diff mbox series

[v7,15/17] tpm: introduce tpm_chip_start() and tpm_chip_stop()

Message ID 20181113183620.27447-16-jarkko.sakkinen@linux.intel.com (mailing list archive)
State New, archived
Headers show
Series Removed nested TPM operations | expand

Commit Message

Jarkko Sakkinen Nov. 13, 2018, 6:36 p.m. UTC
Encapsulate power gating and locality functionality to tpm_chip_start()
and tpm_chip_stop() in order to clean up the branching mess in
tpm_transmit().

Signed-off-by: Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com>
---
 drivers/char/tpm/tpm-chip.c      | 110 +++++++++++++++++++++++++++++++
 drivers/char/tpm/tpm-interface.c |  87 +-----------------------
 drivers/char/tpm/tpm.h           |   2 +
 3 files changed, 115 insertions(+), 84 deletions(-)

Comments

Stefan Berger Nov. 13, 2018, 9:17 p.m. UTC | #1
On 11/13/18 1:36 PM, Jarkko Sakkinen wrote:
> Encapsulate power gating and locality functionality to tpm_chip_start()
> and tpm_chip_stop() in order to clean up the branching mess in
> tpm_transmit().
>
> Signed-off-by: Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com>

Reviewed-by: Stefan Berger <stefanb@linux.ibm.com>


> ---
>   drivers/char/tpm/tpm-chip.c      | 110 +++++++++++++++++++++++++++++++
>   drivers/char/tpm/tpm-interface.c |  87 +-----------------------
>   drivers/char/tpm/tpm.h           |   2 +
>   3 files changed, 115 insertions(+), 84 deletions(-)
>
> diff --git a/drivers/char/tpm/tpm-chip.c b/drivers/char/tpm/tpm-chip.c
> index 157505b0f755..65f1561eba81 100644
> --- a/drivers/char/tpm/tpm-chip.c
> +++ b/drivers/char/tpm/tpm-chip.c
> @@ -37,6 +37,116 @@ struct class *tpm_class;
>   struct class *tpmrm_class;
>   dev_t tpm_devt;
>
> +static int tpm_request_locality(struct tpm_chip *chip, unsigned int flags)
> +{
> +	int rc;
> +
> +	if (flags & TPM_TRANSMIT_NESTED)
> +		return 0;
> +
> +	if (!chip->ops->request_locality)
> +		return 0;
> +
> +	rc = chip->ops->request_locality(chip, 0);
> +	if (rc < 0)
> +		return rc;
> +
> +	chip->locality = rc;
> +	return 0;
> +}
> +
> +static void tpm_relinquish_locality(struct tpm_chip *chip, unsigned int flags)
> +{
> +	int rc;
> +
> +	if (flags & TPM_TRANSMIT_NESTED)
> +		return;
> +
> +	if (!chip->ops->relinquish_locality)
> +		return;
> +
> +	rc = chip->ops->relinquish_locality(chip, chip->locality);
> +	if (rc)
> +		dev_err(&chip->dev, "%s: : error %d\n", __func__, rc);
> +
> +	chip->locality = -1;
> +}
> +
> +static int tpm_cmd_ready(struct tpm_chip *chip, unsigned int flags)
> +{
> +	if (flags & TPM_TRANSMIT_NESTED)
> +		return 0;
> +
> +	if (!chip->ops->cmd_ready)
> +		return 0;
> +
> +	return chip->ops->cmd_ready(chip);
> +}
> +
> +static int tpm_go_idle(struct tpm_chip *chip, unsigned int flags)
> +{
> +	if (flags & TPM_TRANSMIT_NESTED)
> +		return 0;
> +
> +	if (!chip->ops->go_idle)
> +		return 0;
> +
> +	return chip->ops->go_idle(chip);
> +}
> +
> +/**
> + * tpm_chip_start() - power on the TPM
> + * @chip:	a TPM chip to use
> + * @flags:	TPM transmit flags
> + *
> + * Return:
> + * * The response length	- OK
> + * * -errno			- A system error
> + */
> +int tpm_chip_start(struct tpm_chip *chip, unsigned int flags)
> +{
> +	int ret;
> +
> +	if (chip->ops->clk_enable)
> +		chip->ops->clk_enable(chip, true);
> +
> +	if (chip->locality == -1) {
> +		ret = tpm_request_locality(chip, flags);
> +		if (ret) {
> +			chip->ops->clk_enable(chip, false);
> +			return ret;
> +		}
> +	}
> +
> +	ret = tpm_cmd_ready(chip, flags);
> +	if (ret) {
> +		tpm_relinquish_locality(chip, flags);
> +		if (chip->ops->clk_enable)
> +			chip->ops->clk_enable(chip, false);
> +		return ret;
> +	}
> +
> +	return 0;
> +}
> +
> +/**
> + * tpm_chip_stop() - power off the TPM
> + * @chip:	a TPM chip to use
> + * @flags:	TPM transmit flags
> + *
> + * Return:
> + * * The response length	- OK
> + * * -errno			- A system error
> + */
> +void tpm_chip_stop(struct tpm_chip *chip, unsigned int flags)
> +{
> +	tpm_go_idle(chip, flags);
> +	tpm_relinquish_locality(chip, flags);
> +	if (chip->ops->clk_enable)
> +		chip->ops->clk_enable(chip, false);
> +}
> +
> +
>   /**
>    * tpm_try_get_ops() - Get a ref to the tpm_chip
