Message ID | 20190828082150.42194-5-swboyd@chromium.org (mailing list archive) |
---|---|
State | New, archived |
Headers | show |
Series | tpm: Add driver for cr50 | expand |
Am Mittwoch, 28. August 2019, 10:21:50 CEST schrieb Stephen Boyd: > Add TPM2.0 PTP FIFO compatible SPI interface for chips with Cr50 > firmware. The firmware running on the currently supported H1 Secure > Microcontroller requires a special driver to handle its specifics: > > - need to ensure a certain delay between SPI transactions, or else > the chip may miss some part of the next transaction > - if there is no SPI activity for some time, it may go to sleep, > and needs to be waken up before sending further commands > - access to vendor-specific registers > > Cr50 firmware has a requirement to wait for the TPM to wakeup before > sending commands over the SPI bus. Otherwise, the firmware could be in > deep sleep and not respond. The method to wait for the device to wakeup > is slightly different than the usual flow control mechanism described in > the TCG SPI spec. Add a completion to tpm_tis_spi_transfer() before we > start a SPI transfer so we can keep track of the last time the TPM > driver accessed the SPI bus to support the flow control mechanism. While the previous version did run just fine on my mainline gru-scarlet, this v5 very persistently runs into a panic on every boot: [ 6.625500] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000 [ 6.632983] tpm_tis_spi spi1.0: Timeout waiting for TPM ready IRQ [ 6.637415] Mem abort info: [ 6.637417] ESR = 0x96000004 [ 6.637419] Exception class = DABT (current EL), IL = 32 bits [ 6.637423] SET = 0, FnV = 0 [ 6.644235] tpm_tis_spi spi1.0: TPM ready IRQ confirmed on attempt 1 [ 6.647350] EA = 0, S1PTW = 0 [ 6.647352] Data abort info: [ 6.647353] ISV = 0, ISS = 0x00000004 [ 6.647354] CM = 0, WnR = 0 [ 6.647357] user pgtable: 4k pages, 48-bit VAs, pgdp=00000000eacc4000 [ 6.647361] [0000000000000000] pgd=0000000000000000 [ 6.694812] Internal error: Oops: 96000004 [#1] SMP [ 6.700258] Modules linked in: tpm_tis_spi_mod(+) dw_mipi_dsi industrialio_triggered_buffer panfrost(+) drm_kms_helper videobuf2_memops kfifo_buf tpm_tis_core ov2685 ov5695 cros_ec_sensors_core videobuf2_v4l2 gpu_sched tpm videobuf2_common v4l2_common v4l2_fwnode crct10dif_ce drm videodev phy_rockchip_pcie phy_rockchip_dphy dw_wdt rng_core cros_ec_dev rockchip_thermal i2c_hid elants_i2c mc drm_panel_orientation_quirks pwm_bl ipv6 [ 6.742857] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.3.0-rc6-02924-gef15fcdb727f-dirty #1308 [ 6.752580] Hardware name: Google Scarlet (DT) [ 6.757542] pstate: a0000085 (NzCv daIf -PAN -UAO) [ 6.762901] pc : __wake_up_common+0x58/0x170 [ 6.767670] lr : __wake_up_locked+0x18/0x20 [ 6.772340] sp : ffff000010003d40 [ 6.776038] x29: ffff000010003d40 x28: 0000000000000060 [ 6.781972] x27: 0000000000000000 x26: ffff000010e4fcef [ 6.787905] x25: 0000000000000001 x24: 0000000000000000 [ 6.793838] x23: 0000000000000000 x22: 0000000000000000 [ 6.799772] x21: 0000000000000003 x20: ffff8000f0431308 [ 6.804944] dwmmc_rockchip fe320000.dwmmc: Unexpected data interrupt latency [ 6.805707] x19: ffff8000f04312f8 x18: 0000000000000000 [ 6.819504] x17: 0000000000000000 x16: 0000000000000000 [ 6.825437] x15: 0000000000000000 x14: 0000000000000000 [ 6.831370] x13: 0000000000000000 x12: ffff000010dc9688 [ 6.837304] x11: 071c71c71c71c71c x10: 0000000000000040 [ 6.843237] x9 : ffff000010de15d8 x8 : ffff000010de15d0 [ 6.849171] x7 : ffffffffffffffe8 x6 : 0000000000000000 [ 6.855104] x5 : 0000000000000000 x4 : 0000000000000000 [ 6.856947] tpm_tis_spi spi1.0: SPI transfer timed out [ 6.861037] x3 : 0000000000000000 x2 : 0000000000000001 [ 6.861040] x1 : 0000000000000003 x0 : 0000000000000000 [ 6.861045] Call trace: [ 6.866794] spi_master spi1: failed to transfer one message from queue [ 6.872724] __wake_up_common+0x58/0x170 [ 6.872727] __wake_up_locked+0x18/0x20 [ 6.872732] complete+0x74/0xa8 [ 6.900836] cr50_spi_irq_handler+0x18/0x28 [tpm_tis_spi_mod] [ 6.907258] __handle_irq_event_percpu+0x6c/0x170 [ 6.912512] handle_irq_event_percpu+0x34/0x88 [ 6.917474] handle_irq_event+0x40/0x98 [ 6.921756] handle_edge_irq+0xcc/0x208 [ 6.926039] generic_handle_irq+0x24/0x38 [ 6.930516] rockchip_irq_demux+0x9c/0x1f0 [ 6.935091] generic_handle_irq+0x24/0x38 [ 6.939567] __handle_domain_irq+0x60/0xb8 [ 6.944140] gic_handle_irq+0xa8/0x148 [ 6.948326] el1_irq+0xb8/0x140 [ 6.951834] cpuidle_enter_state+0x84/0x360 [ 6.956506] cpuidle_enter+0x34/0x48 [ 6.960496] call_cpuidle+0x1c/0x40 [ 6.964388] do_idle+0x270/0x2a0 [ 6.967991] cpu_startup_entry+0x20/0x28 [ 6.972371] rest_init+0xb4/0xc0 [ 6.975976] arch_call_rest_init+0xc/0x14 [ 6.980452] start_kernel+0x444/0x470 [ 6.984543] Code: aa0503f8 f9002bfb aa0403f7 5280001b (f9400cf3) [ 6.991357] ---[ end trace 0371d5a99c07b7ba ]--- [ 6.996513] Kernel panic - not syncing: Fatal exception in interrupt [ 7.003613] SMP: stopping secondary CPUs [ 7.007994] Kernel Offset: disabled [ 7.011887] CPU features: 0x0002,2100600c [ 7.016362] Memory Limit: none [ 7.019763] ---[ end Kernel panic - not syncing: Fatal exception in interrupt ]--- Heiko
Quoting Heiko Stuebner (2019-08-28 10:36:29) > Am Mittwoch, 28. August 2019, 10:21:50 CEST schrieb Stephen Boyd: > > Add TPM2.0 PTP FIFO compatible SPI interface for chips with Cr50 > > firmware. The firmware running on the currently supported H1 Secure > > Microcontroller requires a special driver to handle its specifics: > > > > - need to ensure a certain delay between SPI transactions, or else > > the chip may miss some part of the next transaction > > - if there is no SPI activity for some time, it may go to sleep, > > and needs to be waken up before sending further commands > > - access to vendor-specific registers > > > > Cr50 firmware has a requirement to wait for the TPM to wakeup before > > sending commands over the SPI bus. Otherwise, the firmware could be in > > deep sleep and not respond. The method to wait for the device to wakeup > > is slightly different than the usual flow control mechanism described in > > the TCG SPI spec. Add a completion to tpm_tis_spi_transfer() before we > > start a SPI transfer so we can keep track of the last time the TPM > > driver accessed the SPI bus to support the flow control mechanism. > > While the previous version did run just fine on my mainline gru-scarlet, > this v5 very persistently runs into a panic on every boot: > > [ 6.625500] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000 > [ 6.632983] tpm_tis_spi spi1.0: Timeout waiting for TPM ready IRQ > [ 6.637415] Mem abort info: > [ 6.637417] ESR = 0x96000004 > [ 6.637419] Exception class = DABT (current EL), IL = 32 bits > [ 6.637423] SET = 0, FnV = 0 > [ 6.644235] tpm_tis_spi spi1.0: TPM ready IRQ confirmed on attempt 1 > [ 6.647350] EA = 0, S1PTW = 0 > [ 6.647352] Data abort info: > [ 6.647353] ISV = 0, ISS = 0x00000004 > [ 6.647354] CM = 0, WnR = 0 > [ 6.647357] user pgtable: 4k pages, 48-bit VAs, pgdp=00000000eacc4000 > [ 6.647361] [0000000000000000] pgd=0000000000000000 > [ 6.694812] Internal error: Oops: 96000004 [#1] SMP > [ 6.700258] Modules linked in: tpm_tis_spi_mod(+) dw_mipi_dsi industrialio_triggered_buffer panfrost(+) drm_kms_helper videobuf2_memops kfifo_buf tpm_tis_core ov2685 ov5695 cros_ec_sensors_core videobuf2_v4l2 gpu_sched