678 lines
		
	
	
		
			17 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			678 lines
		
	
	
		
			17 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
/*
 | 
						|
 * Description:
 | 
						|
 * Device Driver for the Infineon Technologies
 | 
						|
 * SLD 9630 TT 1.1 and SLB 9635 TT 1.2 Trusted Platform Module
 | 
						|
 * Specifications at www.trustedcomputinggroup.org
 | 
						|
 *
 | 
						|
 * Copyright (C) 2005, Marcel Selhorst <m.selhorst@sirrix.com>
 | 
						|
 * Sirrix AG - security technologies, http://www.sirrix.com and
 | 
						|
 * Applied Data Security Group, Ruhr-University Bochum, Germany
 | 
						|
 * Project-Homepage: http://www.prosec.rub.de/tpm
 | 
						|
 *
 | 
						|
 * This program is free software; you can redistribute it and/or
 | 
						|
 * modify it under the terms of the GNU General Public License as
 | 
						|
 * published by the Free Software Foundation, version 2 of the
 | 
						|
 * License.
 | 
						|
 */
 | 
						|
 | 
						|
#include <linux/init.h>
 | 
						|
#include <linux/pnp.h>
 | 
						|
#include "tpm.h"
 | 
						|
 | 
						|
/* Infineon specific definitions */
 | 
						|
/* maximum number of WTX-packages */
 | 
						|
#define	TPM_MAX_WTX_PACKAGES 	50
 | 
						|
/* msleep-Time for WTX-packages */
 | 
						|
#define	TPM_WTX_MSLEEP_TIME 	20
 | 
						|
/* msleep-Time --> Interval to check status register */
 | 
						|
#define	TPM_MSLEEP_TIME 	3
 | 
						|
/* gives number of max. msleep()-calls before throwing timeout */
 | 
						|
#define	TPM_MAX_TRIES		5000
 | 
						|
#define	TPM_INFINEON_DEV_VEN_VALUE	0x15D1
 | 
						|
 | 
						|
#define TPM_INF_IO_PORT		0x0
 | 
						|
#define TPM_INF_IO_MEM		0x1
 | 
						|
 | 
						|
#define TPM_INF_ADDR		0x0
 | 
						|
#define TPM_INF_DATA		0x1
 | 
						|
 | 
						|
struct tpm_inf_dev {
 | 
						|
	int iotype;
 | 
						|
 | 
						|
	void __iomem *mem_base;	/* MMIO ioremap'd addr */
 | 
						|
	unsigned long map_base;	/* phys MMIO base */
 | 
						|
	unsigned long map_size;	/* MMIO region size */
 | 
						|
	unsigned int index_off;	/* index register offset */
 | 
						|
 | 
						|
	unsigned int data_regs;	/* Data registers */
 | 
						|
	unsigned int data_size;
 | 
						|
 | 
						|
	unsigned int config_port;	/* IO Port config index reg */
 | 
						|
	unsigned int config_size;
 | 
						|
};
 | 
						|
 | 
						|
static struct tpm_inf_dev tpm_dev;
 | 
						|
 | 
						|
static inline void tpm_data_out(unsigned char data, unsigned char offset)
 | 
						|
{
 | 
						|
	if (tpm_dev.iotype == TPM_INF_IO_PORT)
 | 
						|
		outb(data, tpm_dev.data_regs + offset);
 | 
						|
	else
 | 
						|
		writeb(data, tpm_dev.mem_base + tpm_dev.data_regs + offset);
 | 
						|
}
 | 
						|
 | 
						|
static inline unsigned char tpm_data_in(unsigned char offset)
 | 
						|
{
 | 
						|
	if (tpm_dev.iotype == TPM_INF_IO_PORT)
 | 
						|
		return inb(tpm_dev.data_regs + offset);
 | 
						|
	else
 | 
						|
		return readb(tpm_dev.mem_base + tpm_dev.data_regs + offset);
 | 
						|
}
 | 
						|
 | 
						|
static inline void tpm_config_out(unsigned char data, unsigned char offset)
 | 
						|
{
 | 
						|
	if (tpm_dev.iotype == TPM_INF_IO_PORT)
 | 
						|
		outb(data, tpm_dev.config_port + offset);