>    * @chip: Chip to ref
> diff --git a/drivers/char/tpm/tpm-interface.c b/drivers/char/tpm/tpm-interface.c
> index 5865b9671d20..888c9923fca1 100644
> --- a/drivers/char/tpm/tpm-interface.c
> +++ b/drivers/char/tpm/tpm-interface.c
> @@ -62,64 +62,6 @@ unsigned long tpm_calc_ordinal_duration(struct tpm_chip *chip, u32 ordinal)
>   }
>   EXPORT_SYMBOL_GPL(tpm_calc_ordinal_duration);
>
> -static int tpm_request_locality(struct tpm_chip *chip, unsigned int flags)
> -{
> -	int rc;
> -
> -	if (flags & TPM_TRANSMIT_NESTED)
> -		return 0;
> -
> -	if (!chip->ops->request_locality)
> -		return 0;
> -
> -	rc = chip->ops->request_locality(chip, 0);
> -	if (rc < 0)
> -		return rc;
> -
> -	chip->locality = rc;
> -
> -	return 0;
> -}
> -
> -static void tpm_relinquish_locality(struct tpm_chip *chip, unsigned int flags)
> -{
> -	int rc;
> -
> -	if (flags & TPM_TRANSMIT_NESTED)
> -		return;
> -
> -	if (!chip->ops->relinquish_locality)
> -		return;
> -
> -	rc = chip->ops->relinquish_locality(chip, chip->locality);
> -	if (rc)
> -		dev_err(&chip->dev, "%s: : error %d\n", __func__, rc);
> -
> -	chip->locality = -1;
> -}
> -
> -static int tpm_cmd_ready(struct tpm_chip *chip, unsigned int flags)
> -{
> -	if (flags & TPM_TRANSMIT_NESTED)
> -		return 0;
> -
> -	if (!chip->ops->cmd_ready)
> -		return 0;
> -
> -	return chip->ops->cmd_ready(chip);
> -}
> -
> -static int tpm_go_idle(struct tpm_chip *chip, unsigned int flags)
> -{
> -	if (flags & TPM_TRANSMIT_NESTED)
> -		return 0;
> -
> -	if (!chip->ops->go_idle)
> -		return 0;
> -
> -	return chip->ops->go_idle(chip);
> -}
> -
>   static ssize_t tpm_try_transmit(struct tpm_chip *chip, u8 *buf, size_t bufsiz,
>   				unsigned int flags)
>   {
> @@ -212,7 +154,6 @@ ssize_t tpm_transmit(struct tpm_chip *chip, u8 *buf, size_t bufsiz,
>   	/* space for header and handles */
>   	u8 save[TPM_HEADER_SIZE + 3*sizeof(u32)];
>   	unsigned int delay_msec = TPM2_DURATION_SHORT;
> -	bool has_locality = false;
>   	u32 rc = 0;
>   	ssize_t ret;
>   	const size_t save_size = min(sizeof(save), bufsiz);
> @@ -227,34 +168,12 @@ ssize_t tpm_transmit(struct tpm_chip *chip, u8 *buf, size_t bufsiz,
>   	memcpy(save, buf, save_size);
>
>   	for (;;) {
> -		if (chip->ops->clk_enable != NULL)
> -			chip->ops->clk_enable(chip, true);
> -
> -		if (chip->locality == -1) {
> -			ret = tpm_request_locality(chip, flags);
> -			if (ret)
> -				goto out_locality;
> -			has_locality = true;
> -		}
> -
> -		ret = tpm_cmd_ready(chip, flags);
> +		ret = tpm_chip_start(chip, flags);
>   		if (ret)
> -			goto out_locality;
> -
> +			return ret;
>   		ret = tpm_try_transmit(chip, buf, bufsiz, flags);
> +		tpm_chip_stop(chip, flags);
>
> -		/* This may fail but do not override ret. */
> -		tpm_go_idle(chip, flags);
> -
> -out_locality:
> -		if (has_locality)
> -			tpm_relinquish_locality(chip, flags);
> -
> -		if (chip->ops->clk_enable != NULL)
> -			chip->ops->clk_enable(chip, false);
> -
> -		if (ret < 0)
> -			break;
>   		rc = be32_to_cpu(header->return_code);
>   		if (rc != TPM2_RC_RETRY && rc != TPM2_RC_TESTING)
>   			break;
> diff --git a/drivers/char/tpm/tpm.h b/drivers/char/tpm/tpm.h
> index c7c06de651a0..c42a75710b70 100644
> --- a/drivers/char/tpm/tpm.h
> +++ b/drivers/char/tpm/tpm.h
> @@ -523,6 +523,8 @@ static inline void tpm_msleep(unsigned int delay_msec)
>   		     delay_msec * 1000);
>   };
>
> +int tpm_chip_start(struct tpm_chip *chip, unsigned int flags);
> +void tpm_chip_stop(struct tpm_chip *chip, unsigned int flags);
>   struct tpm_chip *tpm_find_get_ops(struct tpm_chip *chip);
>   __must_check int tpm_try_get_ops(struct tpm_chip *chip);
>   void tpm_put_ops(struct tpm_chip *chip);
Stefan Berger Nov. 13, 2018, 10:34 p.m. UTC | #2
On 11/13/18 1:36 PM, Jarkko Sakkinen wrote:
> Encapsulate power gating and locality functionality to tpm_chip_start()
> and tpm_chip_stop() in order to clean up the branching mess in
> tpm_transmit().


I ran the vtpm proxy test suite on this series and got this error when 
running it with 'make check-j5' 
(https://github.com/stefanberger/linux-vtpm-tests).

It's was actually difficult to hit this bug since I ran it with -j1 , 
-j2 and so on before.


