com>
12  *
13  * Maintained by: <tpmdd-devel@lists.sourceforge.net>
14  *
15  * TPM chip management routines.
16  */
17 
18 #include <linux/poll.h>
19 #include <linux/slab.h>
20 #include <linux/mutex.h>
21 #include <linux/spinlock.h>
22 #include <linux/freezer.h>
23 #include <linux/major.h>
24 #include <linux/tpm_eventlog.h>
25 #include <linux/hw_random.h>
26 #include "tpm.h"
27 
28 DEFINE_IDR(dev_nums_idr);
29 static DEFINE_MUTEX(idr_lock);
30 
31 const struct class tpm_class = {
32 	.name = "tpm",
33 	.shutdown_pre = tpm_class_shutdown,
34 };
35 const struct class tpmrm_class = {
36 	.name = "tpmrm",
37 };
38 dev_t tpm_devt;
39 
40 static int tpm_request_locality(struct tpm_chip *chip)
41 {
42 	int rc;
43 
44 	if (!chip->ops->request_locality)
45 		return 0;
46 
47 	rc = chip->ops->request_locality(chip, 0);
48 	if (rc < 0)
49 		return rc;
50 
51 	chip->locality = rc;
52 	return 0;
53 }
54 
55 static void tpm_relinquish_locality(struct tpm_chip *chip)
56 {
57 	int rc;
58 
59 	if (!chip->ops->relinquish_locality)
60 		return;
61 
62 	rc = chip->ops->relinquish_locality(chip, chip->locality);
63 	if (rc)
64 		dev_err(&chip->dev, "%s: : error %d\n", __func__, rc);
65 
66 	chip->locality = -1;
67 }
68 
69 static int tpm_cmd_ready(struct tpm_chip *chip)
70 {
71 	if (!chip->ops->cmd_ready)
72 		return 0;
73 
74 	return chip->ops->cmd_ready(chip);
75 }
76 
77 static int tpm_go_idle(struct tpm_chip *chip)
78 {
79 	if (!chip->ops->go_idle)
80 		return 0;
81 
82 	return chip->ops->go_idle(chip);
83 }
84 
85 static void tpm_clk_enable(struct tpm_chip *chip)
86 {
87 	if (chip->ops->clk_enable)
88 		chip->ops->clk_enable(chip, true);
89 }
90 
91 static void tpm_clk_disable(struct tpm_chip *chip)
92 {
93 	if (chip->ops->clk_enable)
94 		chip->ops->clk_enable(chip, false);
95 }
96 
97 /**
98  * tpm_chip_start() - power on the TPM
99  * @chip:	a TPM chip to use
100  *
101  * Return:
102  * * The response length	- OK
103  * * -errno			- A system error
104  */
105 int tpm_chip_start(struct tpm_chip *chip)
106 {
107 	int ret;
108 
109 	tpm_clk_enable(chip);
110 
111 	if (chip->locality == -1) {
112 		ret = tpm_request_locality(chip);
113 		if (ret) {
114 			tpm_clk_disable(chip);
115 			return ret;
116 		}
117 	}
118 
119 	ret = tpm_cmd_ready(chip);
120 	if (ret) {
121 		tpm_relinquish_locality(chip);
122 		tpm_clk_disable(chip);
123 		return ret;
124 	}
125 
126 	return 0;
127 }
128 EXPORT_SYMBOL_GPL(tpm_chip_start);
129 
130 /**
131  * tpm_chip_stop() - power off the TPM
132  * @chip:	a TPM chip to use
133  *
134  * Return:
135  * * The response length	- OK
136  * * -errno			- A system error
137  */
138 void tpm_chip_stop(struct tpm_chip *chip)
139 {
140 	tpm_go_idle(chip);
141 	tpm_relinquish_locality(chip);
142 	tpm_clk_disable(chip);
143 }
144 EXPORT_SYMBOL_GPL(tpm_chip_stop);
145 
146 /**
147  * tpm_try_get_ops() - Get a ref to the tpm_chip
148  * @chip: Chip to ref
149  *
150  * The caller must already have some kind of locking to ensure that chip is
151  * valid. This function will lock the chip so that the ops member can be
152  * accessed safely. The locking prevents tpm_chip_unregister from
153  * completing, so it should not be held for long periods.