 | 
						|
	else
 | 
						|
		writeb(data, tpm_dev.mem_base + tpm_dev.index_off + offset);
 | 
						|
}
 | 
						|
 | 
						|
static inline unsigned char tpm_config_in(unsigned char offset)
 | 
						|
{
 | 
						|
	if (tpm_dev.iotype == TPM_INF_IO_PORT)
 | 
						|
		return inb(tpm_dev.config_port + offset);
 | 
						|
	else
 | 
						|
		return readb(tpm_dev.mem_base + tpm_dev.index_off + offset);
 | 
						|
}
 | 
						|
 | 
						|
/* TPM header definitions */
 | 
						|
enum infineon_tpm_header {
 | 
						|
	TPM_VL_VER = 0x01,
 | 
						|
	TPM_VL_CHANNEL_CONTROL = 0x07,
 | 
						|
	TPM_VL_CHANNEL_PERSONALISATION = 0x0A,
 | 
						|
	TPM_VL_CHANNEL_TPM = 0x0B,
 | 
						|
	TPM_VL_CONTROL = 0x00,
 | 
						|
	TPM_INF_NAK = 0x15,
 | 
						|
	TPM_CTRL_WTX = 0x10,
 | 
						|
	TPM_CTRL_WTX_ABORT = 0x18,
 | 
						|
	TPM_CTRL_WTX_ABORT_ACK = 0x18,
 | 
						|
	TPM_CTRL_ERROR = 0x20,
 | 
						|
	TPM_CTRL_CHAININGACK = 0x40,
 | 
						|
	TPM_CTRL_CHAINING = 0x80,
 | 
						|
	TPM_CTRL_DATA = 0x04,
 | 
						|
	TPM_CTRL_DATA_CHA = 0x84,
 | 
						|
	TPM_CTRL_DATA_CHA_ACK = 0xC4
 | 
						|
};
 | 
						|
 | 
						|
enum infineon_tpm_register {
 | 
						|
	WRFIFO = 0x00,
 | 
						|
	RDFIFO = 0x01,
 | 
						|
	STAT = 0x02,
 | 
						|
	CMD = 0x03
 | 
						|
};
 | 
						|
 | 
						|
enum infineon_tpm_command_bits {
 | 
						|
	CMD_DIS = 0x00,
 | 
						|
	CMD_LP = 0x01,
 | 
						|
	CMD_RES = 0x02,
 | 
						|
	CMD_IRQC = 0x06
 | 
						|
};
 | 
						|
 | 
						|
enum infineon_tpm_status_bits {
 | 
						|
	STAT_XFE = 0x00,
 | 
						|
	STAT_LPA = 0x01,
 | 
						|
	STAT_FOK = 0x02,
 | 
						|
	STAT_TOK = 0x03,
 | 
						|
	STAT_IRQA = 0x06,
 | 
						|
	STAT_RDA = 0x07
 | 
						|
};
 | 
						|
 | 
						|
/* some outgoing values */
 | 
						|
enum infineon_tpm_values {
 | 
						|
	CHIP_ID1 = 0x20,
 | 
						|
	CHIP_ID2 = 0x21,
 | 
						|
	TPM_DAR = 0x30,
 | 
						|
	RESET_LP_IRQC_DISABLE = 0x41,
 | 
						|
	ENABLE_REGISTER_PAIR = 0x55,
 | 
						|
	IOLIMH = 0x60,
 | 
						|
	IOLIML = 0x61,
 | 
						|
	DISABLE_REGISTER_PAIR = 0xAA,
 | 
						|
	IDVENL = 0xF1,
 | 
						|
	IDVENH = 0xF2,
 | 
						|
	IDPDL = 0xF3,
 | 
						|
	IDPDH = 0xF4
 | 
						|
};
 | 
						|
 | 
						|
static int number_of_wtx;
 | 
						|
 | 
						|
static int empty_fifo(struct tpm_chip *chip, int clear_wrfifo)
 | 
						|
{
 | 
						|
	int status;
 | 
						|
	int check = 0;
 | 
						|
	int i;
 | 
						|
 | 
						|
	if (clear_wrfifo) {
 | 
						|
		for (i = 0; i < 4096; i++) {
 | 
						|
			status = tpm_data_in(WRFIFO);
 | 
						|
			if (status == 0xff) {
 | 
						|
				if (check == 5)
 | 
						|
					break;
 | 
						|
				else
 | 
						|
					check++;
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
	/* Note: The values which are currently in the FIFO of the TPM
 | 
						|
	   are thrown away since there is no usage for them. Usually,
 | 
						|
	   this has nothing to say, since the TPM will give its answer
 | 
						|
	   immediately or will be aborted anyway, so the data here is
 | 
						|
	   usually garbage and useless.
 | 
						|
	   We have to clean this, because the next communication with
 | 
						|
	   the TPM would be rubbish, if there is still some old data
 | 
						|
	   in the Read FIFO.