tpm videobuf2_common v4l2_common v4l2_fwnode crct10dif_ce drm videodev phy_rockchip_pcie phy_rockchip_dphy dw_wdt rng_core cros_ec_dev rockchip_thermal i2c_hid elants_i2c mc drm_panel_orientation_quirks pwm_bl ipv6 > [ 6.742857] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.3.0-rc6-02924-gef15fcdb727f-dirty #1308 > [ 6.752580] Hardware name: Google Scarlet (DT) > [ 6.757542] pstate: a0000085 (NzCv daIf -PAN -UAO) > [ 6.762901] pc : __wake_up_common+0x58/0x170 > [ 6.767670] lr : __wake_up_locked+0x18/0x20 > [ 6.772340] sp : ffff000010003d40 > [ 6.776038] x29: ffff000010003d40 x28: 0000000000000060 > [ 6.781972] x27: 0000000000000000 x26: ffff000010e4fcef > [ 6.787905] x25: 0000000000000001 x24: 0000000000000000 > [ 6.793838] x23: 0000000000000000 x22: 0000000000000000 > [ 6.799772] x21: 0000000000000003 x20: ffff8000f0431308 > [ 6.804944] dwmmc_rockchip fe320000.dwmmc: Unexpected data interrupt latency > [ 6.805707] x19: ffff8000f04312f8 x18: 0000000000000000 > [ 6.819504] x17: 0000000000000000 x16: 0000000000000000 > [ 6.825437] x15: 0000000000000000 x14: 0000000000000000 > [ 6.831370] x13: 0000000000000000 x12: ffff000010dc9688 > [ 6.837304] x11: 071c71c71c71c71c x10: 0000000000000040 > [ 6.843237] x9 : ffff000010de15d8 x8 : ffff000010de15d0 > [ 6.849171] x7 : ffffffffffffffe8 x6 : 0000000000000000 > [ 6.855104] x5 : 0000000000000000 x4 : 0000000000000000 > [ 6.856947] tpm_tis_spi spi1.0: SPI transfer timed out > [ 6.861037] x3 : 0000000000000000 x2 : 0000000000000001 > [ 6.861040] x1 : 0000000000000003 x0 : 0000000000000000 > [ 6.861045] Call trace: > [ 6.866794] spi_master spi1: failed to transfer one message from queue > [ 6.872724] __wake_up_common+0x58/0x170 > [ 6.872727] __wake_up_locked+0x18/0x20 > [ 6.872732] complete+0x74/0xa8 > [ 6.900836] cr50_spi_irq_handler+0x18/0x28 [tpm_tis_spi_mod] Thanks! I forgot about pending interrupts and got a little overzealous in consolidating that line of code. Can you try this patch? ---8<----- diff --git a/drivers/char/tpm/cr50_spi.c b/drivers/char/tpm/cr50_spi.c index 535674f4b02a..24b1fb514161 100644 --- a/drivers/char/tpm/cr50_spi.c +++ b/drivers/char/tpm/cr50_spi.c @@ -259,12 +259,12 @@ int cr50_spi_probe(struct spi_device *spi) phy = &cr50_phy->spi_phy; phy->flow_control = cr50_spi_flow_control; phy->is_cr50 = true; + init_completion(&phy->ready); cr50_phy->access_delay = CR50_NOIRQ_ACCESS_DELAY; - - mutex_init(&cr50_phy->time_track_mutex); cr50_phy->wake_after = jiffies; cr50_phy->last_access = jiffies; + mutex_init(&cr50_phy->time_track_mutex); if (spi->irq > 0) { ret = devm_request_irq(&spi->dev, spi->irq, cr50_spi_irq_handler, diff --git a/drivers/char/tpm/tpm_tis_spi.c b/drivers/char/tpm/tpm_tis_spi.c index fdac842a61ed..2f120ddce2d2 100644 --- a/drivers/char/tpm/tpm_tis_spi.c +++ b/drivers/char/tpm/tpm_tis_spi.c @@ -201,7 +201,6 @@ int tpm_tis_spi_init(struct spi_device *spi, struct tpm_tis_spi_phy *phy, if (!phy->iobuf) return -ENOMEM; - init_completion(&phy->ready); phy->spi_device = spi; return tpm_tis_core_init(&spi->dev, &phy->priv, irq, phy_ops, NULL); @@ -239,6 +238,7 @@ static int tpm_tis_spi_probe(struct spi_device *dev) else irq = -1; + init_completion(&phy->ready); return tpm_tis_spi_init(dev, phy, irq, &tpm_spi_phy_ops); }
Am Mittwoch, 28. August 2019, 20:07:26 CEST schrieb Stephen Boyd: > Quoting Heiko Stuebner (2019-08-28 10:36:29) > > Am Mittwoch, 28. August 2019, 10:21:50 CEST schrieb Stephen Boyd: > > > Add TPM2.0 PTP FIFO compatible SPI interface for chips with Cr50 > > > firmware. The firmware running on the currently supported H1 Secure > > > Microcontroller requires a special driver to handle its specifics: > > > > > > - need to ensure a certain delay between SPI transactions, or else > > > the chip may miss some part of the next transaction > > > - if there is no SPI activity for some time, it may go to sleep, > > > and needs to be waken up before sending further commands > > > - access to vendor-specific registers > > > > > > Cr50 firmware has a requirement to wait for the TPM to wakeup before > > > sending commands over the SPI bus. Otherwise, the firmware could be in > > > deep sleep and not respond. The method to wait for the device to wakeup > > > is slightly different than the usual flow control mechanism described in > > > the TCG SPI spec. Add a completion to tpm_tis_spi_transfer() before we > > > start a SPI transfer so we can keep track of the last time the TPM > > > driver accessed the SPI bus to support the flow control mechanism. > > > > While the previous version did run just fine on my mainline gru-scarlet, > > this v5 very persistently runs into a panic on every boot: > > > > [ 6.625500] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000 > > [ 6.632983] tpm_tis_spi spi1.0: Timeout waiting for TPM ready IRQ > > [ 6.637415] Mem abort info: > > [ 6.637417] ESR = 0x96000004 > > [ 6.637419] Exception class = DABT (current EL), IL = 32 bits > > [ 6.637423] SET = 0, FnV = 0 > > [ 6.644235] tpm_tis_spi spi1.0: TPM ready IRQ confirmed on attempt 1 > > [ 6.647350] EA = 0, S1PTW = 0 > > [ 6.647352] Data abort info: > > [ 6.647353] ISV = 0, ISS = 0x00000004 > > [ 6.647354] CM = 0, WnR = 0 > > [ 6.647357] user pgtable: 4k pages, 48-bit VAs, pgdp=00000000eacc4000 > > [ 6.647361] [0000000000000000] pgd=0000000000000000 > > [ 6.694812] Internal error: Oops: 96000004 [#1] SMP > > [ 6.700258] Modules linked in: tpm_tis_spi_mod(+) dw_mipi_dsi industrialio_triggered_buffer panfrost(+) drm_kms_helper videobuf2_memops kfifo_buf tpm_tis_core ov2685 ov5695 cros_ec_sensors_core videobuf2_v4l2 gpu_sched tpm videobuf2_common v4l2_common v4l2_fwnode crct10dif_ce drm videodev phy_rockchip_pcie phy_rockchip_dphy dw_wdt rng_core cros_ec_dev rockchip_thermal i2c_hid elants_i2c mc drm_panel_orientation_quirks pwm_bl ipv6 > > [ 6.742857] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.3.0-rc6-02924-gef15fcdb727f-dirty #1308 > > [ 6.752580] Hardware name: Google Scarlet (DT) > > [ 6.757542] pstate: a0000085 (NzCv daIf -PAN -UAO) > > [ 6.762901] pc : __wake_up_common+0x58/0x170 > > [ 6.767670] lr : __wake_up_locked+0x18/0x20 > > [ 6.772340] sp : ffff000010003d40 > > [ 6.776038] x29: ffff000010003d40 x28: 0000000000000060 > > [ 6.781972] x27: 0000000000000000 x26: ffff000010e4fcef > > [ 6.787905] x25: 0000000000000001 x24: 0000000000000000 > > [ 6.793838] x23: 0000000000000000 x22: 0000000000000000 > > [ 6.799772] x21: 0000000000000003 x20: ffff8000f0431308 > > [ 6.804944] dwmmc_rockchip fe320000.dwmmc: Unexpected data interrupt latency > > [ 6.805707] x19: ffff8000f04312f8 x18: 0000000000000000 > > [ 6.819504] x17: 0000000000000000 x16: 0000000000000000 > > [ 6.825437] x15: 0000000000000000 x14: 0000000000000000 > > [ 6.831370] x13: 0000000000000000 x12: ffff000010dc9688 > > [ 6.837304] x11: 071c71c71c71c71c x10: 0000000000000040 > > [ 6.843237] x9 : ffff000010de15d8 x8 : ffff000010de15d0 > > [ 6.849171] x7 : ffffffffffffffe8 x6 : 0000000000000000 > > [ 6.855104] x5 : 0000000000000000 x4 : 0000000000000000 > > [ 6.856947] tpm_tis_spi spi1.0: SPI transfer timed out > > [ 6.861037] x3 : 0000000000000000 x2 : 0000000000000001 > > [ 6.861040] x1 : 0000000000000003 x0 : 0000000000000000 > > [ 6.861045] Call trace: > > [ 6.866794] spi_master spi1: failed to transfer one message from queue > > [ 6.872724] __wake_up_common+0x58/0x170 > > [ 6.872727] __wake_up_locked+0x18/0x20 > > [ 6.872732] complete+0x74/0xa8 > > [ 6.900836] cr50_spi_irq_handler+0x18/0x28 [tpm_tis_spi_mod] > > Thanks! I forgot about pending interrupts and got a little overzealous > in consolidating that line of code. Can you try this patch? With that change the tpm is happy again, probes and talks to me. Heiko > ---8<----- > diff --git a/drivers/char/tpm/cr50_spi.c b/drivers/char/tpm/cr50_spi.c > index 535674f4b02a..24b1fb514161 100644 > --- a/drivers/char/tpm/cr50_spi.c > +++ b/drivers/char/tpm/cr50_spi.c > @@ -259,12 +259,12 @@ int cr50_spi_probe(struct spi_device *spi) > phy = &cr50_phy->spi_phy; > phy->flow_control = cr50_spi_flow_control; > phy->is_cr50 = true; > + init_completion(&phy->ready); > > cr50_phy->access_delay = CR50_NOIRQ_ACCESS_DELAY; > - > - mutex_init(&cr50_phy->time_track_mutex); > cr50_phy->wake_after = jiffies; > cr50_phy->last_access = jiffies; > + mutex_init(&cr50_phy->time_track_mutex); > > if (spi->irq > 0) { > ret = devm_request_irq(&spi->dev, spi->irq, cr50_spi_irq_handler, > diff --git a/drivers/char/tpm/tpm_tis_spi.c b/drivers/char/tpm/tpm_tis_spi.c > index fdac842a61ed..2f120ddce2d2 100644 > --- a/drivers/char/tpm/tpm_tis_spi.c > +++ b/drivers/char/tpm/tpm_tis_spi.c > @@ -201,7 +201,6 @@ int tpm_tis_spi_init(struct spi_device *spi, struct tpm_tis_spi_phy *phy, > if (!phy->iobuf) > return -ENOMEM; > > - init_completion(&phy->ready); > phy->spi_device = spi; > > return tpm_tis_core_init(&spi->dev, &phy->priv, irq, phy_ops, NULL); > @@ -239,6 +238,7 @@ static int tpm_tis_spi_probe(struct spi_device *dev) > else > irq = -1; > > + init_completion(&phy->ready); > return tpm_tis_spi_init(dev, phy, irq, &tpm_spi_phy_ops); > } >
On Wed, Aug 28, 2019 at 01:21:50AM -0700, Stephen Boyd wrote: > Add TPM2.0 PTP FIFO compatible SPI interface for chips with Cr50 > firmware. The firmware running on the currently supported H1 Secure > Microcontroller requires a special driver to handle its specifics: > > - need to ensure a certain delay between SPI transactions, or else > the chip may miss some part of the next transaction > - if there is no SPI activity for some time, it may go to sleep, > and needs to be waken up before sending further commands > - access to vendor-specific registers > > Cr50 firmware has a requirement to wait for the TPM to wakeup before > sending commands over the SPI bus. Otherwise, the firmware could be in > deep sleep and not respond. The method to wait for the device to wakeup > is slightly different than the usual flow control mechanism described in > the TCG SPI spec. Add a completion to tpm_tis_spi_transfer() before we > start a SPI transfer so we can keep track of the last time the TPM > driver accessed the SPI bus to support the flow control mechanism. > > Split the cr50 logic off into a different file to keep it out of the > normal code flow of the existing SPI driver while making it all part of > the same module when the code is optionally compiled into the same > module. Export a new function, tpm_tis_spi_init(), and the associated > read/write/transfer APIs so that we can do this. Make the cr50 code wrap > the tpm_tis_spi_phy struct with its own struct to override the behavior > of tpm_tis_spi_transfer() by supplying a custom flow control hook. This > shares the most code between the core driver and the cr50 support > without combining everything into the core driver or exporting module > symbols. > > Signed-off-by: Andrey Pronin <apronin@chromium.org> > Cc: Andrey Pronin <apronin@chromium.org> > Cc: Duncan Laurie <dlaurie@chromium.org> > Cc: Jason Gunthorpe <jgg@ziepe.ca> > Cc: Arnd Bergmann <arnd@arndb.de> > Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org> > Cc: Guenter Roeck <groeck@chromium.org> > Cc: Alexander Steffen <Alexander.Steffen@infineon.com> > Cc: Heiko Stuebner <heiko@sntech.de> > [swboyd@chromium.org: Replace boilerplate with SPDX tag, drop > suspended bit and remove ifdef checks in cr50.h, migrate to functions > exported in tpm_tis_spi.h, combine into one module instead of two] > Signed-off-by: Stephen Boyd <swboyd@chromium.org> > --- > drivers/char/tpm/Kconfig | 7 + > drivers/char/tpm/Makefile | 4 +- > drivers/char/tpm/cr50_spi.c | 327 +++++++++++++++++++++++++++++++++ > drivers/char/tpm/tpm_tis_spi.c | 58 +++--- > drivers/char/tpm/tpm_tis_spi.h | 54 ++++++ > 5 files changed, 423 insertions(+), 27 deletions(-) > create mode 100644 drivers/char/tpm/cr50_spi.c > create mode 100644 drivers/char/tpm/tpm_tis_spi.h > > diff --git a/drivers/char/tpm/Kconfig b/drivers/char/tpm/Kconfig > index 88a3c06fc153..1074a576a4ea 100644 > --- a/drivers/char/tpm/Kconfig > +++ b/drivers/char/tpm/Kconfig > @@ -67,6 +67,13 @@ config TCG_TIS_SPI > within Linux. To compile this driver as a module, choose M here; > the module will be called tpm_tis_spi. > > +config TCG_CR50_SPI > + bool "Cr50 SPI Interface" > + depends on TCG_TIS_SPI > + ---help--- > + If you have a H1 secure module running Cr50 firmware on SPI bus, > + say Yes and it will be accessible from within Linux. > + > config TCG_TIS_I2C_ATMEL > tristate "TPM Interface Specification 1.2 Interface (I2C - Atmel)" > depends on I2C > diff --git a/drivers/char/tpm/Makefile b/drivers/char/tpm/Makefile > index a01c4cab902a..d1a8c7be655d 100644 > --- a/drivers/char/tpm/Makefile > +++ b/drivers/char/tpm/Makefile > @@ -21,7 +21,9 @@ tpm-$(CONFIG_EFI) += eventlog/efi.o > tpm-$(CONFIG_OF) += eventlog/of.o > obj-$(CONFIG_TCG_TIS_CORE) += tpm_tis_core.o > obj-$(CONFIG_TCG_TIS) += tpm_tis.o > -obj-$(CONFIG_TCG_TIS_SPI) += tpm_tis_spi.o > +obj-$(CONFIG_TCG_TIS_SPI) += tpm_tis_spi_mod.o > +tpm_tis_spi_mod-$(CONFIG_TCG_TIS_SPI) += tpm_tis_spi.o > +tpm_tis_spi_mod-$(CONFIG_TCG_CR50_SPI) += cr50_spi.o > obj-$(CONFIG_TCG_TIS_I2C_ATMEL) += tpm_i2c_atmel.o > obj-$(CONFIG_TCG_TIS_I2C_INFINEON) += tpm_i2c_infineon.o > obj-$(CONFIG_TCG_TIS_I2C_NUVOTON) += tpm_i2c_nuvoton.o > diff --git a/drivers/char/tpm/cr50_spi.c b/drivers/char/tpm/cr50_spi.c > new file mode 100644 > index 000000000000..535674f4b02a > --- /dev/null > +++ b/drivers/char/tpm/cr50_spi.c > @@ -0,0 +1,327 @@ > +// SPDX-License-Identifier: GPL-2.0 > +/* > + * Copyright (C) 2016 Google, Inc > + * > + * This device driver implements a TCG PTP FIFO interface over SPI for chips > + * with Cr50 firmware. > + * It is based on tpm_tis_spi driver by Peter Huewe and Christophe Ricard. > + */ > + > +#include <linux/completion.h> > +#include <linux/interrupt.h> > +#include <linux/module.h> > +#include <linux/of.h> > +#include <linux/pm.h> > +#include <linux/spi/spi.h> > +#include <linux/wait.h> > + > +#include "tpm_tis_core.h" > +#include "tpm_tis_spi.h" > + > +/* > + * Cr50 timing constants: > + * - can go to sleep not earlier than after CR50_SLEEP_DELAY_MSEC. > + * - needs up to CR50_WAKE_START_DELAY_USEC to wake after sleep. > + * - requires waiting for "ready" IRQ, if supported; or waiting for at least > + * CR50_NOIRQ_ACCESS_DELAY_MSEC between transactions, if IRQ is not supported. > + * - waits for up to CR50_FLOW_CONTROL for flow control 'ready' indication. > + */ > +#define CR50_SLEEP_DELAY_MSEC 1000 > +#define CR50_WAKE_START_DELAY_USEC 1000 > +#define CR50_NOIRQ_ACCESS_DELAY msecs_to_jiffies(2) > +#define CR50_READY_IRQ_TIMEOUT msecs_to_jiffies(TPM2_TIMEOUT_A) > +#define CR50_FLOW_CONTROL