154  *
155  * Returns -ERRNO if the chip could not be got.
156  */
157 int tpm_try_get_ops(struct tpm_chip *chip)
158 {
159 	int rc = -EIO;
160 
161 	if (chip->flags & TPM_CHIP_FLAG_DISABLE)
162 		return rc;
163 
164 	get_device(&chip->dev);
165 
166 	down_read(&chip->ops_sem);
167 	if (!chip->ops)
168 		goto out_ops;
169 
170 	mutex_lock(&chip->tpm_mutex);
171 	rc = tpm_chip_start(chip);
172 	if (rc)
173 		goto out_lock;
174 
175 	return 0;
176 out_lock:
177 	mutex_unlock(&chip->tpm_mutex);
178 out_ops:
179 	up_read(&chip->ops_sem);
180 	put_device(&chip->dev);
181 	return rc;
182 }
183 EXPORT_SYMBOL_GPL(tpm_try_get_ops);
184 
185 /**
186  * tpm_put_ops() - Release a ref to the tpm_chip
187  * @chip: Chip to put
188  *
189  * This is the opposite pair to tpm_try_get_ops(). After this returns chip may
190  * be kfree'd.
191  */
192 void tpm_put_ops(struct tpm_chip *chip)
193 {
194 	tpm_chip_stop(chip);
195 	mutex_unlock(&chip->tpm_mutex);
196 	up_read(&chip->ops_sem);
197 	put_device(&chip->dev);
198 }
199 EXPORT_SYMBOL_GPL(tpm_put_ops);
200 
201 /**
202  * tpm_default_chip() - find a TPM chip and get a reference to it
203  */
204 struct tpm_chip *tpm_default_chip(void)
205 {
206 	struct tpm_chip *chip, *res = NULL;
207 	int chip_num = 0;
208 	int chip_prev;
209 
210 	mutex_lock(&idr_lock);
211 
212 	do {
213 		chip_prev = chip_num;
214 		chip = idr_get_next(&dev_nums_idr, &chip_num);
215 		if (chip) {
216 			get_device(&chip->dev);
217 			res = chip;
218 			break;
219 		}
220 	} while (chip_prev != chip_num);
221 
222 	mutex_unlock(&idr_lock);
223 
224 	return res;
225 }
226 EXPORT_SYMBOL_GPL(tpm_default_chip);
227 
228 /**
229  * tpm_find_get_ops() - find and reserve a TPM chip
230  * @chip:	a &struct tpm_chip instance, %NULL for the default chip
231  *
232  * Finds a TPM chip and reserves its class device and operations. The chip must
233  * be released with tpm_put_ops() after use.
234  * This function is for internal use only. It supports existing TPM callers
235  * by accepting NULL, but those callers should be converted to pass in a chip
236  * directly.
237  *
238  * Return:
239  * A reserved &struct tpm_chip instance.
240  * %NULL if a chip is not found.
241  * %NULL if the chip is not available.
242  */
243 struct tpm_chip *tpm_find_get_ops(struct tpm_chip *chip)
244 {
245 	int rc;
246 
247 	if (chip) {
248 		if (!tpm_try_get_ops(chip))
249 			return chip;
250 		return NULL;
251 	}
252 
253 	chip = tpm_default_chip();
254 	if (!chip)
255 		return NULL;
256 	rc = tpm_try_get_ops(chip);
257 	/* release additional reference we got from tpm_default_chip() */
258 	put_device(&chip->dev);
259 	if (rc)
260 		return NULL;
261 	return chip;
262 }
263 
264 /**
265  * tpm_dev_release() - free chip memory and the device number
266  * @dev: the character device for the TPM chip
267  *
268  * This is used as the release function for the character device.