[ 3003.838138] BUG: unable to handle kernel NULL pointer dereference at 
0000000000000000
[ 3003.838806] PGD 0 P4D 0
[ 3003.838806] Oops: 0010 [#1] SMP PTI
[ 3003.840394] CPU: 3 PID: 111 Comm: kworker/3:1 Not tainted 4.20.0-rc2+ #6
[ 3003.840394] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), 
BIOS rel-1.11.0-50-g14221cd-dirty-20181018_164544-sbct-4.pok.ibm.com 
04/01/2014
[ 3003.840394] Workqueue: tpm-vtpm vtpm_proxy_work
[ 3003.840394] RIP: 0010:          (null)
[ 3003.840394] Code: Bad RIP value.
[ 3003.840394] RSP: 0018:ffffa6e6816d7e10 EFLAGS: 00010246
[ 3003.840394] RAX: 00000000ffffffe0 RBX: ffff9698077ad000 RCX: 
0000000000000006
[ 3003.840394] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 
ffff9698077ad000
[ 3003.840394] RBP: ffff9698077ad000 R08: fffff59bc6172d08 R09: 
0000000000000000
[ 3003.840394] R10: 0000000000000000 R11: 0000000000000000 R12: 
ffff9698b78f0700
[ 3003.840394] R13: ffff9698b78fbc00 R14: 0000000000000000 R15: 
ffff9697f8ea10f8
[ 3003.840394] FS:  0000000000000000(0000) GS:ffff9698b78c0000(0000) 
knlGS:0000000000000000
[ 3003.840394] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 3003.840394] CR2: ffffffffffffffd6 CR3: 0000000190606000 CR4: 
00000000000006e0
[ 3003.840394] Call Trace:
[ 3003.840394]  ? tpm_chip_start+0xb8/0xe0
[ 3003.840394]  ? tpm_chip_register+0x15/0x240
[ 3003.840394]  ? vtpm_proxy_work+0x15/0x30
[ 3003.840394]  ? process_one_work+0x237/0x5c0
[ 3003.840394]  ? worker_thread+0x1d5/0x390
[ 3003.840394]  ? process_one_work+0x5c0/0x5c0
[ 3003.840394]  ? kthread+0x11e/0x140
[ 3003.840394]  ? kthread_park+0x90/0x90
[ 3003.840394]  ? ret_from_fork+0x3a/0x50
[ 3003.840394] Modules linked in: xt_CHECKSUM ipt_MASQUERADE tun 
nf_conntrack_netbios_ns nf_conntrack_broadcast xt_CT ip6t_rpfilter 
ip6t_REJECT nf_reject_ipv6 xt_conntrack ip_set nfnetlink ebtable_nat 
ebtable_broute bridge stp llc ip6table_nat nf_nat_ipv6 ip6table_mangle 
ip6table_raw ip6table_security iptable_nat nf_nat_ipv4 nf_nat 
nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 libcrc32c iptable_mangle 
iptable_raw iptable_security ebtable_filter ebtables ip6table_filter 
ip6_tables sunrpc virtio_gpu ttm drm_kms_helper drm joydev syscopyarea 
sysfillrect sysimgblt pcspkr virtio_balloon i2c_piix4 fb_sys_fops 
virtio_net net_failover virtio_console failover virtio_blk crc32c_intel 
virtio_pci serio_raw ata_generic virtio_ring virtio pata_acpi floppy 
qemu_fw_cfg
[ 3003.840394] CR2: 0000000000000000
[ 3003.840394] ---[ end trace 29e5990b605a7ccb ]---
[ 3003.840394] RIP: 0010:          (null)
[ 3003.840394] Code: Bad RIP value.
[ 3003.840394] RSP: 0018:ffffa6e6816d7e10 EFLAGS: 00010246
[ 3003.840394] RAX: 00000000ffffffe0 RBX: ffff9698077ad000 RCX: 
0000000000000006
[ 3003.840394] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 
ffff9698077ad000
[ 3003.840394] RBP: ffff9698077ad000 R08: fffff59bc6172d08 R09: 
0000000000000000
[ 3003.840394] R10: 0000000000000000 R11: 0000000000000000 R12: 
ffff9698b78f0700
[ 3003.840394] R13: ffff9698b78fbc00 R14: 0000000000000000 R15: 
ffff9697f8ea10f8
[ 3003.840394] FS:  0000000000000000(0000) GS:ffff9698b78c0000(0000) 
knlGS:0000000000000000
[ 3003.840394] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 3003.840394] CR2: ffffffffffffffd6 CR3: 0000000190606000 CR4: 
00000000000006e0
[ 3003.840394] BUG: sleeping function called from invalid context at 
./include/linux/percpu-rwsem.h:34
[ 3003.840394] in_atomic(): 0, irqs_disabled(): 1, pid: 111, name: 
kworker/3:1
[ 3003.840394] INFO: lockdep is turned off.
[ 3003.840394] irq event stamp: 165206
[ 3003.840394] hardirqs last  enabled at (165205): [<ffffffff8b220113>] 
free_unref_page+0xf3/0x1f0
[ 3003.840394] hardirqs last disabled at (165206): [<ffffffff8b0019ee>] 
trace_hardirqs_off_thunk+0x1a/0x1c
[ 3003.840394] softirqs last  enabled at (165182): [<ffffffff8b785e01>] 
peernet2id+0x41/0x50
[ 3003.840394] softirqs last disabled at (165180): [<ffffffff8b785de2>] 
peernet2id+0x22/0x50
[ 3003.840394] CPU: 3 PID: 111 Comm: kworker/3:1 Tainted: G D           
4.20.0-rc2+ #6
[ 3003.840394] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), 
BIOS rel-1.11.0-50-g14221cd-dirty-20181018_164544-sbct-4.pok.ibm.com 
04/01/2014
[ 3003.840394] Workqueue: tpm-vtpm vtpm_proxy_work
[ 3003.840394] Call Trace:
[ 3003.840394]  dump_stack+0x67/0x9b
[ 3003.840394]  ___might_sleep+0x149/0x230
[ 3003.840394]  exit_signals+0x20/0x210
[ 3003.840394]  ? worker_thread+0x1d5/0x390
[ 3003.840394]  do_exit+0xa0/0xc70
[ 3003.840394]  ? process_one_work+0x5c0/0x5c0
[ 3003.840394]  ? kthread+0x11e/0x140
[ 3003.840394]  rewind_stack_do_exit+0x17/0x20
[ 3004.389582] tpm tpm1803: tpm_try_transmit: tpm_send: error -14