msecs_to_jiffies(TPM2_TIMEOUT_A) > +#define MAX_IRQ_CONFIRMATION_ATTEMPTS 3 > + > +#define TPM_CR50_FW_VER(l) (0x0f90 | ((l) << 12)) > +#define TPM_CR50_MAX_FW_VER_LEN 64 > + > +struct cr50_spi_phy { > + struct tpm_tis_spi_phy spi_phy; > + > + struct mutex time_track_mutex; > + unsigned long last_access; > + unsigned long wake_after; > + > + unsigned long access_delay; > + > + unsigned int irq_confirmation_attempt; > + bool irq_needs_confirmation; > + bool irq_confirmed; > +}; > + > +static inline struct cr50_spi_phy *to_cr50_spi_phy(struct tpm_tis_spi_phy *phy) > +{ > + return container_of(phy, struct cr50_spi_phy, spi_phy); > +} > + > +/* > + * The cr50 interrupt handler just signals waiting threads that the > + * interrupt was asserted. It does not do any processing triggered > + * by interrupts but is instead used to avoid fixed delays. > + */ > +static irqreturn_t cr50_spi_irq_handler(int dummy, void *dev_id) > +{ > + struct cr50_spi_phy *cr50_phy = dev_id; > + > + cr50_phy->irq_confirmed = true; > + complete(&cr50_phy->spi_phy.ready); > + > + return IRQ_HANDLED; > +} > + > +/* > + * Cr50 needs to have at least some delay between consecutive > + * transactions. Make sure we wait. > + */ > +static void cr50_ensure_access_delay(struct cr50_spi_phy *phy) > +{ > + unsigned long allowed_access = phy->last_access + phy->access_delay; > + unsigned long time_now = jiffies; > + struct device *dev = &phy->spi_phy.spi_device->dev; > + > + /* > + * Note: There is a small chance, if Cr50 is not accessed in a few days, > + * that time_in_range will not provide the correct result after the wrap > + * around for jiffies. In this case, we'll have an unneeded short delay, > + * which is fine. > + */ > + if (time_in_range_open(time_now, phy->last_access, allowed_access)) { > + unsigned long remaining, timeout = allowed_access - time_now; > + > + remaining = wait_for_completion_timeout(&phy->spi_phy.ready, > + timeout); > + if (!remaining && phy->irq_confirmed) > + dev_warn(dev, "Timeout waiting for TPM ready IRQ\n"); > + } > + > + if (phy->irq_needs_confirmation) { > + unsigned int attempt = ++phy->irq_confirmation_attempt; > + > + if (phy->irq_confirmed) { > + phy->irq_needs_confirmation = false; > + phy->access_delay = CR50_READY_IRQ_TIMEOUT; > + dev_info(dev, "TPM ready IRQ confirmed on attempt %u\n", > + attempt); > + } else if (attempt > MAX_IRQ_CONFIRMATION_ATTEMPTS) { > + phy->irq_needs_confirmation = false; > + dev_warn(dev, "IRQ not confirmed - will use delays\n"); > + } > + } > +} > + > +/* > + * Cr50 might go to sleep if there is no SPI activity for some time and > + * miss the first few bits/bytes on the bus. In such case, wake it up > + * by asserting CS and give it time to start up. > + */ > +static bool cr50_needs_waking(struct cr50_spi_phy *phy) > +{ > + /* > + * Note: There is a small chance, if Cr50 is not accessed in a few days, > + * that time_in_range will not provide the correct result after the wrap > + * around for jiffies. In this case, we'll probably timeout or read > + * incorrect value from TPM_STS and just retry the operation. > + */ > + return !time_in_range_open(jiffies, phy->last_access, phy->wake_after); > +} > + > +static void cr50_wake_if_needed(struct cr50_spi_phy *cr50_phy) > +{ > + struct tpm_tis_spi_phy *phy = &cr50_phy->spi_phy; > + > + if (cr50_needs_waking(cr50_phy)) { > + /* Assert CS, wait 1 msec, deassert CS */ > + struct spi_transfer spi_cs_wake = { .delay_usecs = 1000 }; > + > + spi_sync_transfer(phy->spi_device, &spi_cs_wake, 1); > + /* Wait for it to fully wake */ > + usleep_range(CR50_WAKE_START_DELAY_USEC, > + CR50_WAKE_START_DELAY_USEC * 2); > + } > + > + /* Reset the time when we need to wake Cr50 again */ > + cr50_phy->wake_after = jiffies + msecs_to_jiffies(CR50_SLEEP_DELAY_MSEC); > +} > + > +/* > + * Flow control: clock the bus and wait for cr50 to set LSB before > + * sending/receiving data. TCG PTP spec allows it to happen during > + * the last byte of header, but cr50 never does that in practice, > + * and earlier versions had a bug when it was set too early, so don't > + * check for it during header transfer. > + */ > +static int cr50_spi_flow_control(struct tpm_tis_spi_phy *phy, > + struct spi_transfer *spi_xfer) > +{ > + struct device *dev = &phy->spi_device->dev; > + unsigned long timeout = jiffies + CR50_FLOW_CONTROL; > + struct spi_message m; > + int ret; > + > + spi_xfer->len = 1; > + > + do { > + spi_message_init(&m); > + spi_message_add_tail(spi_xfer, &m); > + ret = spi_sync_locked(phy->spi_device, &m); > + if (ret < 0) > + return ret; > + > + if (time_after(jiffies, timeout)) { > + dev_warn(dev, "Timeout during flow control\n"); > + return -EBUSY; > + } > + } while (!(phy->iobuf[0] & 0x01)); > + > + return 0; > +} > + > +static int tpm_tis_spi_cr50_transfer(struct tpm_tis_data *data, u32 addr, u16 len, > + u8 *in, const u8 *out) > +{ > + struct tpm_tis_spi_phy *phy = to_tpm_tis_spi_phy(data); > + struct cr50_spi_phy *cr50_phy = to_cr50_spi_phy(phy); > + int ret; > + > + mutex_lock(&cr50_phy->time_track_mutex); > + /* > + * Do this outside of spi_bus_lock in case cr50 is not the > + * only device on that spi bus. > + */ > + cr50_ensure_access_delay(cr50_phy); > + cr50_wake_if_needed(cr50_phy); > + > + ret = tpm_tis_spi_transfer(data, addr, len, in, out); > + > + cr50_phy->last_access = jiffies; > + mutex_unlock(&cr50_phy->time_track_mutex); > + > + return ret; > +} > + > +static int tpm_tis_spi_cr50_read_bytes(struct tpm_tis_data *data, u32 addr, > + u16 len, u8 *result) > +{ > + return tpm_tis_spi_cr50_transfer(data, addr, len, result, NULL); > +} > + > +static int tpm_tis_spi_cr50_write_bytes(struct tpm_tis_data *data, u32 addr, > + u16 len, const u8 *value) > +{ > + return tpm_tis_spi_cr50_transfer(data, addr, len, NULL, value); > +} > + > +static const struct tpm_tis_phy_ops tpm_spi_cr50_phy_ops = { > + .read_bytes = tpm_tis_spi_cr50_read_bytes, > + .write_bytes = tpm_tis_spi_cr50_write_bytes, > + .read16 = tpm_tis_spi_read16, > + .read32 = tpm_tis_spi_read32, > + .write32 = tpm_tis_spi_write32, > +}; > + > +static void cr50_print_fw_version(struct tpm_tis_data *data) > +{ > + struct tpm_tis_spi_phy *phy = to_tpm_tis_spi_phy(data); > + int i, len = 0; > + char fw_ver[TPM_CR50_MAX_FW_VER_LEN + 1]; > + char fw_ver_block[4]; > + > + /* > + * Write anything to TPM_CR50_FW_VER to start from the beginning > + * of the version string > + */ > + tpm_tis_write8(data, TPM_CR50_FW_VER(data->locality), 0); > + > + /* Read the string, 4 bytes at a time, until we get '\0' */ > + do { > + tpm_tis_read_bytes(data, TPM_CR50_FW_VER(data->locality), 4, > + fw_ver_block); > + for (i = 0; i < 4 && fw_ver_block[i]; ++len, ++i) > + fw_ver[len] = fw_ver_block[i]; > + } while (i == 4 && len < TPM_CR50_MAX_FW_VER_LEN); > + fw_ver[len] = '\0'; > + > + dev_info(&phy->spi_device->dev, "Cr50 firmware version: %s\n", fw_ver); > +} > + > +int cr50_spi_probe(struct spi_device *spi) > +{ > + struct tpm_tis_spi_phy *phy; > + struct cr50_spi_phy *cr50_phy; > + int ret; > + struct tpm_chip *chip; > + > + cr50_phy = devm_kzalloc(&spi->dev, sizeof(*cr50_phy), GFP_KERNEL); > + if (!cr50_phy) > + return -ENOMEM; > + > + phy = &cr50_phy->spi_phy; > + phy->flow_control = cr50_spi_flow_control; > + phy->is_cr50 = true; > + > + cr50_phy->access_delay = CR50_NOIRQ_ACCESS_DELAY; > + > + mutex_init(&cr50_phy->time_track_mutex); > + cr50_phy->wake_after = jiffies; > + cr50_phy->last_access = jiffies; > + > + if (spi->irq > 0) { > + ret = devm_request_irq(&spi->dev, spi->irq, cr50_spi_irq_handler, > + IRQF_TRIGGER_RISING | IRQF_ONESHOT, > + "cr50_spi", cr50_phy); > + if (ret < 0) { > + if (ret == -EPROBE_DEFER) > + return ret; > + dev_warn(&spi->dev, "Requesting IRQ %d failed: %d\n", > + spi->irq, ret); > + /* > + * This is not fatal, the driver will fall back to > + * delays automatically, since ready will never > + * be completed without a registered irq handler. > + * So, just fall through. > + */ > + } else { > + /* > + * IRQ requested, let's verify that it is actually > + * triggered, before relying on it. > + */ > + cr50_phy->irq_needs_confirmation = true; > + } > + } else { > + dev_warn(&spi->dev, > + "No IRQ - will use delays between transactions.