269  */
270 static void tpm_dev_release(struct device *dev)
271 {
272 	struct tpm_chip *chip = container_of(dev, struct tpm_chip, dev);
273 
274 	mutex_lock(&idr_lock);
275 	idr_remove(&dev_nums_idr, chip->dev_num);
276 	mutex_unlock(&idr_lock);
277 
278 	kfree(chip->work_space.context_buf);
279 	kfree(chip->work_space.session_buf);
280 	kfree(chip->allocated_banks);
281 #ifdef CONFIG_TCG_TPM2_HMAC
282 	kfree(chip->auth);
283 #endif
284 	kfree(chip);
285 }
286 
287 /**
288  * tpm_class_shutdown() - prepare the TPM device for loss of power.
289  * @dev: device to which the chip is associated.
290  *
291  * Issues a TPM2_Shutdown command prior to loss of power, as required by the
292  * TPM 2.0 spec. Then, calls bus- and device- specific shutdown code.
293  *
294  * Return: always 0 (i.e. success)
295  */
296 int tpm_class_shutdown(struct device *dev)
297 {
298 	struct tpm_chip *chip = container_of(dev, struct tpm_chip, dev);
299 
300 	down_write(&chip->ops_sem);
301 	if (chip->flags & TPM_CHIP_FLAG_TPM2) {
302 		if (!tpm_chip_start(chip)) {
303 			tpm2_shutdown(chip, TPM2_SU_CLEAR);
304 			tpm_chip_stop(chip);
305 		}
306 	}
307 	chip->ops = NULL;
308 	up_write(&chip->ops_sem);
309 
310 	return 0;
311 }
312 
313 /**
314  * tpm_chip_alloc() - allocate a new struct tpm_chip instance
315  * @pdev: device to which the chip is associated
316  *        At this point pdev mst be initialized, but does not have to
317  *        be registered
318  * @ops: struct tpm_class_ops instance
319  *
320  * Allocates a new struct tpm_chip instance and assigns a free
321  * device number for it. Must be paired with put_device(&chip->dev).
322  */
323 struct tpm_chip *tpm_chip_alloc(struct device *pdev,
324 				const struct tpm_class_ops *ops)
325 {
326 	struct tpm_chip *chip;
327 	int rc;
328 
329 	chip = kzalloc(sizeof(*chip), GFP_KERNEL);
330 	if (chip == NULL)
331 		return ERR_PTR(-ENOMEM);
332 
333 	mutex_init(&chip->tpm_mutex);
334 	init_rwsem(&chip->ops_sem);
335 
336 	chip->ops = ops;
337 
338 	mutex_lock(&idr_lock);
339 	rc = idr_alloc(&dev_nums_idr, NULL, 0, TPM_NUM_DEVICES, GFP_KERNEL);
340 	mutex_unlock(&idr_lock);
341 	if (rc < 0) {
342 		dev_err(pdev, "No available tpm device numbers\n");
343 		kfree(chip);
344 		return ERR_PTR(rc);
345 	}
346 	chip->dev_num = rc;
347 
348 	device_initialize(&chip->dev);
349 
350 	chip->dev.class = &tpm_class;
351 	chip->dev.release = tpm_dev_release;
352 	chip->dev.parent = pdev;
353 	chip->dev.groups = chip->groups;
354 
355 	if (chip->dev_num == 0)
356 		chip->dev.devt = MKDEV(MISC_MAJOR, TPM_MINOR);
357 	else
358 		chip->dev.devt = MKDEV(MAJOR(tpm_devt), chip->dev_num);
359 
360 	rc = dev_set_name(&chip->dev, "tpm%d", chip->dev_num);