 | 
						|
	 */
 | 
						|
	i = 0;
 | 
						|
	do {
 | 
						|
		status = tpm_data_in(RDFIFO);
 | 
						|
		status = tpm_data_in(STAT);
 | 
						|
		i++;
 | 
						|
		if (i == TPM_MAX_TRIES)
 | 
						|
			return -EIO;
 | 
						|
	} while ((status & (1 << STAT_RDA)) != 0);
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
static int wait(struct tpm_chip *chip, int wait_for_bit)
 | 
						|
{
 | 
						|
	int status;
 | 
						|
	int i;
 | 
						|
	for (i = 0; i < TPM_MAX_TRIES; i++) {
 | 
						|
		status = tpm_data_in(STAT);
 | 
						|
		/* check the status-register if wait_for_bit is set */
 | 
						|
		if (status & 1 << wait_for_bit)
 | 
						|
			break;
 | 
						|
		msleep(TPM_MSLEEP_TIME);
 | 
						|
	}
 | 
						|
	if (i == TPM_MAX_TRIES) {	/* timeout occurs */
 | 
						|
		if (wait_for_bit == STAT_XFE)
 | 
						|
			dev_err(chip->dev, "Timeout in wait(STAT_XFE)\n");
 | 
						|
		if (wait_for_bit == STAT_RDA)
 | 
						|
			dev_err(chip->dev, "Timeout in wait(STAT_RDA)\n");
 | 
						|
		return -EIO;
 | 
						|
	}
 | 
						|
	return 0;
 | 
						|
};
 | 
						|
 | 
						|
static void wait_and_send(struct tpm_chip *chip, u8 sendbyte)
 | 
						|
{
 | 
						|
	wait(chip, STAT_XFE);
 | 
						|
	tpm_data_out(sendbyte, WRFIFO);
 | 
						|
}
 | 
						|
 | 
						|
    /* Note: WTX means Waiting-Time-Extension. Whenever the TPM needs more
 | 
						|
       calculation time, it sends a WTX-package, which has to be acknowledged
 | 
						|
       or aborted. This usually occurs if you are hammering the TPM with key
 | 
						|
       creation. Set the maximum number of WTX-packages in the definitions
 | 
						|
       above, if the number is reached, the waiting-time will be denied
 | 
						|
       and the TPM command has to be resend.
 | 
						|
     */
 | 
						|
 | 
						|
static void tpm_wtx(struct tpm_chip *chip)
 | 
						|
{
 | 
						|
	number_of_wtx++;
 | 
						|
	dev_info(chip->dev, "Granting WTX (%02d / %02d)\n",
 | 
						|
		 number_of_wtx, TPM_MAX_WTX_PACKAGES);
 | 
						|
	wait_and_send(chip, TPM_VL_VER);
 | 
						|
	wait_and_send(chip, TPM_CTRL_WTX);
 | 
						|
	wait_and_send(chip, 0x00);
 | 
						|
	wait_and_send(chip, 0x00);
 | 
						|
	msleep(TPM_WTX_MSLEEP_TIME);
 | 
						|
}
 | 
						|
 | 
						|
static void tpm_wtx_abort(struct tpm_chip *chip)
 | 
						|
{
 | 
						|
	dev_info(chip->dev, "Aborting WTX\n");
 | 
						|
	wait_and_send(chip, TPM_VL_VER);
 | 
						|
	wait_and_send(chip, TPM_CTRL_WTX_ABORT);
 | 
						|
	wait_and_send(chip, 0x00);
 | 
						|
	wait_and_send(chip, 0x00);
 | 
						|
	number_of_wtx = 0;
 | 
						|
	msleep(TPM_WTX_MSLEEP_TIME);
 | 
						|
}
 | 
						|
 | 
						|
static int tpm_inf_recv(struct tpm_chip *chip, u8 * buf, size_t count)
 | 
						|
{
 | 
						|
	int i;
 | 
						|
	int ret;
 | 
						|
	u32 size = 0;
 | 
						|
	number_of_wtx = 0;
 | 
						|
 | 
						|
recv_begin:
 | 
						|
	/* start receiving header */
 | 
						|
	for (i = 0; i < 4; i++) {
 | 
						|
		ret = wait(chip, STAT_RDA);
 | 
						|
		if (ret)
 | 
						|
			return -EIO;
 | 
						|
		buf[i] = tpm_data_in(RDFIFO);
 | 
						|
	}
 | 
						|
 | 
						|
	if (buf[0] != TPM_VL_VER) {
 | 
						|
		dev_err(chip->dev,
 | 
						|
			"Wrong transport protocol implementation!\n");
 | 
						|
		return -EIO;
 | 
						|
	}
 | 
						|
 | 
						|
	if (buf[1] == TPM_CTRL_DATA) {
 | 
						|
		/* size of the data received */