\n"); > + } > + > + ret = tpm_tis_spi_init(spi, phy, -1, &tpm_spi_cr50_phy_ops); > + if (ret) > + return ret; > + > + cr50_print_fw_version(&phy->priv); > + > + chip = dev_get_drvdata(&spi->dev); > + chip->flags |= TPM_CHIP_FLAG_FIRMWARE_POWER_MANAGED; > + > + return 0; > +} > + > +#ifdef CONFIG_PM_SLEEP > +int tpm_tis_spi_resume(struct device *dev) > +{ > + struct tpm_chip *chip = dev_get_drvdata(dev); > + struct tpm_tis_data *data = dev_get_drvdata(&chip->dev); > + struct tpm_tis_spi_phy *phy = to_tpm_tis_spi_phy(data); > + struct cr50_spi_phy *cr50_phy; > + > + if (phy->is_cr50) { > + cr50_phy = to_cr50_spi_phy(phy); > + /* > + * Jiffies not increased during suspend, so we need to reset > + * the time to wake Cr50 after resume. > + */ > + cr50_phy->wake_after = jiffies; > + } To simplify the code I would just put also wake_after to tpm_tis_spi_phy. > + > + return tpm_tis_resume(dev); > +} > +#endif > diff --git a/drivers/char/tpm/tpm_tis_spi.c b/drivers/char/tpm/tpm_tis_spi.c > index b3ed85671dd8..fdac842a61ed 100644 > --- a/drivers/char/tpm/tpm_tis_spi.c > +++ b/drivers/char/tpm/tpm_tis_spi.c > @@ -20,6 +20,7 @@ > * Dorn and Kyleen Hall and Jarko Sakkinnen. > */ > > +#include <linux/completion.h> > #include <linux/init.h> > #include <linux/module.h> > #include <linux/moduleparam.h> > @@ -31,27 +32,16 @@ > > #include <linux/spi/spi.h> > #include <linux/gpio.h> > +#include <linux/of_device.h> > #include <linux/of_irq.h> > #include <linux/of_gpio.h> > #include <linux/tpm.h> > #include "tpm.h" > #include "tpm_tis_core.h" > +#include "tpm_tis_spi.h" > > #define MAX_SPI_FRAMESIZE 64 > > -struct tpm_tis_spi_phy { > - struct tpm_tis_data priv; > - struct spi_device *spi_device; > - int (*flow_control)(struct tpm_tis_spi_phy *phy, > - struct spi_transfer *xfer); > - u8 *iobuf; > -}; > - > -static inline struct tpm_tis_spi_phy *to_tpm_tis_spi_phy(struct tpm_tis_data *data) > -{ > - return container_of(data, struct tpm_tis_spi_phy, priv); > -} > - > /* > * TCG SPI flow control is documented in section 6.4 of the spec[1]. In short, > * keep trying to read from the device until MISO goes high indicating the > @@ -87,8 +77,8 @@ static int tpm_tis_spi_flow_control(struct tpm_tis_spi_phy *phy, > return 0; > } > > -static int tpm_tis_spi_transfer(struct tpm_tis_data *data, u32 addr, u16 len, > - u8 *in, const u8 *out) > +int tpm_tis_spi_transfer(struct tpm_tis_data *data, u32 addr, u16 len, > + u8 *in, const u8 *out) > { > struct tpm_tis_spi_phy *phy = to_tpm_tis_spi_phy(data); > int ret = 0; > @@ -136,6 +126,7 @@ static int tpm_tis_spi_transfer(struct tpm_tis_data *data, u32 addr, u16 len, > > spi_message_init(&m); > spi_message_add_tail(&spi_xfer, &m); > + reinit_completion(&phy->ready); > ret = spi_sync_locked(phy->spi_device, &m); > if (ret < 0) > goto exit; > @@ -165,7 +156,7 @@ static int tpm_tis_spi_write_bytes(struct tpm_tis_data *data, u32 addr, > return tpm_tis_spi_transfer(data, addr, len, NULL, value); > } > > -static int tpm_tis_spi_read16(struct tpm_tis_data *data, u32 addr, u16 *result) > +int tpm_tis_spi_read16(struct tpm_tis_data *data, u32 addr, u16 *result) > { > __le16 result_le; > int rc; > @@ -178,7 +169,7 @@ static int tpm_tis_spi_read16(struct tpm_tis_data *data, u32 addr, u16 *result) > return rc; > } > > -static int tpm_tis_spi_read32(struct tpm_tis_data *data, u32 addr, u32 *result) > +int tpm_tis_spi_read32(struct tpm_tis_data *data, u32 addr, u32 *result) > { > __le32 result_le; > int rc; > @@ -191,7 +182,7 @@ static int tpm_tis_spi_read32(struct tpm_tis_data *data, u32 addr, u32 *result) > return rc; > } > > -static int tpm_tis_spi_write32(struct tpm_tis_data *data, u32 addr, u32 value) > +int tpm_tis_spi_write32(struct tpm_tis_data *data, u32 addr, u32 value) > { > __le32 value_le; > int rc; > @@ -203,6 +194,19 @@ static int tpm_tis_spi_write32(struct tpm_tis_data *data, u32 addr, u32 value) > return rc; > } > > +int tpm_tis_spi_init(struct spi_device *spi, struct tpm_tis_spi_phy *phy, > + int irq, const struct tpm_tis_phy_ops *phy_ops) > +{ > + phy->iobuf = devm_kmalloc(&spi->dev, MAX_SPI_FRAMESIZE, GFP_KERNEL); > + if (!phy->iobuf) > + return -ENOMEM; > + > + init_completion(&phy->ready); > + phy->spi_device = spi; > + > + return tpm_tis_core_init(&spi->dev, &phy->priv, irq, phy_ops, NULL); > +} > + > static const struct tpm_tis_phy_ops tpm_spi_phy_ops = { > .read_bytes = tpm_tis_spi_read_bytes, > .write_bytes = tpm_tis_spi_write_bytes, > @@ -215,17 +219,18 @@ static int tpm_tis_spi_probe(struct spi_device *dev) > { > struct tpm_tis_spi_phy *phy; > int irq; > + struct device_node *np = dev->dev.of_node; > + const struct spi_device_id *spi_dev_id = spi_get_device_id(dev); > + > + if (of_device_is_compatible(np, "google,cr50") || > + (spi_dev_id && spi_dev_id->driver_data == TPM_IS_CR50)) > + return cr50_spi_probe(dev); You could keep pointers to probes directly in driver_data. > > phy = devm_kzalloc(&dev->dev, sizeof(struct tpm_tis_spi_phy), > GFP_KERNEL); > if (!phy) > return -ENOMEM; > > - phy->spi_device = dev; > - > - phy->iobuf = devm_kmalloc(&dev->dev, MAX_SPI_FRAMESIZE, GFP_KERNEL); > - if (!phy->iobuf) > - return -ENOMEM; > phy->flow_control = tpm_tis_spi_flow_control; > > /* If the SPI device has an IRQ then use that */ > @@ -234,11 +239,10 @@ static int tpm_tis_spi_probe(struct spi_device *dev) > else > irq = -1; > > - return tpm_tis_core_init(&dev->dev, &phy->priv, irq, &tpm_spi_phy_ops, > - NULL); > + return tpm_tis_spi_init(dev, phy, irq, &tpm_spi_phy_ops); > } > > -static SIMPLE_DEV_PM_OPS(tpm_tis_pm, tpm_pm_suspend, tpm_tis_resume); > +static SIMPLE_DEV_PM_OPS(tpm_tis_pm, tpm_pm_suspend, tpm_tis_spi_resume); > > static int tpm_tis_spi_remove(struct spi_device *dev) > { > @@ -251,6 +255,7 @@ static int tpm_tis_spi_remove(struct spi_device *dev) > > static const struct spi_device_id tpm_tis_spi_id[] = { > {"tpm_tis_spi", 0}, > + {"cr50", TPM_IS_CR50}, > {} > }; > MODULE_DEVICE_TABLE(spi, tpm_tis_spi_id); > @@ -259,6 +264,7 @@ static const struct of_device_id of_tis_spi_match[] = { > { .compatible = "st,st33htpm-spi", }, > { .compatible = "infineon,slb9670", }, > { .compatible = "tcg,tpm_tis-spi", }, > + { .compatible = "google,cr50", }, > {} > }; > MODULE_DEVICE_TABLE(of, of_tis_spi_match); > diff --git a/drivers/char/tpm/tpm_tis_spi.h b/drivers/char/tpm/tpm_tis_spi.h > new file mode 100644 > index 000000000000..6eab998fa905 > --- /dev/null > +++ b/drivers/char/tpm/tpm_tis_spi.h > @@ -0,0 +1,54 @@ > +/* SPDX-License-Identifier: GPL-2.0-only */ > +/* > + * Copyright (C) 2015 Infineon Technologies AG > + * Copyright (C) 2016 STMicroelectronics SAS > + */ > + > +#ifndef TPM_TIS_SPI_H > +#define TPM_TIS_SPI_H > + > +#include "tpm_tis_core.h" > + > +#define TPM_IS_CR50 1 > + > +struct tpm_tis_spi_phy { > + struct tpm_tis_data priv; > + struct spi_device *spi_device; > + int (*flow_control)(struct tpm_tis_spi_phy *phy, > + struct spi_transfer *xfer); > + struct completion ready; > + bool is_cr50; > + > + u8 *iobuf; > +}; > + > +static inline struct tpm_tis_spi_phy *to_tpm_tis_spi_phy(struct tpm_tis_data *data) > +{ > + return container_of(data, struct tpm_tis_spi_phy, priv); > +} > + > +extern int tpm_tis_spi_init(struct spi_device *spi, struct tpm_tis_spi_phy *phy, > + int irq, const struct tpm_tis_phy_ops *phy_ops); > + > +extern int tpm_tis_spi_transfer(struct tpm_tis_data *data, u32 addr, u16 len, > + u8 *in, const u8 *out); > + > +extern int tpm_tis_spi_read16(struct tpm_tis_data *data, u32 addr, u16 *result); > +extern int tpm_tis_spi_read32(struct tpm_tis_data *data, u32 addr, u32 *result); > +extern int tpm_tis_spi_write32(struct tpm_tis_data *data, u32 addr, u32 value); > + > +#ifdef CONFIG_TCG_CR50_SPI > +extern int cr50_spi_probe(struct spi_device *spi); > +#else > +static inline int cr50_spi_probe(struct spi_device *spi) { return -ENODEV; } > +#endif > + > +#ifdef CONFIG_PM_SLEEP > +#ifdef CONFIG_TCG_CR50_SPI > +extern int tpm_tis_spi_resume(struct device *dev); > +#else > +#define tpm_tis_spi_resume tpm_tis_resume > +#endif > +#endif > + > +#endif > -- > Sent by a computer through tubes > /Jarkko
Quoting Jarkko Sakkinen (2019-08-29 09:32:21) > On Wed, Aug 28, 2019 at 01:21:50AM -0700, Stephen Boyd wrote: > > diff --git a/drivers/char/tpm/cr50_spi.c b/drivers/char/tpm/cr50_spi.c > > new file mode 100644 > > index 000000000000..535674f4b02a > > --- /dev/null > > +++ b/drivers/char/tpm/cr50_spi.c > > @@ -0,0 +1,327 @@ [...] > > + > > +#ifdef CONFIG_PM_SLEEP > > +int tpm_tis_spi_resume(struct device *dev) > > +{ > > + struct tpm_chip *chip = dev_get_drvdata(dev); > > + struct tpm_tis_data *data = dev_get_drvdata(&chip->dev); > > + struct tpm_tis_spi_phy *phy = to_tpm_tis_spi_phy(data); > > + struct cr50_spi_phy *cr50_phy; > > + > > + if (phy->is_cr50) { > > + cr50_phy = to_cr50_spi_phy(phy); > > + /* > > + * Jiffies not increased during suspend, so we need to reset > > + * the time to wake Cr50 after resume. > > + */ > > + cr50_phy->wake_after = jiffies; > > + } > > To simplify the code I would just put also wake_after to > tpm_tis_spi_phy. Ok. But keep the other members in cr50_spi_phy as they are? > > > + > > + return tpm_tis_resume(dev); > > +} > > +#endif > > diff --git a/drivers/char/tpm/tpm_tis_spi.c b/drivers/char/tpm/tpm_tis_spi.c > > index b3ed85671dd8..fdac842a61ed 100644 > > --- a/drivers/char/tpm/tpm_tis_spi.c > > +++ b/drivers/char/tpm/tpm_tis_spi.c > > @@ -215,17 +219,18 @@ static int tpm_tis_spi_probe(struct spi_device *dev) > > { > > struct tpm_tis_spi_phy *phy; > > int irq; > > + struct device_node *np = dev->dev.of_node; > > + const struct spi_device_id *spi_dev_id = spi_get_device_id(dev); > > + > > + if (of_device_is_compatible(np, "google,cr50") || > > + (spi_dev_id && spi_dev_id->driver_data == TPM_IS_CR50)) > > + return cr50_spi_probe(dev); > > You could keep pointers to probes directly in driver_data. Ok. Will do.
On Thu, Aug 29, 2019 at 09:48:50AM -0700, Stephen Boyd wrote: > > > +int tpm_tis_spi_resume(struct device *dev) > > > +{ > > > + struct tpm_chip *chip = dev_get_drvdata(dev); > > > + struct tpm_tis_data *data = dev_get_drvdata(&chip->dev); > > > + struct tpm_tis_spi_phy *phy = to_tpm_tis_spi_phy(data); > > > + struct cr50_spi_phy *cr50_phy; > > > + > > > + if (phy->is_cr50) { > > > + cr50_phy = to_cr50_spi_phy(phy); > > > + /* > > > + * Jiffies not increased during suspend, so we need to reset > > > + * the time to wake Cr50 after resume. > > > + */ > > > + cr50_phy->wake_after = jiffies; > > > + } > > > > To simplify the code I would just put also wake_after to > > tpm_tis_spi_phy. > > Ok. But keep the other members in cr50_spi_phy as they are? Yes, just want to get rid of that boolean and branching since the operations done have insignificant cost. /Jarkko
diff --git a/drivers/char/tpm/Kconfig b/drivers/char/tpm/Kconfig index 88a3c06fc153..1074a576a4ea 100644 --- a/drivers/char/tpm/Kconfig +++ b/drivers/char/tpm/Kconfig @@ -67,6 +67,13 @@ config TCG_TIS_SPI within Linux. To compile this driver as a module, choose M here; the module will be called tpm_tis_spi. +config TCG_CR50_SPI + bool "Cr50 SPI Interface" + depends on TCG_TIS_SPI + ---help--- + If you have a H1 secure module running Cr50 firmware on SPI bus, + say Yes and it will be accessible from within Linux. + config TCG_TIS_I2C_ATMEL tristate "TPM Interface Specification 1.2 Interface (I2C - Atmel)" depends on I2C diff --git a/drivers/char/tpm/Makefile b/drivers/char/tpm/Makefile index a01c4cab902a..d1a8c7be655d 100644 --- a/drivers/char/tpm/Makefile +++ b/drivers/char/tpm/Makefile @@ -21,7 +21,9 @@ tpm-$(CONFIG_EFI) += eventlog/efi.o tpm-$(CONFIG_OF) += eventlog/of.o obj-$(CONFIG_TCG_TIS_CORE) += tpm_tis_core.o obj-$(CONFIG_TCG_TIS) += tpm_tis.o -obj-$(CONFIG_TCG_TIS_SPI) += tpm_tis_spi.o +obj-$(CONFIG_TCG_TIS_SPI) += tpm_tis_spi_mod.o +tpm_tis_spi_mod-$(CONFIG_TCG_TIS_SPI) += tpm_tis_spi.o +tpm_tis_spi_mod-$(CONFIG_TCG_CR50_SPI) += cr50_spi.o obj-$(CONFIG_TCG_TIS_I2C_ATMEL) += tpm_i2c_atmel.o obj-$(CONFIG_TCG_TIS_I2C_INFINEON) += tpm_i2c_infineon.o obj-$(CONFIG_TCG_TIS_I2C_NUVOTON) += tpm_i2c_nuvoton.o diff --git a/drivers/char/tpm/cr50_spi.c b/drivers/char/tpm/cr50_spi.c new file mode 100644 index 000000000000..535674f4b02a --- /dev/null +++ b/drivers/char/tpm/cr50_spi.c @@ -0,0 +1,327 @@ +// SPDX-License-Identifier: GPL-2.0 +/* + * Copyright (C) 2016 Google, Inc + * + * This device driver implements a TCG PTP FIFO interface over SPI for chips + * with Cr50 firmware. + * It is based on tpm_tis_spi driver by Peter Huewe and Christophe Ricard. + */ + +#include <linux/completion.h> +#include <linux/interrupt.h> +#include <linux/module.h> +#include <linux/of.h> +#include <linux/pm.h> +#include <linux/spi/spi.h> +#include <linux/wait.h> + +#include "tpm_tis_core.h" +#include "tpm_tis_spi.h" + +/* + * Cr50 timing constants: + * - can go to sleep not earlier than after CR50_SLEEP_DELAY_MSEC. + * - needs up to CR50_WAKE_START_DELAY_USEC to wake after sleep. + * - requires waiting for "ready" IRQ, if supported; or waiting for at least + * CR50_NOIRQ_ACCESS_DELAY_MSEC between transactions, if IRQ is not supported. + * - waits for up to CR50_FLOW_CONTROL for flow control 'ready' indication. + */ +#define CR50_SLEEP_DELAY_MSEC 1000 +#define CR50_WAKE_START_DELAY_USEC 1000 +#define CR50_NOIRQ_ACCESS_DELAY msecs_to_jiffies(2) +#define CR50_READY_IRQ_TIMEOUT msecs_to_jiffies(TPM2_TIMEOUT_A) +#define CR50_FLOW_CONTROL msecs_to_jiffies(TPM2_TIMEOUT_A) +#define MAX_IRQ_CONFIRMATION_ATTEMPTS 3 + +#define TPM_CR50_FW_VER(l) (0x0f90 | ((l) << 12)) +#define TPM_CR50_MAX_FW_VER_LEN 64 + +struct cr50_spi_phy { + struct tpm_tis_spi_phy spi_phy; + + struct mutex time_track_mutex; + unsigned long last_access; + unsigned long wake_after; + + unsigned long access_delay; + + unsigned int irq_confirmation_attempt; + bool irq_needs_confirmation; + bool