>
> Signed-off-by: Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com>
> ---
>   drivers/char/tpm/tpm-chip.c      | 110 +++++++++++++++++++++++++++++++
>   drivers/char/tpm/tpm-interface.c |  87 +-----------------------
>   drivers/char/tpm/tpm.h           |   2 +
>   3 files changed, 115 insertions(+), 84 deletions(-)
>
> diff --git a/drivers/char/tpm/tpm-chip.c b/drivers/char/tpm/tpm-chip.c
> index 157505b0f755..65f1561eba81 100644
> --- a/drivers/char/tpm/tpm-chip.c
> +++ b/drivers/char/tpm/tpm-chip.c
> @@ -37,6 +37,116 @@ struct class *tpm_class;
>   struct class *tpmrm_class;
>   dev_t tpm_devt;
>
> +static int tpm_request_locality(struct tpm_chip *chip, unsigned int flags)
> +{
> +	int rc;
> +
> +	if (flags & TPM_TRANSMIT_NESTED)
> +		return 0;
> +
> +	if (!chip->ops->request_locality)
> +		return 0;
> +
> +	rc = chip->ops->request_locality(chip, 0);
> +	if (rc < 0)
> +		return rc;
> +
> +	chip->locality = rc;
> +	return 0;
> +}
> +
> +static void tpm_relinquish_locality(struct tpm_chip *chip, unsigned int flags)
> +{
> +	int rc;
> +
> +	if (flags & TPM_TRANSMIT_NESTED)
> +		return;
> +
> +	if (!chip->ops->relinquish_locality)
> +		return;
> +
> +	rc = chip->ops->relinquish_locality(chip, chip->locality);
> +	if (rc)
> +		dev_err(&chip->dev, "%s: : error %d\n", __func__, rc);
> +
> +	chip->locality = -1;
> +}
> +
> +static int tpm_cmd_ready(struct tpm_chip *chip, unsigned int flags)
> +{
> +	if (flags & TPM_TRANSMIT_NESTED)
> +		return 0;
> +
> +	if (!chip->ops->cmd_ready)
> +		return 0;
> +
> +	return chip->ops->cmd_ready(chip);
> +}
> +
> +static int tpm_go_idle(struct tpm_chip *chip, unsigned int flags)
> +{
> +	if (flags & TPM_TRANSMIT_NESTED)
> +		return 0;
> +
> +	if (!chip->ops->go_idle)
> +		return 0;
> +
> +	return chip->ops->go_idle(chip);
> +}
> +
> +/**
> + * tpm_chip_start() - power on the TPM
> + * @chip:	a TPM chip to use
> + * @flags:	TPM transmit flags
> + *
> + * Return:
> + * * The response length	- OK
> + * * -errno			- A system error
> + */
> +int tpm_chip_start(struct tpm_chip *chip, unsigned int flags)
> +{
> +	int ret;
> +
> +	if (chip->ops->clk_enable)
> +		chip->ops->clk_enable(chip, true);
> +
> +	if (chip->locality == -1) {
> +		ret = tpm_request_locality(chip, flags);
> +		if (ret) {
> +			chip->ops->clk_enable(chip, false);
> +			return ret;
> +		}
> +	}
> +
> +	ret = tpm_cmd_ready(chip, flags);
> +	if (ret) {
> +		tpm_relinquish_locality(chip, flags);
> +		if (chip->ops->clk_enable)
> +			chip->ops->clk_enable(chip, false);
> +		return ret;
> +	}
> +
> +	return 0;
> +}
> +
> +/**
> + * tpm_chip_stop() - power off the TPM
> + * @chip:	a TPM chip to use
> + * @flags:	TPM transmit flags
> + *
> + * Return:
> + * * The response length	- OK
> + * * -errno			- A system error
> + */
> +void tpm_chip_stop(struct tpm_chip *chip, unsigned int flags)
> +{
> +	tpm_go_idle(chip, flags);
> +	tpm_relinquish_locality(chip, flags);
> +	if (chip->ops->clk_enable)
> +		chip->ops->clk_enable(chip, false);
> +}
> +
> +
>   /**
>    * tpm_try_get_ops() - Get a ref to the tpm_chip
>    * @chip: Chip to ref
> diff --git a/drivers/char/tpm/tpm-interface.c b/drivers/char/tpm/tpm-interface.c
> index 5865b9671d20..888c9923fca1 100644
> --- a/drivers/char/tpm/tpm-interface.c
> +++ b/drivers/char/tpm/tpm-interface.c
> @@ -62,64 +62,6 @@ unsigned long tpm_calc_ordinal_duration(struct tpm_chip *chip, u32 ordinal)
>   }
>   EXPORT_SYMBOL_GPL(tpm_calc_ordinal_duration);
>
> -static int tpm_request_locality(struct tpm_chip *chip, unsigned int flags)
> -{
> -	int rc;
> -
> -	if (flags & TPM_TRANSMIT_NESTED)
> -		return 0;
> -
> -	if (!chip->ops->request_locality)
> -		return 0;
> -
> -	rc = chip->ops->request_locality(chip, 0);
> -	if (rc < 0)
> -		return rc;
> -
> -	chip->locality = rc;
> -
> -	return 0;
> -}
> -
> -static void tpm_relinquish_locality(struct tpm_chip *chip, unsigned int flags)
> -{
> -	int rc;
> -
> -	if (flags & TPM_TRANSMIT_NESTED)
> -		return;
> -
> -	if (!chip->ops->relinquish_locality)
> -		return;
> -
> -	rc = chip->ops->relinquish_locality(chip, chip->locality);
> -	if (rc)
> -		dev_err(&chip->dev, "%s: : error %d\n", __func__, rc);
> -
> -	chip->locality = -1;
> -}
> -
> -static int tpm_cmd_ready(struct tpm_chip *chip, unsigned int flags)
> -{
> -	if (flags & TPM_TRANSMIT_NESTED)
> -		return 0;
> -
> -	if (!chip->ops->cmd_ready)
> -		return 0;
> -
> -	return chip->ops->cmd_ready(chip);
> -}
> -
> -static int tpm_go_idle(struct tpm_chip *chip, unsigned int flags)
> -{
> -	if (flags & TPM_TRANSMIT_NESTED)
> -		return 0;
> -
> -	if (!chip->ops->go_idle)
> -		return 0;
> -
> -	return chip->ops->go_idle(chip);
> -}
> -
>   static ssize_t tpm_try_transmit(struct tpm_chip *chip, u8 *buf, size_t bufsiz,
>   				unsigned int flags)
>   {
> @@ -212,7 +154,6 @@ ssize_t tpm_transmit(struct tpm_chip *chip, u8 *buf, size_t bufsiz,
>   	/* space for header and handles */