 | 
						|
		size = ((buf[2] << 8) | buf[3]);
 | 
						|
 | 
						|
		for (i = 0; i < size; i++) {
 | 
						|
			wait(chip, STAT_RDA);
 | 
						|
			buf[i] = tpm_data_in(RDFIFO);
 | 
						|
		}
 | 
						|
 | 
						|
		if ((size == 0x6D00) && (buf[1] == 0x80)) {
 | 
						|
			dev_err(chip->dev, "Error handling on vendor layer!\n");
 | 
						|
			return -EIO;
 | 
						|
		}
 | 
						|
 | 
						|
		for (i = 0; i < size; i++)
 | 
						|
			buf[i] = buf[i + 6];
 | 
						|
 | 
						|
		size = size - 6;
 | 
						|
		return size;
 | 
						|
	}
 | 
						|
 | 
						|
	if (buf[1] == TPM_CTRL_WTX) {
 | 
						|
		dev_info(chip->dev, "WTX-package received\n");
 | 
						|
		if (number_of_wtx < TPM_MAX_WTX_PACKAGES) {
 | 
						|
			tpm_wtx(chip);
 | 
						|
			goto recv_begin;
 | 
						|
		} else {
 | 
						|
			tpm_wtx_abort(chip);
 | 
						|
			goto recv_begin;
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	if (buf[1] == TPM_CTRL_WTX_ABORT_ACK) {
 | 
						|
		dev_info(chip->dev, "WTX-abort acknowledged\n");
 | 
						|
		return size;
 | 
						|
	}
 | 
						|
 | 
						|
	if (buf[1] == TPM_CTRL_ERROR) {
 | 
						|
		dev_err(chip->dev, "ERROR-package received:\n");
 | 
						|
		if (buf[4] == TPM_INF_NAK)
 | 
						|
			dev_err(chip->dev,
 | 
						|
				"-> Negative acknowledgement"
 | 
						|
				" - retransmit command!\n");
 | 
						|
		return -EIO;
 | 
						|
	}
 | 
						|
	return -EIO;
 | 
						|
}
 | 
						|
 | 
						|
static int tpm_inf_send(struct tpm_chip *chip, u8 * buf, size_t count)
 | 
						|
{
 | 
						|
	int i;
 | 
						|
	int ret;
 | 
						|
	u8 count_high, count_low, count_4, count_3, count_2, count_1;
 | 
						|
 | 
						|
	/* Disabling Reset, LP and IRQC */
 | 
						|
	tpm_data_out(RESET_LP_IRQC_DISABLE, CMD);
 | 
						|
 | 
						|
	ret = empty_fifo(chip, 1);
 | 
						|
	if (ret) {
 | 
						|
		dev_err(chip->dev, "Timeout while clearing FIFO\n");
 | 
						|
		return -EIO;
 | 
						|
	}
 | 
						|
 | 
						|
	ret = wait(chip, STAT_XFE);
 | 
						|
	if (ret)
 | 
						|
		return -EIO;
 | 
						|
 | 
						|
	count_4 = (count & 0xff000000) >> 24;
 | 
						|
	count_3 = (count & 0x00ff0000) >> 16;
 | 
						|
	count_2 = (count & 0x0000ff00) >> 8;
 | 
						|
	count_1 = (count & 0x000000ff);
 | 
						|
	count_high = ((count + 6) & 0xffffff00) >> 8;
 | 
						|
	count_low = ((count + 6) & 0x000000ff);
 | 
						|
 | 
						|
	/* Sending Header */
 | 
						|
	wait_and_send(chip, TPM_VL_VER);
 | 
						|
	wait_and_send(chip, TPM_CTRL_DATA);
 | 
						|
	wait_and_send(chip, count_high);
 | 
						|
	wait_and_send(chip, count_low);
 | 
						|
 | 
						|
	/* Sending Data Header */
 | 
						|
	wait_and_send(chip, TPM_VL_VER);
 | 
						|
	wait_and_send(chip, TPM_VL_CHANNEL_TPM);
 | 
						|
	wait_and_send(chip, count_4);
 | 
						|
	wait_and_send(chip, count_3);
 | 
						|
	wait_and_send(chip, count_2);
 | 
						|
	wait_and_send(chip, count_1);
 | 
						|
 | 
						|
	/* Sending Data */
 | 
						|
	for (i = 0; i < count; i++) {
 | 
						|
		wait_and_send(chip, buf[i]);
 | 
						|
	}
 | 
						|
	return count;
 | 
						|
}
 | 
						|
 | 
						|
static void tpm_inf_cancel(struct tpm_chip *chip)
 | 
						|
{
 | 
						|
	/*
 | 
						|
	   Since we are using the legacy mode to communicate
 | 
						|
	   with the TPM, we have no cancel functions, but have
 | 
						|
	   a workaround for interrupting the TPM through WTX.