361 	if (rc)
362 		goto out;
363 
364 	if (!pdev)
365 		chip->flags |= TPM_CHIP_FLAG_VIRTUAL;
366 
367 	cdev_init(&chip->cdev, &tpm_fops);
368 	chip->cdev.owner = THIS_MODULE;
369 
370 	rc = tpm2_init_space(&chip->work_space, TPM2_SPACE_BUFFER_SIZE);
371 	if (rc) {
372 		rc = -ENOMEM;
373 		goto out;
374 	}
375 
376 	chip->locality = -1;
377 	return chip;
378 
379 out:
380 	put_device(&chip->dev);
381 	return ERR_PTR(rc);
382 }
383 EXPORT_SYMBOL_GPL(tpm_chip_alloc);
384 
385 static void tpm_put_device(void *dev)
386 {
387 	put_device(dev);
388 }
389 
390 /**
391  * tpmm_chip_alloc() - allocate a new struct tpm_chip instance
392  * @pdev: parent device to which the chip is associated
393  * @ops: struct tpm_class_ops instance
394  *
395  * Same as tpm_chip_alloc except devm is used to do the put_device
396  */
397 struct tpm_chip *tpmm_chip_alloc(struct device *pdev,
398 				 const struct tpm_class_ops *ops)
399 {
400 	struct tpm_chip *chip;
401 	int rc;
402 
403 	chip = tpm_chip_alloc(pdev, ops);
404 	if (IS_ERR(chip))
405 		return chip;
406 
407 	rc = devm_add_action_or_reset(pdev,
408 				      tpm_put_device,
409 				      &chip->dev);
410 	if (rc)
411 		return ERR_PTR(rc);
412 
413 	dev_set_drvdata(pdev, chip);
414 
415 	return chip;
416 }
417 EXPORT_SYMBOL_GPL(tpmm_chip_alloc);
418 
419 static int tpm_add_char_device(struct tpm_chip *chip)
420 {
421 	int rc;
422 
423 	rc = cdev_device_add(&chip->cdev, &chip->dev);
424 	if (rc) {
425 		dev_err(&chip->dev,
426 			"unable to cdev_device_add() %s, major %d, minor %d, err=%d\n",
427 			dev_name(&chip->dev), MAJOR(chip->dev.devt),
428 			MINOR(chip->dev.devt), rc);
429 		return rc;
430 	}
431 
432 	if (chip->flags & TPM_CHIP_FLAG_TPM2 && !tpm_is_firmware_upgrade(chip)) {
433 		rc = tpm_devs_add(chip);
434 		if (rc)
435 			goto err_del_cdev;
436 	}
437 
438 	/* Make the chip available. */
439 	mutex_lock(&idr_lock);
440 	idr_replace(&dev_nums_idr, chip, chip->dev_num);
441 	mutex_unlock(&idr_lock);
442 
443 	return 0;
444 
445 err_del_cdev:
446 	cdev_device_del(&chip->cdev, &chip->dev);
447 	return rc;
448 }
449 
450 static void tpm_del_char_device(struct tpm_chip *chip)
451 {
452 	cdev_device_del(&chip->cdev, &chip->dev);
453 
454 	/* Make the chip unavailable. */
455 	mutex_lock(&idr_lock);
456 	idr_replace(&dev_nums_idr, NULL, chip->dev_num);
457 	mutex_unlock(&idr_lock);
458 
459 	/* Make the driver uncallable. */
460 	down_write(&chip->ops_sem);
461 
462 	/*
463 	 * Check if chip->ops is still valid: In case that the controller
464 	 * drivers shutdown handler unregisters the controller in its
465 	 * shutdown handler we are called twice and chip->ops to NULL.