>   	u8 save[TPM_HEADER_SIZE + 3*sizeof(u32)];
>   	unsigned int delay_msec = TPM2_DURATION_SHORT;
> -	bool has_locality = false;
>   	u32 rc = 0;
>   	ssize_t ret;
>   	const size_t save_size = min(sizeof(save), bufsiz);
> @@ -227,34 +168,12 @@ ssize_t tpm_transmit(struct tpm_chip *chip, u8 *buf, size_t bufsiz,
>   	memcpy(save, buf, save_size);
>
>   	for (;;) {
> -		if (chip->ops->clk_enable != NULL)
> -			chip->ops->clk_enable(chip, true);
> -
> -		if (chip->locality == -1) {
> -			ret = tpm_request_locality(chip, flags);
> -			if (ret)
> -				goto out_locality;
> -			has_locality = true;
> -		}
> -
> -		ret = tpm_cmd_ready(chip, flags);
> +		ret = tpm_chip_start(chip, flags);
>   		if (ret)
> -			goto out_locality;
> -
> +			return ret;
>   		ret = tpm_try_transmit(chip, buf, bufsiz, flags);
> +		tpm_chip_stop(chip, flags);
>
> -		/* This may fail but do not override ret. */
> -		tpm_go_idle(chip, flags);
> -
> -out_locality:
> -		if (has_locality)
> -			tpm_relinquish_locality(chip, flags);
> -
> -		if (chip->ops->clk_enable != NULL)
> -			chip->ops->clk_enable(chip, false);
> -
> -		if (ret < 0)
> -			break;
>   		rc = be32_to_cpu(header->return_code);
>   		if (rc != TPM2_RC_RETRY && rc != TPM2_RC_TESTING)
>   			break;
> diff --git a/drivers/char/tpm/tpm.h b/drivers/char/tpm/tpm.h
> index c7c06de651a0..c42a75710b70 100644
> --- a/drivers/char/tpm/tpm.h
> +++ b/drivers/char/tpm/tpm.h
> @@ -523,6 +523,8 @@ static inline void tpm_msleep(unsigned int delay_msec)
>   		     delay_msec * 1000);
>   };
>
> +int tpm_chip_start(struct tpm_chip *chip, unsigned int flags);
> +void tpm_chip_stop(struct tpm_chip *chip, unsigned int flags);
>   struct tpm_chip *tpm_find_get_ops(struct tpm_chip *chip);
>   __must_check int tpm_try_get_ops(struct tpm_chip *chip);
>   void tpm_put_ops(struct tpm_chip *chip);
Stefan Berger Nov. 13, 2018, 11:02 p.m. UTC | #3
On 11/13/18 1:36 PM, Jarkko Sakkinen wrote:
> Encapsulate power gating and locality functionality to tpm_chip_start()
> and tpm_chip_stop() in order to clean up the branching mess in
> tpm_transmit().
>
> Signed-off-by: Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com>
> ---
>   drivers/char/tpm/tpm-chip.c      | 110 +++++++++++++++++++++++++++++++
>   drivers/char/tpm/tpm-interface.c |  87 +-----------------------
>   drivers/char/tpm/tpm.h           |   2 +
>   3 files changed, 115 insertions(+), 84 deletions(-)
>
> diff --git a/drivers/char/tpm/tpm-chip.c b/drivers/char/tpm/tpm-chip.c
> index 157505b0f755..65f1561eba81 100644
> --- a/drivers/char/tpm/tpm-chip.c
> +++ b/drivers/char/tpm/tpm-chip.c
> @@ -37,6 +37,116 @@ struct class *tpm_class;
>   struct class *tpmrm_class;
>   dev_t tpm_devt;
>
> +static int tpm_request_locality(struct tpm_chip *chip, unsigned int flags)
> +{
> +	int rc;
> +
> +	if (flags & TPM_TRANSMIT_NESTED)
> +		return 0;
> +
> +	if (!chip->ops->request_locality)
> +		return 0;
> +
> +	rc = chip->ops->request_locality(chip, 0);
> +	if (rc < 0)
> +		return rc;
> +
> +	chip->locality = rc;
> +	return 0;
> +}
> +
> +static void tpm_relinquish_locality(struct tpm_chip *chip, unsigned int flags)
> +{
> +	int rc;
> +
> +	if (flags & TPM_TRANSMIT_NESTED)
> +		return;
> +
> +	if (!chip->ops->relinquish_locality)
> +		return;
> +
> +	rc = chip->ops->relinquish_locality(chip, chip->locality);
> +	if (rc)
> +		dev_err(&chip->dev, "%s: : error %d\n", __func__, rc);
> +
> +	chip->locality = -1;
> +}
> +
> +static int tpm_cmd_ready(struct tpm_chip *chip, unsigned int flags)
> +{
> +	if (flags & TPM_TRANSMIT_NESTED)
> +		return 0;
> +
> +	if (!chip->ops->cmd_ready)
> +		return 0;
> +
> +	return chip->ops->cmd_ready(chip);
> +}
> +
> +static int tpm_go_idle(struct tpm_chip *chip, unsigned int flags)
> +{
> +	if (flags & TPM_TRANSMIT_NESTED)
> +		return 0;
> +
> +	if (!chip->ops->go_idle)
> +		return 0;
> +
> +	return chip->ops->go_idle(chip);
> +}
> +
> +/**
> + * tpm_chip_start() - power on the TPM
> + * @chip:	a TPM chip to use
> + * @flags:	TPM transmit flags
> + *
> + * Return:
> + * * The response length	- OK
I don't think this is right. Have to withdraw my Reviewed-by on this one.
> + * * -errno			- A system error
> + */
> +int tpm_chip_start(struct tpm_chip *chip, unsigned int flags)
> +{
> +	int ret;
> +
> +	if (chip->ops->clk_enable)
> +		chip->ops->clk_enable(chip, true);
> +
> +	if (chip->locality == -1) {
> +		ret = tpm_request_locality(chip, flags);
> +		if (ret) {
> +			chip->ops->clk_enable(chip, false);
> +			return ret;
> +		}
> +	}
> +
> +	ret = tpm_cmd_ready(chip, flags);
> +	if (ret) {
> +		tpm_relinquish_locality(chip, flags);
> +		if (chip->ops->clk_enable)
> +			chip->ops->clk_enable(chip, false);
> +		return ret;
> +	}
> +
> +	return 0;
> +}
> +
> +/**
> + * tpm_chip_stop() - power off the TPM
> + * @chip:	a TPM chip to use
> + * @flags:	TPM transmit flags
> + *
> + * Return:
> + * * The response length	- OK
> + * * -errno			- A system error