irq_confirmed; +}; + +static inline struct cr50_spi_phy *to_cr50_spi_phy(struct tpm_tis_spi_phy *phy) +{ + return container_of(phy, struct cr50_spi_phy, spi_phy); +} + +/* + * The cr50 interrupt handler just signals waiting threads that the + * interrupt was asserted. It does not do any processing triggered + * by interrupts but is instead used to avoid fixed delays. + */ +static irqreturn_t cr50_spi_irq_handler(int dummy, void *dev_id) +{ + struct cr50_spi_phy *cr50_phy = dev_id; + + cr50_phy->irq_confirmed = true; + complete(&cr50_phy->spi_phy.ready); + + return IRQ_HANDLED; +} + +/* + * Cr50 needs to have at least some delay between consecutive + * transactions. Make sure we wait. + */ +static void cr50_ensure_access_delay(struct cr50_spi_phy *phy) +{ + unsigned long allowed_access = phy->last_access + phy->access_delay; + unsigned long time_now = jiffies; + struct device *dev = &phy->spi_phy.spi_device->dev; + + /* + * Note: There is a small chance, if Cr50 is not accessed in a few days, + * that time_in_range will not provide the correct result after the wrap + * around for jiffies. In this case, we'll have an unneeded short delay, + * which is fine. + */ + if (time_in_range_open(time_now, phy->last_access, allowed_access)) { + unsigned long remaining, timeout = allowed_access - time_now; + + remaining = wait_for_completion_timeout(&phy->spi_phy.ready, + timeout); + if (!remaining && phy->irq_confirmed) + dev_warn(dev, "Timeout waiting for TPM ready IRQ\n"); + } + + if (phy->irq_needs_confirmation) { + unsigned int attempt = ++phy->irq_confirmation_attempt; + + if (phy->irq_confirmed) { + phy->irq_needs_confirmation = false; + phy->access_delay = CR50_READY_IRQ_TIMEOUT; + dev_info(dev, "TPM ready IRQ confirmed on attempt %u\n", + attempt); + } else if (attempt > MAX_IRQ_CONFIRMATION_ATTEMPTS) { + phy->irq_needs_confirmation = false; + dev_warn(dev, "IRQ not confirmed - will use delays\n"); + } + } +} + +/* + * Cr50 might go to sleep if there is no SPI activity for some time and + * miss the first few bits/bytes on the bus. In such case, wake it up + * by asserting CS and give it time to start up. + */ +static bool cr50_needs_waking(struct cr50_spi_phy *phy) +{ + /* + * Note: There is a small chance, if Cr50 is not accessed in a few days, + * that time_in_range will not provide the correct result after the wrap + * around for jiffies. In this case, we'll probably timeout or read + * incorrect value from TPM_STS and just retry the operation. + */ + return !time_in_range_open(jiffies, phy->last_access, phy->wake_after); +} + +static void cr50_wake_if_needed(struct cr50_spi_phy *cr50_phy) +{ + struct tpm_tis_spi_phy *phy = &cr50_phy->spi_phy; + + if (cr50_needs_waking(cr50_phy)) { + /* Assert CS, wait 1 msec, deassert CS */ + struct spi_transfer spi_cs_wake = { .delay_usecs = 1000 }; + + spi_sync_transfer(phy->spi_device, &spi_cs_wake, 1); + /* Wait for it to fully wake */ + usleep_range(CR50_WAKE_START_DELAY_USEC, + CR50_WAKE_START_DELAY_USEC * 2); + } + + /* Reset the time when we need to wake Cr50 again */ + cr50_phy->wake_after = jiffies + msecs_to_jiffies(CR50_SLEEP_DELAY_MSEC); +} + +/* + * Flow control: clock the bus and wait for cr50 to set LSB before + * sending/receiving data. TCG PTP spec allows it to happen during + * the last byte of header, but cr50 never does that in practice, + * and earlier versions had a bug when it was set too early, so don't + * check for it during header transfer. + */ +static int cr50_spi_flow_control(struct tpm_tis_spi_phy *phy, + struct spi_transfer *spi_xfer) +{ + struct device *dev = &phy->spi_device->dev; + unsigned long timeout = jiffies + CR50_FLOW_CONTROL; + struct spi_message m; + int ret; + + spi_xfer->len = 1; + + do { + spi_message_init(&m); + spi_message_add_tail(spi_xfer, &m); + ret = spi_sync_locked(phy->spi_device, &m); + if (ret < 0) + return ret; + + if (time_after(jiffies, timeout)) { + dev_warn(dev, "Timeout during flow control\n"); + return -EBUSY; + } + } while (!(phy->iobuf[0] & 0x01)); + + return 0; +} + +static int tpm_tis_spi_cr50_transfer(struct tpm_tis_data *data, u32 addr, u16 len, + u8 *in, const u8 *out) +{ + struct tpm_tis_spi_phy *phy = to_tpm_tis_spi_phy(data); + struct cr50_spi_phy *cr50_phy = to_cr50_spi_phy(phy); + int ret; + + mutex_lock(&cr50_phy->time_track_mutex); + /* + * Do this outside of spi_bus_lock in case cr50 is not the + * only device on that spi bus. + */ + cr50_ensure_access_delay(cr50_phy); + cr50_wake_if_needed(cr50_phy); + + ret = tpm_tis_spi_transfer(data, addr, len, in, out); + + cr50_phy->last_access = jiffies; + mutex_unlock(&cr50_phy->time_track_mutex); + + return ret; +} + +static int tpm_tis_spi_cr50_read_bytes(struct tpm_tis_data *data, u32 addr, + u16 len, u8 *result) +{ + return tpm_tis_spi_cr50_transfer(data, addr, len, result, NULL); +} + +static int tpm_tis_spi_cr50_write_bytes(struct tpm_tis_data *data, u32 addr, + u16 len, const u8 *value) +{ + return tpm_tis_spi_cr50_transfer(data, addr, len, NULL, value); +} + +static const struct tpm_tis_phy_ops tpm_spi_cr50_phy_ops = { + .read_bytes = tpm_tis_spi_cr50_read_bytes, + .write_bytes = tpm_tis_spi_cr50_write_bytes, + .read16 = tpm_tis_spi_read16, + .read32 = tpm_tis_spi_read32, + .write32 = tpm_tis_spi_write32, +}; + +static void cr50_print_fw_version(struct tpm_tis_data *data) +{ + struct tpm_tis_spi_phy *phy = to_tpm_tis_spi_phy(data); + int i, len = 0; + char fw_ver[TPM_CR50_MAX_FW_VER_LEN + 1]; + char fw_ver_block[4]; + + /* + * Write anything to TPM_CR50_FW_VER to start from the beginning + * of the version string + */ + tpm_tis_write8(data, TPM_CR50_FW_VER(data->locality), 0); + + /* Read the string, 4 bytes at a time, until we get '\0' */ + do { + tpm_tis_read_bytes(data, TPM_CR50_FW_VER(data->locality), 4, + fw_ver_block); + for (i = 0; i < 4 && fw_ver_block[i]; ++len, ++i) + fw_ver[len] = fw_ver_block[i]; + } while (i == 4 && len < TPM_CR50_MAX_FW_VER_LEN); + fw_ver[len] = '\0'; + + dev_info(&phy->spi_device->dev, "Cr50 firmware version: %s\n", fw_ver); +} + +int cr50_spi_probe(struct spi_device *spi) +{ + struct tpm_tis_spi_phy *phy; + struct cr50_spi_phy *cr50_phy; + int ret; + struct tpm_chip *chip; + + cr50_phy = devm_kzalloc(&spi->dev, sizeof(*cr50_phy), GFP_KERNEL); + if (!cr50_phy) + return -ENOMEM; + + phy = &cr50_phy->spi_phy; + phy->flow_control = cr50_spi_flow_control; + phy->is_cr50 = true; + + cr50_phy->access_delay = CR50_NOIRQ_ACCESS_DELAY; + + mutex_init(&cr50_phy->time_track_mutex); + cr50_phy->wake_after = jiffies; + cr50_phy->last_access = jiffies; + + if (spi->irq > 0) { + ret = devm_request_irq(&spi->dev, spi->irq, cr50_spi_irq_handler, + IRQF_TRIGGER_RISING | IRQF_ONESHOT, + "cr50_spi", cr50_phy); + if (ret < 0) { + if (ret == -EPROBE_DEFER) + return ret; + dev_warn(&spi->dev, "Requesting IRQ %d failed: %d\n", + spi->irq, ret); + /* + * This is not fatal, the driver will fall back to + * delays automatically, since ready will never + * be completed without a registered irq handler. + * So, just fall through. + */ + } else { + /* + * IRQ requested, let's verify that it is actually + * triggered, before relying on it. + */ + cr50_phy->irq_needs_confirmation = true; + } + } else { + dev_warn(&spi->dev, + "No IRQ - will use delays between transactions.