466 	 */
467 	if (chip->ops) {
468 		if (chip->flags & TPM_CHIP_FLAG_TPM2) {
469 			if (!tpm_chip_start(chip)) {
470 				tpm2_shutdown(chip, TPM2_SU_CLEAR);
471 				tpm_chip_stop(chip);
472 			}
473 		}
474 		chip->ops = NULL;
475 	}
476 	up_write(&chip->ops_sem);
477 }
478 
479 static void tpm_del_legacy_sysfs(struct tpm_chip *chip)
480 {
481 	struct attribute **i;
482 
483 	if (chip->flags & (TPM_CHIP_FLAG_TPM2 | TPM_CHIP_FLAG_VIRTUAL) ||
484 	    tpm_is_firmware_upgrade(chip))
485 		return;
486 
487 	sysfs_remove_link(&chip->dev.parent->kobj, "ppi");
488 
489 	for (i = chip->groups[0]->attrs; *i != NULL; ++i)
490 		sysfs_remove_link(&chip->dev.parent->kobj, (*i)->name);
491 }
492 
493 /* For compatibility with legacy sysfs paths we provide symlinks from the
494  * parent dev directory to selected names within the tpm chip directory. Old
495  * kernel versions created these files directly under the parent.
496  */
497 static int tpm_add_legacy_sysfs(struct tpm_chip *chip)
498 {
499 	struct attribute **i;
500 	int rc;
501 
502 	if (chip->flags & (TPM_CHIP_FLAG_TPM2 | TPM_CHIP_FLAG_VIRTUAL) ||
503 		tpm_is_firmware_upgrade(chip))
504 		return 0;
505 
506 	rc = compat_only_sysfs_link_entry_to_kobj(
507 		    &chip->dev.parent->kobj, &chip->dev.kobj, "ppi", NULL);
508 	if (rc && rc != -ENOENT)
509 		return rc;
510 
511 	/* All the names from tpm-sysfs */
512 	for (i = chip->groups[0]->attrs; *i != NULL; ++i) {
513 		rc = compat_only_sysfs_link_entry_to_kobj(
514 		    &chip->dev.parent->kobj, &chip->dev.kobj, (*i)->name, NULL);
515 		if (rc) {
516 			tpm_del_legacy_sysfs(chip);
517 			return rc;
518 		}
519 	}
520 
521 	return 0;
522 }
523 
524 static int tpm_hwrng_read(struct hwrng *rng, void *data, size_t max, bool wait)
525 {
526 	struct tpm_chip *chip = container_of(rng, struct tpm_chip, hwrng);
527 
528 	/* Give back zero bytes, as TPM chip has not yet fully resumed: */
529 	if (chip->flags & TPM_CHIP_FLAG_SUSPENDED)
530 		return 0;
531 
532 	return tpm_get_random(chip, data, max);
533 }
534 
535 static bool tpm_is_hwrng_enabled(struct tpm_chip *chip)
536 {
537 	if (!IS_ENABLED(CONFIG_HW_RANDOM_TPM))
538 		return false;
539 	if (tpm_is_firmware_upgrade(chip))
540 		return false;
541 	if (chip->flags & TPM_CHIP_FLAG_HWRNG_DISABLED)
542 		return false;
543 	return true;
544 }
545 
546 static int tpm_add_hwrng(struct tpm_chip *chip)
547 {
548 	if (!tpm_is_hwrng_enabled(chip))
549 		return 0;
550 
551 	snprintf(chip->hwrng_name, sizeof(chip->hwrng_name),
552 		 "tpm-rng-%d", chip->dev_num);
553 	chip->hwrng.name = chip->hwrng_name;
554 	chip->hwrng.read = tpm_hwrng_read;
555 	return hwrng_register(&chip->hwrng);
556 }
557 
558 static int tpm_get_pcr_allocation(struct tpm_chip *chip)
559 {
560 	int rc;
561 
562 	if (tpm_is_firmware_upgrade(chip))
563 		return 0;
564 
565 	rc = (chip->flags & TPM_CHIP_FLAG_TPM2) ?