 | 
						|
	 */
 | 
						|
}
 | 
						|
 | 
						|
static u8 tpm_inf_status(struct tpm_chip *chip)
 | 
						|
{
 | 
						|
	return tpm_data_in(STAT);
 | 
						|
}
 | 
						|
 | 
						|
static DEVICE_ATTR(pubek, S_IRUGO, tpm_show_pubek, NULL);
 | 
						|
static DEVICE_ATTR(pcrs, S_IRUGO, tpm_show_pcrs, NULL);
 | 
						|
static DEVICE_ATTR(caps, S_IRUGO, tpm_show_caps, NULL);
 | 
						|
static DEVICE_ATTR(cancel, S_IWUSR | S_IWGRP, NULL, tpm_store_cancel);
 | 
						|
 | 
						|
static struct attribute *inf_attrs[] = {
 | 
						|
	&dev_attr_pubek.attr,
 | 
						|
	&dev_attr_pcrs.attr,
 | 
						|
	&dev_attr_caps.attr,
 | 
						|
	&dev_attr_cancel.attr,
 | 
						|
	NULL,
 | 
						|
};
 | 
						|
 | 
						|
static struct attribute_group inf_attr_grp = {.attrs = inf_attrs };
 | 
						|
 | 
						|
static const struct file_operations inf_ops = {
 | 
						|
	.owner = THIS_MODULE,
 | 
						|
	.llseek = no_llseek,
 | 
						|
	.open = tpm_open,
 | 
						|
	.read = tpm_read,
 | 
						|
	.write = tpm_write,
 | 
						|
	.release = tpm_release,
 | 
						|
};
 | 
						|
 | 
						|
static const struct tpm_vendor_specific tpm_inf = {
 | 
						|
	.recv = tpm_inf_recv,
 | 
						|
	.send = tpm_inf_send,
 | 
						|
	.cancel = tpm_inf_cancel,
 | 
						|
	.status = tpm_inf_status,
 | 
						|
	.req_complete_mask = 0,
 | 
						|
	.req_complete_val = 0,
 | 
						|
	.attr_group = &inf_attr_grp,
 | 
						|
	.miscdev = {.fops = &inf_ops,},
 | 
						|
};
 | 
						|
 | 
						|
static const struct pnp_device_id tpm_inf_pnp_tbl[] = {
 | 
						|
	/* Infineon TPMs */
 | 
						|
	{"IFX0101", 0},
 | 
						|
	{"IFX0102", 0},
 | 
						|
	{"", 0}
 | 
						|
};
 | 
						|
 | 
						|
MODULE_DEVICE_TABLE(pnp, tpm_inf_pnp_tbl);
 | 
						|
 | 
						|
static int __devinit tpm_inf_pnp_probe(struct pnp_dev *dev,
 | 
						|
				       const struct pnp_device_id *dev_id)
 | 
						|
{
 | 
						|
	int rc = 0;
 | 
						|
	u8 iol, ioh;
 | 
						|
	int vendorid[2];
 | 
						|
	int version[2];
 | 
						|
	int productid[2];
 | 
						|
	char chipname[20];
 | 
						|
	struct tpm_chip *chip;
 | 
						|
 | 
						|
	/* read IO-ports through PnP */
 | 
						|
	if (pnp_port_valid(dev, 0) && pnp_port_valid(dev, 1) &&
 | 
						|
	    !(pnp_port_flags(dev, 0) & IORESOURCE_DISABLED)) {
 | 
						|
 | 
						|
		tpm_dev.iotype = TPM_INF_IO_PORT;
 | 
						|
 | 
						|
		tpm_dev.config_port = pnp_port_start(dev, 0);
 | 
						|
		tpm_dev.config_size = pnp_port_len(dev, 0);
 | 
						|
		tpm_dev.data_regs = pnp_port_start(dev, 1);
 | 
						|
		tpm_dev.data_size = pnp_port_len(dev, 1);
 | 
						|
		if ((tpm_dev.data_size < 4) || (tpm_dev.config_size < 2)) {
 | 
						|