This function doesn't return anything.



> + */
> +void tpm_chip_stop(struct tpm_chip *chip, unsigned int flags)
> +{
> +	tpm_go_idle(chip, flags);
> +	tpm_relinquish_locality(chip, flags);
> +	if (chip->ops->clk_enable)
> +		chip->ops->clk_enable(chip, false);
> +}
> +
> +
>   /**
>    * tpm_try_get_ops() - Get a ref to the tpm_chip
>    * @chip: Chip to ref
> diff --git a/drivers/char/tpm/tpm-interface.c b/drivers/char/tpm/tpm-interface.c
> index 5865b9671d20..888c9923fca1 100644
> --- a/drivers/char/tpm/tpm-interface.c
> +++ b/drivers/char/tpm/tpm-interface.c
> @@ -62,64 +62,6 @@ unsigned long tpm_calc_ordinal_duration(struct tpm_chip *chip, u32 ordinal)
>   }
>   EXPORT_SYMBOL_GPL(tpm_calc_ordinal_duration);
>
> -static int tpm_request_locality(struct tpm_chip *chip, unsigned int flags)
> -{
> -	int rc;
> -
> -	if (flags & TPM_TRANSMIT_NESTED)
> -		return 0;
> -
> -	if (!chip->ops->request_locality)
> -		return 0;
> -
> -	rc = chip->ops->request_locality(chip, 0);
> -	if (rc < 0)
> -		return rc;
> -
> -	chip->locality = rc;
> -
> -	return 0;
> -}
> -
> -static void tpm_relinquish_locality(struct tpm_chip *chip, unsigned int flags)
> -{
> -	int rc;
> -
> -	if (flags & TPM_TRANSMIT_NESTED)
> -		return;
> -
> -	if (!chip->ops->relinquish_locality)
> -		return;
> -
> -	rc = chip->ops->relinquish_locality(chip, chip->locality);
> -	if (rc)
> -		dev_err(&chip->dev, "%s: : error %d\n", __func__, rc);
> -
> -	chip->locality = -1;
> -}
> -
> -static int tpm_cmd_ready(struct tpm_chip *chip, unsigned int flags)
> -{
> -	if (flags & TPM_TRANSMIT_NESTED)
> -		return 0;
> -
> -	if (!chip->ops->cmd_ready)
> -		return 0;
> -
> -	return chip->ops->cmd_ready(chip);
> -}
> -
> -static int tpm_go_idle(struct tpm_chip *chip, unsigned int flags)
> -{
> -	if (flags & TPM_TRANSMIT_NESTED)
> -		return 0;
> -
> -	if (!chip->ops->go_idle)
> -		return 0;
> -
> -	return chip->ops->go_idle(chip);
> -}
> -
>   static ssize_t tpm_try_transmit(struct tpm_chip *chip, u8 *buf, size_t bufsiz,
>   				unsigned int flags)
>   {
> @@ -212,7 +154,6 @@ ssize_t tpm_transmit(struct tpm_chip *chip, u8 *buf, size_t bufsiz,
>   	/* space for header and handles */
>   	u8 save[TPM_HEADER_SIZE + 3*sizeof(u32)];
>   	unsigned int delay_msec = TPM2_DURATION_SHORT;
> -	bool has_locality = false;
>   	u32 rc = 0;
>   	ssize_t ret;
>   	const size_t save_size = min(sizeof(save), bufsiz);
> @@ -227,34 +168,12 @@ ssize_t tpm_transmit(struct tpm_chip *chip, u8 *buf, size_t bufsiz,
>   	memcpy(save, buf, save_size);
>
>   	for (;;) {
> -		if (chip->ops->clk_enable != NULL)
> -			chip->ops->clk_enable(chip, true);
> -
> -		if (chip->locality == -1) {
> -			ret = tpm_request_locality(chip, flags);
> -			if (ret)
> -				goto out_locality;
> -			has_locality = true;
> -		}
> -
> -		ret = tpm_cmd_ready(chip, flags);
> +		ret = tpm_chip_start(chip, flags);
>   		if (ret)
> -			goto out_locality;
> -
> +			return ret;
>   		ret = tpm_try_transmit(chip, buf, bufsiz, flags);
> +		tpm_chip_stop(chip, flags);
>
> -		/* This may fail but do not override ret. */
> -		tpm_go_idle(chip, flags);
> -
> -out_locality:
> -		if (has_locality)
> -			tpm_relinquish_locality(chip, flags);
> -
> -		if (chip->ops->clk_enable != NULL)
> -			chip->ops->clk_enable(chip, false);
> -
> -		if (ret < 0)
> -			break;
>   		rc = be32_to_cpu(header->return_code);
>   		if (rc != TPM2_RC_RETRY && rc != TPM2_RC_TESTING)
>   			break;
> diff --git a/drivers/char/tpm/tpm.h b/drivers/char/tpm/tpm.h
> index c7c06de651a0..c42a75710b70 100644