566 	     tpm2_get_pcr_allocation(chip) :
567 	     tpm1_get_pcr_allocation(chip);
568 
569 	if (rc > 0)
570 		return -ENODEV;
571 
572 	return rc;
573 }
574 
575 /*
576  * tpm_chip_bootstrap() - Boostrap TPM chip after power on
577  * @chip: TPM chip to use.
578  *
579  * Initialize TPM chip after power on. This a one-shot function: subsequent
580  * calls will have no effect.
581  */
582 int tpm_chip_bootstrap(struct tpm_chip *chip)
583 {
584 	int rc;
585 
586 	if (chip->flags & TPM_CHIP_FLAG_BOOTSTRAPPED)
587 		return 0;
588 
589 	rc = tpm_chip_start(chip);
590 	if (rc)
591 		return rc;
592 
593 	rc = tpm_auto_startup(chip);
594 	if (rc)
595 		goto stop;
596 
597 	rc = tpm_get_pcr_allocation(chip);
598 stop:
599 	tpm_chip_stop(chip);
600 
601 	/*
602 	 * Unconditionally set, as driver initialization should cease, when the
603 	 * boostrapping process fails.
604 	 */
605 	chip->flags |= TPM_CHIP_FLAG_BOOTSTRAPPED;
606 
607 	return rc;
608 }
609 EXPORT_SYMBOL_GPL(tpm_chip_bootstrap);
610 
611 /*
612  * tpm_chip_register() - create a character device for the TPM chip
613  * @chip: TPM chip to use.
614  *
615  * Creates a character device for the TPM chip and adds sysfs attributes for
616  * the device. As the last step this function adds the chip to the list of TPM
617  * chips available for in-kernel use.
618  *
619  * This function should be only called after the chip initialization is
620  * complete.
621  */
622 int tpm_chip_register(struct tpm_chip *chip)
623 {
624 	int rc;
625 
626 	rc = tpm_chip_bootstrap(chip);
627 	if (rc)
628 		return rc;
629 
630 	tpm_sysfs_add_device(chip);
631 
632 	tpm_bios_log_setup(chip);
633 
634 	tpm_add_ppi(chip);
635 
636 	rc = tpm_add_hwrng(chip);
637 	if (rc)
638 		goto out_ppi;
639 
640 	rc = tpm_add_char_device(chip);
641 	if (rc)
642 		goto out_hwrng;
643 
644 	rc = tpm_add_legacy_sysfs(chip);
645 	if (rc) {
646 		tpm_chip_unregister(chip);
647 		return rc;
648 	}
649 
650 	return 0;
651 
652 out_hwrng:
653 	if (tpm_is_hwrng_enabled(chip))
654 		hwrng_unregister(&chip->hwrng);
655 out_ppi:
656 	tpm_bios_log_teardown(chip);
657 
658 	return rc;
659 }
660 EXPORT_SYMBOL_GPL(tpm_chip_register);
661 
662 /*
663  * tpm_chip_unregister() - release the TPM driver
664  * @chip: TPM chip to use.
665  *
666  * Takes the chip first away from the list of available TPM chips and then
667  * cleans up all the resources reserved by tpm_chip_register().
668  *
669  * Once this function returns the driver call backs in 'op's will not be
670  * running and will no longer start.
671  *
672  * NOTE: This function should be only called before deinitializing chip
673  * resources.
674  */
675 void tpm_chip_unregister(struct tpm_chip *chip)
676 {
677 	tpm_del_legacy_sysfs(chip);
678 	if (tpm_is_hwrng_enabled(chip))
679 		hwrng_unregister(&chip->hwrng);
680 	tpm_bios_log_teardown(chip);
681 	if (chip->flags & TPM_CHIP_FLAG_TPM2 && !tpm_is_firmware_upgrade(chip))
682 		tpm_devs_remove(chip);
683 	tpm_del_char_device(chip);
684 }
685 EXPORT_SYMBOL_GPL(tpm_chip_unregister);
686