			rc = -EINVAL;
 | 
						|
			goto err_last;
 | 
						|
		}
 | 
						|
		dev_info(&dev->dev, "Found %s with ID %s\n",
 | 
						|
			 dev->name, dev_id->id);
 | 
						|
		if (!((tpm_dev.data_regs >> 8) & 0xff)) {
 | 
						|
			rc = -EINVAL;
 | 
						|
			goto err_last;
 | 
						|
		}
 | 
						|
		/* publish my base address and request region */
 | 
						|
		if (request_region(tpm_dev.data_regs, tpm_dev.data_size,
 | 
						|
				   "tpm_infineon0") == NULL) {
 | 
						|
			rc = -EINVAL;
 | 
						|
			goto err_last;
 | 
						|
		}
 | 
						|
		if (request_region(tpm_dev.config_port, tpm_dev.config_size,
 | 
						|
				   "tpm_infineon0") == NULL) {
 | 
						|
			release_region(tpm_dev.data_regs, tpm_dev.data_size);
 | 
						|
			rc = -EINVAL;
 | 
						|
			goto err_last;
 | 
						|
		}
 | 
						|
	} else if (pnp_mem_valid(dev, 0) &&
 | 
						|
		   !(pnp_mem_flags(dev, 0) & IORESOURCE_DISABLED)) {
 | 
						|
 | 
						|
		tpm_dev.iotype = TPM_INF_IO_MEM;
 | 
						|
 | 
						|
		tpm_dev.map_base = pnp_mem_start(dev, 0);
 | 
						|
		tpm_dev.map_size = pnp_mem_len(dev, 0);
 | 
						|
 | 
						|
		dev_info(&dev->dev, "Found %s with ID %s\n",
 | 
						|
			 dev->name, dev_id->id);
 | 
						|
 | 
						|
		/* publish my base address and request region */
 | 
						|
		if (request_mem_region(tpm_dev.map_base, tpm_dev.map_size,
 | 
						|
				       "tpm_infineon0") == NULL) {
 | 
						|
			rc = -EINVAL;
 | 
						|
			goto err_last;
 | 
						|
		}
 | 
						|
 | 
						|
		tpm_dev.mem_base = ioremap(tpm_dev.map_base, tpm_dev.map_size);
 | 
						|
		if (tpm_dev.mem_base == NULL) {
 | 
						|
			release_mem_region(tpm_dev.map_base, tpm_dev.map_size);
 | 
						|
			rc = -EINVAL;
 | 
						|
			goto err_last;
 | 
						|
		}
 | 
						|
 | 
						|
		/*
 | 
						|
		 * The only known MMIO based Infineon TPM system provides
 | 
						|
		 * a single large mem region with the device config
 | 
						|
		 * registers at the default TPM_ADDR.  The data registers
 | 
						|
		 * seem like they could be placed anywhere within the MMIO
 | 
						|
		 * region, but lets just put them at zero offset.
 | 
						|
		 */
 | 
						|
		tpm_dev.index_off = TPM_ADDR;
 | 
						|
		tpm_dev.data_regs = 0x0;
 | 
						|
	} else {
 | 
						|
		rc = -EINVAL;
 | 
						|
		goto err_last;
 | 
						|
	}
 | 
						|
 | 
						|
	/* query chip for its vendor, its version number a.s.o. */
 | 
						|
	tpm_config_out(ENABLE_REGISTER_PAIR, TPM_INF_ADDR);
 | 
						|
	tpm_config_out(IDVENL, TPM_INF_ADDR);
 | 
						|
	vendorid[1] = tpm_config_in(TPM_INF_DATA);
 | 
						|
	tpm_config_out(IDVENH, TPM_INF_ADDR);
 | 
						|
	vendorid[0] = tpm_config_in(TPM_INF_DATA);