> --- a/drivers/char/tpm/tpm.h
> +++ b/drivers/char/tpm/tpm.h
> @@ -523,6 +523,8 @@ static inline void tpm_msleep(unsigned int delay_msec)
>   		     delay_msec * 1000);
>   };
>
> +int tpm_chip_start(struct tpm_chip *chip, unsigned int flags);
> +void tpm_chip_stop(struct tpm_chip *chip, unsigned int flags);
>   struct tpm_chip *tpm_find_get_ops(struct tpm_chip *chip);
>   __must_check int tpm_try_get_ops(struct tpm_chip *chip);
>   void tpm_put_ops(struct tpm_chip *chip);
Stefan Berger Nov. 14, 2018, 1:47 a.m. UTC | #4
On 11/13/18 1:36 PM, Jarkko Sakkinen wrote:
> Encapsulate power gating and locality functionality to tpm_chip_start()
> and tpm_chip_stop() in order to clean up the branching mess in
> tpm_transmit().
>
> Signed-off-by: Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com>
> ---
>   drivers/char/tpm/tpm-chip.c      | 110 +++++++++++++++++++++++++++++++
>   drivers/char/tpm/tpm-interface.c |  87 +-----------------------
>   drivers/char/tpm/tpm.h           |   2 +
>   3 files changed, 115 insertions(+), 84 deletions(-)
>
> diff --git a/drivers/char/tpm/tpm-chip.c b/drivers/char/tpm/tpm-chip.c
> index 157505b0f755..65f1561eba81 100644
> --- a/drivers/char/tpm/tpm-chip.c
> +++ b/drivers/char/tpm/tpm-chip.c
> @@ -37,6 +37,116 @@ struct class *tpm_class;
>   struct class *tpmrm_class;
>   dev_t tpm_devt;
>
> +static int tpm_request_locality(struct tpm_chip *chip, unsigned int flags)
> +{
> +	int rc;
> +
> +	if (flags & TPM_TRANSMIT_NESTED)
> +		return 0;
> +
> +	if (!chip->ops->request_locality)
> +		return 0;
> +
> +	rc = chip->ops->request_locality(chip, 0);
> +	if (rc < 0)
> +		return rc;
> +
> +	chip->locality = rc;
> +	return 0;
> +}
> +
> +static void tpm_relinquish_locality(struct tpm_chip *chip, unsigned int flags)
> +{
> +	int rc;
> +
> +	if (flags & TPM_TRANSMIT_NESTED)
> +		return;
> +
> +	if (!chip->ops->relinquish_locality)
> +		return;
> +
> +	rc = chip->ops->relinquish_locality(chip, chip->locality);
> +	if (rc)
> +		dev_err(&chip->dev, "%s: : error %d\n", __func__, rc);
> +
> +	chip->locality = -1;
> +}
> +
> +static int tpm_cmd_ready(struct tpm_chip *chip, unsigned int flags)
> +{
> +	if (flags & TPM_TRANSMIT_NESTED)
> +		return 0;
> +
> +	if (!chip->ops->cmd_ready)
> +		return 0;
> +
> +	return chip->ops->cmd_ready(chip);
> +}
> +
> +static int tpm_go_idle(struct tpm_chip *chip, unsigned int flags)
> +{
> +	if (flags & TPM_TRANSMIT_NESTED)
> +		return 0;
> +
> +	if (!chip->ops->go_idle)
> +		return 0;
> +
> +	return chip->ops->go_idle(chip);
> +}
> +
> +/**
> + * tpm_chip_start() - power on the TPM
> + * @chip:	a TPM chip to use
> + * @flags:	TPM transmit flags
> + *
> + * Return:
> + * * The response length	- OK
> + * * -errno			- A system error
> + */
> +int tpm_chip_start(struct tpm_chip *chip, unsigned int flags)
> +{
> +	int ret;
> +
> +	if (chip->ops->clk_enable)
> +		chip->ops->clk_enable(chip, true);
> +
> +	if (chip->locality == -1) {
> +		ret = tpm_request_locality(chip, flags);
> +		if (ret) {
> +			chip->ops->clk_enable(chip, false);
> +			return ret;
> +		}
> +	}
> +
> +	ret = tpm_cmd_ready(chip, flags);
> +	if (ret) {
> +		tpm_relinquish_locality(chip, flags);
> +		if (chip->ops->clk_enable)
> +			chip->ops->clk_enable(chip, false);
> +		return ret;
> +	}
> +
> +	return 0;
> +}
> +
> +/**
> + * tpm_chip_stop() - power off the TPM
> + * @chip:	a TPM chip to use
> + * @flags:	TPM transmit flags
> + *
> + * Return:
> + * * The response length	- OK
> + * * -errno			- A system error
> + */
> +void tpm_chip_stop(struct tpm_chip *chip, unsigned int flags)