\n"); + } + + ret = tpm_tis_spi_init(spi, phy, -1, &tpm_spi_cr50_phy_ops); + if (ret) + return ret; + + cr50_print_fw_version(&phy->priv); + + chip = dev_get_drvdata(&spi->dev); + chip->flags |= TPM_CHIP_FLAG_FIRMWARE_POWER_MANAGED; + + return 0; +} + +#ifdef CONFIG_PM_SLEEP +int tpm_tis_spi_resume(struct device *dev) +{ + struct tpm_chip *chip = dev_get_drvdata(dev); + struct tpm_tis_data *data = dev_get_drvdata(&chip->dev); + struct tpm_tis_spi_phy *phy = to_tpm_tis_spi_phy(data); + struct cr50_spi_phy *cr50_phy; + + if (phy->is_cr50) { + cr50_phy = to_cr50_spi_phy(phy); + /* + * Jiffies not increased during suspend, so we need to reset + * the time to wake Cr50 after resume. + */ + cr50_phy->wake_after = jiffies; + } + + return tpm_tis_resume(dev); +} +#endif diff --git a/drivers/char/tpm/tpm_tis_spi.c b/drivers/char/tpm/tpm_tis_spi.c index b3ed85671dd8..fdac842a61ed 100644 --- a/drivers/char/tpm/tpm_tis_spi.c +++ b/drivers/char/tpm/tpm_tis_spi.c @@ -20,6 +20,7 @@ * Dorn and Kyleen Hall and Jarko Sakkinnen. */ +#include <linux/completion.h> #include <linux/init.h> #include <linux/module.h> #include <linux/moduleparam.h> @@ -31,27 +32,16 @@ #include <linux/spi/spi.h> #include <linux/gpio.h> +#include <linux/of_device.h> #include <linux/of_irq.h> #include <linux/of_gpio.h> #include <linux/tpm.h> #include "tpm.h" #include "tpm_tis_core.h" +#include "tpm_tis_spi.h" #define MAX_SPI_FRAMESIZE 64 -struct tpm_tis_spi_phy { - struct tpm_tis_data priv; - struct spi_device *spi_device; - int (*flow_control)(struct tpm_tis_spi_phy *phy, - struct spi_transfer *xfer); - u8 *iobuf; -}; - -static inline struct tpm_tis_spi_phy *to_tpm_tis_spi_phy(struct tpm_tis_data *data) -{ - return container_of(data, struct tpm_tis_spi_phy, priv); -} - /* * TCG SPI flow control is documented in section 6.4 of the spec[1]. In short, * keep trying to read from the device until MISO goes high indicating the @@ -87,8 +77,8 @@ static int tpm_tis_spi_flow_control(struct tpm_tis_spi_phy *phy, return 0; } -static int tpm_tis_spi_transfer(struct tpm_tis_data *data, u32 addr, u16 len, - u8 *in, const u8 *out) +int tpm_tis_spi_transfer(struct tpm_tis_data *data, u32 addr, u16 len, + u8 *in, const u8 *out) { struct tpm_tis_spi_phy *phy = to_tpm_tis_spi_phy(data); int ret = 0; @@ -136,6 +126,7 @@ static int tpm_tis_spi_transfer(struct tpm_tis_data *data, u32 addr, u16 len, spi_message_init(&m); spi_message_add_tail(&spi_xfer, &m); + reinit_completion(&phy->ready); ret = spi_sync_locked(phy->spi_device, &m); if (ret < 0) goto exit; @@ -165,7 +156,7 @@ static int tpm_tis_spi_write_bytes(struct tpm_tis_data *data, u32 addr, return tpm_tis_spi_transfer(data, addr, len, NULL, value); } -static int tpm_tis_spi_read16(struct tpm_tis_data *data, u32 addr, u16 *result) +int tpm_tis_spi_read16(struct tpm_tis_data *data, u32 addr, u16 *result) { __le16 result_le; int rc; @@ -178,7 +169,7 @@ static int tpm_tis_spi_read16(struct tpm_tis_data *data, u32 addr, u16 *result) return rc; } -static int tpm_tis_spi_read32(struct tpm_tis_data *data, u32 addr, u32 *result) +int tpm_tis_spi_read32(struct tpm_tis_data *data, u32 addr, u32 *result) { __le32 result_le; int rc; @@ -191,7 +182,7 @@ static int tpm_tis_spi_read32(struct tpm_tis_data *data, u32 addr, u32 *result) return rc; } -static int tpm_tis_spi_write32(struct tpm_tis_data *data, u32 addr, u32 value) +int tpm_tis_spi_write32(struct tpm_tis_data *data, u32 addr, u32 value) { __le32 value_le; int rc; @@ -203,6 +194,19 @@ static int tpm_tis_spi_write32(struct tpm_tis_data *data, u32 addr, u32 value) return rc; } +int tpm_tis_spi_init(struct spi_device *spi, struct tpm_tis_spi_phy *phy, + int irq, const struct tpm_tis_phy_ops *phy_ops) +{ + phy->iobuf = devm_kmalloc(&spi->dev, MAX_SPI_FRAMESIZE, GFP_KERNEL); + if (!phy->iobuf) + return -ENOMEM; + + init_completion(&phy->ready); + phy->spi_device = spi; + + return tpm_tis_core_init(&spi->dev, &phy->priv, irq, phy_ops, NULL); +} + static const struct tpm_tis_phy_ops tpm_spi_phy_ops = { .read_bytes = tpm_tis_spi_read_bytes, .write_bytes = tpm_tis_spi_write_bytes, @@ -215,17 +219,18 @@ static int tpm_tis_spi_probe(struct spi_device *dev) { struct tpm_tis_spi_phy *phy; int irq; + struct device_node *np = dev->dev.of_node; + const struct spi_device_id *spi_dev_id = spi_get_device_id(dev); + + if (of_device_is_compatible(np, "google,cr50") || + (spi_dev_id && spi_dev_id->driver_data == TPM_IS_CR50)) + return cr50_spi_probe(dev); phy = devm_kzalloc(&dev->dev, sizeof(struct tpm_tis_spi_phy), GFP_KERNEL); if (!phy) return -ENOMEM; - phy->spi_device = dev; - - phy->iobuf = devm_kmalloc(&dev->dev, MAX_SPI_FRAMESIZE, GFP_KERNEL); - if (!phy->iobuf) - return -ENOMEM; phy->flow_control = tpm_tis_spi_flow_control; /* If the SPI device has an IRQ then use that */ @@ -234,11 +239,10 @@ static int tpm_tis_spi_probe(struct spi_device *dev) else irq = -1; - return tpm_tis_core_init(&dev->dev, &phy->priv, irq, &tpm_spi_phy_ops, - NULL); + return tpm_tis_spi_init(dev, phy, irq, &tpm_spi_phy_ops); } -static SIMPLE_DEV_PM_OPS(tpm_tis_pm, tpm_pm_suspend, tpm_tis_resume); +static SIMPLE_DEV_PM_OPS(tpm_tis_pm, tpm_pm_suspend, tpm_tis_spi_resume); static int tpm_tis_spi_remove(struct spi_device *dev) { @@ -251,6 +255,7 @@ static int tpm_tis_spi_remove(struct spi_device *dev) static const struct spi_device_id tpm_tis_spi_id[] = { {"tpm_tis_spi", 0}, + {"cr50", TPM_IS_CR50}, {} }; MODULE_DEVICE_TABLE(spi, tpm_tis_spi_id); @@ -259,6 +264,7 @@ static const struct of_device_id of_tis_spi_match[] = { { .compatible = "st,st33htpm-spi", }, { .compatible = "infineon,slb9670", }, { .compatible = "tcg,tpm_tis-spi", }, + { .compatible = "google,cr50", }, {} }; MODULE_DEVICE_TABLE(of, of_tis_spi_match); diff --git a/drivers/char/tpm/tpm_tis_spi.h b/drivers/char/tpm/tpm_tis_spi.h new file mode 100644 index 000000000000..6eab998fa905 --- /dev/null +++ b/drivers/char/tpm/tpm_tis_spi.h @@ -0,0 +1,54 @@ +/* SPDX-License-Identifier: GPL-2.0-only */ +/* + * Copyright (C) 2015 Infineon Technologies AG + * Copyright (C) 2016 STMicroelectronics SAS + */ + +#ifndef TPM_TIS_SPI_H +#define TPM_TIS_SPI_H + +#include "tpm_tis_core.h" + +#define TPM_IS_CR50 1 + +struct tpm_tis_spi_phy { + struct tpm_tis_data priv; + struct spi_device *spi_device; + int (*flow_control)(struct tpm_tis_spi_phy *phy, + struct spi_transfer *xfer); + struct completion ready; + bool is_cr50; + + u8 *iobuf; +}; + +static inline struct tpm_tis_spi_phy *to_tpm_tis_spi_phy(struct tpm_tis_data *data) +{ + return container_of(data, struct tpm_tis_spi_phy, priv); +} + +extern int tpm_tis_spi_init(struct spi_device *spi, struct tpm_tis_spi_phy *phy, + int irq, const struct tpm_tis_phy_ops *phy_ops); + +extern int tpm_tis_spi_transfer(struct tpm_tis_data *data, u32 addr, u16 len, + u8 *in, const u8 *out); + +extern int tpm_tis_spi_read16(struct tpm_tis_data *data, u32 addr, u16 *result); +extern int tpm_tis_spi_read32(struct tpm_tis_data *data, u32 addr, u32 *result); +extern int tpm_tis_spi_write32(struct tpm_tis_data *data, u32 addr, u32 value); + +#ifdef CONFIG_TCG_CR50_SPI +extern int cr50_spi_probe(struct spi_device *spi); +#else +static inline int cr50_spi_probe(struct spi_device *spi) { return -ENODEV; } +#endif + +#ifdef CONFIG_PM_SLEEP +#ifdef CONFIG_TCG_CR50_SPI +extern int tpm_tis_spi_resume(struct device *dev); +#else +#define tpm_tis_spi_resume tpm_tis_resume +#endif +#endif + +#endif