 | 
						|
	tpm_config_out(IDPDL, TPM_INF_ADDR);
 | 
						|
	productid[1] = tpm_config_in(TPM_INF_DATA);
 | 
						|
	tpm_config_out(IDPDH, TPM_INF_ADDR);
 | 
						|
	productid[0] = tpm_config_in(TPM_INF_DATA);
 | 
						|
	tpm_config_out(CHIP_ID1, TPM_INF_ADDR);
 | 
						|
	version[1] = tpm_config_in(TPM_INF_DATA);
 | 
						|
	tpm_config_out(CHIP_ID2, TPM_INF_ADDR);
 | 
						|
	version[0] = tpm_config_in(TPM_INF_DATA);
 | 
						|
 | 
						|
	switch ((productid[0] << 8) | productid[1]) {
 | 
						|
	case 6:
 | 
						|
		snprintf(chipname, sizeof(chipname), " (SLD 9630 TT 1.1)");
 | 
						|
		break;
 | 
						|
	case 11:
 | 
						|
		snprintf(chipname, sizeof(chipname), " (SLB 9635 TT 1.2)");
 | 
						|
		break;
 | 
						|
	default:
 | 
						|
		snprintf(chipname, sizeof(chipname), " (unknown chip)");
 | 
						|
		break;
 | 
						|
	}
 | 
						|
 | 
						|
	if ((vendorid[0] << 8 | vendorid[1]) == (TPM_INFINEON_DEV_VEN_VALUE)) {
 | 
						|
 | 
						|
		/* configure TPM with IO-ports */
 | 
						|
		tpm_config_out(IOLIMH, TPM_INF_ADDR);
 | 
						|
		tpm_config_out((tpm_dev.data_regs >> 8) & 0xff, TPM_INF_DATA);
 | 
						|
		tpm_config_out(IOLIML, TPM_INF_ADDR);
 | 
						|
		tpm_config_out((tpm_dev.data_regs & 0xff), TPM_INF_DATA);
 | 
						|
 | 
						|
		/* control if IO-ports are set correctly */
 | 
						|
		tpm_config_out(IOLIMH, TPM_INF_ADDR);
 | 
						|
		ioh = tpm_config_in(TPM_INF_DATA);
 | 
						|
		tpm_config_out(IOLIML, TPM_INF_ADDR);
 | 
						|
		iol = tpm_config_in(TPM_INF_DATA);
 | 
						|
 | 
						|
		if ((ioh << 8 | iol) != tpm_dev.data_regs) {
 | 
						|
			dev_err(&dev->dev,
 | 
						|
				"Could not set IO-data registers to 0x%x\n",
 | 
						|
				tpm_dev.data_regs);
 | 
						|
			rc = -EIO;
 | 
						|
			goto err_release_region;
 | 
						|
		}
 | 
						|
 | 
						|
		/* activate register */
 | 
						|
		tpm_config_out(TPM_DAR, TPM_INF_ADDR);
 | 
						|
		tpm_config_out(0x01, TPM_INF_DATA);
 | 
						|
		tpm_config_out(DISABLE_REGISTER_PAIR, TPM_INF_ADDR);
 | 
						|
 | 
						|
		/* disable RESET, LP and IRQC */
 | 
						|
		tpm_data_out(RESET_LP_IRQC_DISABLE, CMD);
 | 
						|
 | 
						|
		/* Finally, we're done, print some infos */
 | 
						|
		dev_info(&dev->dev, "TPM found: "
 | 
						|
			 "config base 0x%lx, "
 | 
						|
			 "data base 0x%lx, "
 | 
						|
			 "chip version 0x%02x%02x, "
 | 
						|
			 "vendor id 0x%x%x (Infineon), "
 | 
						|
			 "product id 0x%02x%02x"
 | 
						|
			 "%s\n",
 | 
						|
			 tpm_dev.iotype == TPM_INF_IO_PORT ?
 | 
						|
			 tpm_dev.config_port :
 | 
						|
			 tpm_dev.map_base + tpm_dev.index_off,
 | 
						|
			 tpm_dev.iotype == TPM_INF_IO_PORT ?
 | 
						|
			 tpm_dev.data_regs :
 | 
						|
			 tpm_dev.map_base + tpm_dev.data_regs,
 | 
						|
			 version[0], version[1],
 | 
						|
			 vendorid[0], vendorid[1],
 | 
						|
			 productid[0], productid[1], chipname);
 | 
						|
 | 
						|
		if (!(chip = tpm_register_hardware(&dev->dev, &tpm_inf)))
 | 
						|
			goto err_release_region;
 | 
						|
 | 
						|
		return 0;
 | 
						|
	} else {
 | 
						|
		rc = -ENODEV;
 | 
						|
		goto err_release_region;
 | 
						|
	}
 | 
						|
 | 
						|
err_release_region:
 | 
						|
	if (tpm_dev.iotype == TPM_INF_IO_PORT) {
 | 
						|
		release_region(tpm_dev.data_regs, tpm_dev.data_size);
 | 
						|
		release_region(tpm_dev.config_port, tpm_dev.config_size);
 | 
						|
	} else {
 | 
						|
		iounmap(tpm_dev.mem_base);
 | 
						|
		release_mem_region(tpm_dev.map_base, tpm_dev.map_size);
 | 
						|
	}
 | 
						|
 | 
						|
err_last:
 | 
						|
	return rc;
 | 
						|
}
 | 
						|
 | 
						|
static __devexit void tpm_inf_pnp_remove(struct pnp_dev *dev)
 | 
						|
{
 | 
						|
	struct tpm_chip *chip = pnp_get_drvdata(dev);
 | 
						|
 | 
						|
	if (chip) {
 | 
						|
		if (tpm_dev.iotype == TPM_INF_IO_PORT) {
 | 
						|
			release_region(tpm_dev.data_regs, tpm_dev.data_size);
 | 
						|
			release_region(tpm_dev.config_port,
 | 
						|
				       tpm_dev.config_size);
 | 
						|
		} else {
 | 
						|
			iounmap(tpm_dev.mem_base);
 | 
						|
			release_mem_region(tpm_dev.map_base, tpm_dev.map_size);
 | 
						|
		}
 | 
						|
		tpm_dev_vendor_release(chip);
 | 
						|
		tpm_remove_hardware(chip->dev);
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
static int tpm_inf_pnp_suspend(struct pnp_dev *dev, pm_message_t pm_state)
 | 
						|
{
 | 
						|
	struct tpm_chip *chip = pnp_get_drvdata(dev);
 | 
						|
	int rc;
 | 
						|
	if (chip) {
 | 
						|
		u8 savestate[] = {
 | 
						|
			0, 193,	/* TPM_TAG_RQU_COMMAND */
 | 
						|
			0, 0, 0, 10,	/* blob length (in bytes) */
 | 
						|
			0, 0, 0, 152	/* TPM_ORD_SaveState */
 | 
						|
		};
 | 
						|
		dev_info(&dev->dev, "saving TPM state\n");
 | 
						|
		rc = tpm_inf_send(chip, savestate, sizeof(savestate));
 | 
						|
		if (rc < 0) {
 | 
						|
			dev_err(&dev->dev, "error while saving TPM state\n");
 | 
						|
			return rc;
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
static int tpm_inf_pnp_resume(struct pnp_dev *dev)
 | 
						|
{
 | 
						|
	/* Re-configure TPM after suspending */
 | 
						|
	tpm_config_out(ENABLE_REGISTER_PAIR, TPM_INF_ADDR);
 | 
						|
	tpm_config_out(IOLIMH, TPM_INF_ADDR);
 | 
						|
	tpm_config_out((tpm_dev.data_regs >> 8) & 0xff, TPM_INF_DATA);
 | 
						|
	tpm_config_out(IOLIML, TPM_INF_ADDR);
 | 
						|
	tpm_config_out((tpm_dev.data_regs & 0xff), TPM_INF_DATA);
 | 
						|
	/* activate register */
 | 
						|
	tpm_config_out(TPM_DAR, TPM_INF_ADDR);
 | 
						|
	tpm_config_out(0x01, TPM_INF_DATA);
 | 
						|
	tpm_config_out(DISABLE_REGISTER_PAIR, TPM_INF_ADDR);
 | 
						|
	/* disable RESET, LP and IRQC */
 | 
						|
	tpm_data_out(RESET_LP_IRQC_DISABLE, CMD);
 | 
						|
	return tpm_pm_resume(&dev->dev);
 | 
						|
}
 | 
						|
 | 
						|
static struct pnp_driver tpm_inf_pnp_driver = {
 | 
						|
	.name = "tpm_inf_pnp",
 | 
						|
	.id_table = tpm_inf_pnp_tbl,
 | 
						|
	.probe = tpm_inf_pnp_probe,
 | 
						|
	.suspend = tpm_inf_pnp_suspend,
 | 
						|
	.resume = tpm_inf_pnp_resume,
 | 
						|
	.remove = __devexit_p(tpm_inf_pnp_remove)
 | 
						|
};
 | 
						|
 | 
						|
static int __init init_inf(void)
 | 
						|
{
 | 
						|
	return pnp_register_driver(&tpm_inf_pnp_driver);
 | 
						|
}
 | 
						|
 | 
						|
static void __exit cleanup_inf(void)
 | 
						|
{
 | 
						|
	pnp_unregister_driver(&tpm_inf_pnp_driver);
 | 
						|
}
 | 
						|
 | 
						|
module_init(init_inf);
 | 
						|
module_exit(cleanup_inf);
 | 
						|
 | 
						|
MODULE_AUTHOR("Marcel Selhorst <m.selhorst@sirrix.com>");
 | 
						|
MODULE_DESCRIPTION("Driver for Infineon TPM SLD 9630 TT 1.1 / SLB 9635 TT 1.2");
 | 
						|
MODULE_VERSION("1.9.2");
 | 
						|
MODULE_LICENSE("GPL");
 |