> +{
> +	tpm_go_idle(chip, flags);
> +	tpm_relinquish_locality(chip, flags);
> +	if (chip->ops->clk_enable)
> +		chip->ops->clk_enable(chip, false);
> +}
> +
> +
>   /**
>    * tpm_try_get_ops() - Get a ref to the tpm_chip
>    * @chip: Chip to ref
> diff --git a/drivers/char/tpm/tpm-interface.c b/drivers/char/tpm/tpm-interface.c
> index 5865b9671d20..888c9923fca1 100644
> --- a/drivers/char/tpm/tpm-interface.c
> +++ b/drivers/char/tpm/tpm-interface.c
> @@ -62,64 +62,6 @@ unsigned long tpm_calc_ordinal_duration(struct tpm_chip *chip, u32 ordinal)
>   }
>   EXPORT_SYMBOL_GPL(tpm_calc_ordinal_duration);
>
> -static int tpm_request_locality(struct tpm_chip *chip, unsigned int flags)
> -{
> -	int rc;
> -
> -	if (flags & TPM_TRANSMIT_NESTED)
> -		return 0;
> -
> -	if (!chip->ops->request_locality)
> -		return 0;
> -
> -	rc = chip->ops->request_locality(chip, 0);
> -	if (rc < 0)
> -		return rc;
> -
> -	chip->locality = rc;
> -
> -	return 0;
> -}
> -
> -static void tpm_relinquish_locality(struct tpm_chip *chip, unsigned int flags)
> -{
> -	int rc;
> -
> -	if (flags & TPM_TRANSMIT_NESTED)
> -		return;
> -
> -	if (!chip->ops->relinquish_locality)
> -		return;
> -
> -	rc = chip->ops->relinquish_locality(chip, chip->locality);
> -	if (rc)
> -		dev_err(&chip->dev, "%s: : error %d\n", __func__, rc);
> -
> -	chip->locality = -1;
> -}
> -
> -static int tpm_cmd_ready(struct tpm_chip *chip, unsigned int flags)
> -{
> -	if (flags & TPM_TRANSMIT_NESTED)
> -		return 0;
> -
> -	if (!chip->ops->cmd_ready)
> -		return 0;
> -
> -	return chip->ops->cmd_ready(chip);
> -}
> -
> -static int tpm_go_idle(struct tpm_chip *chip, unsigned int flags)
> -{
> -	if (flags & TPM_TRANSMIT_NESTED)
> -		return 0;
> -
> -	if (!chip->ops->go_idle)
> -		return 0;
> -
> -	return chip->ops->go_idle(chip);
> -}
> -
>   static ssize_t tpm_try_transmit(struct tpm_chip *chip, u8 *buf, size_t bufsiz,
>   				unsigned int flags)
>   {
> @@ -212,7 +154,6 @@ ssize_t tpm_transmit(struct tpm_chip *chip, u8 *buf, size_t bufsiz,
>   	/* space for header and handles */
>   	u8 save[TPM_HEADER_SIZE + 3*sizeof(u32)];
>   	unsigned int delay_msec = TPM2_DURATION_SHORT;
> -	bool has_locality = false;
>   	u32 rc = 0;
>   	ssize_t ret;
>   	const size_t save_size = min(sizeof(save), bufsiz);
> @@ -227,34 +168,12 @@ ssize_t tpm_transmit(struct tpm_chip *chip, u8 *buf, size_t bufsiz,
>   	memcpy(save, buf, save_size);
>
>   	for (;;) {
> -		if (chip->ops->clk_enable != NULL)
> -			chip->ops->clk_enable(chip, true);
> -
> -		if (chip->locality == -1) {
> -			ret = tpm_request_locality(chip, flags);
> -			if (ret)
> -				goto out_locality;
> -			has_locality = true;
> -		}
> -
> -		ret = tpm_cmd_ready(chip, flags);
> +		ret = tpm_chip_start(chip, flags);
>   		if (ret)
> -			goto out_locality;
> -
> +			return ret;
>   		ret = tpm_try_transmit(chip, buf, bufsiz, flags);
> +		tpm_chip_stop(chip, flags);
>
> -		/* This may fail but do not override ret. */
> -		tpm_go_idle(chip, flags);
> -
> -out_locality:
> -		if (has_locality)
> -			tpm_relinquish_locality(chip, flags);
> -
> -		if (chip->ops->clk_enable != NULL)
> -			chip->ops->clk_enable(chip, false);
> -
> -		if (ret < 0)
> -			break;

I think this should stay.


>   		rc = be32_to_cpu(header->return_code);
>   		if (rc != TPM2_RC_RETRY && rc != TPM2_RC_TESTING)
>   			break;
> diff --git a/drivers/char/tpm/tpm.h b/drivers/char/tpm/tpm.h
> index c7c06de651a0..c42a75710b70 100644
> --- a/drivers/char/tpm/tpm.h
> +++ b/drivers/char/tpm/tpm.h
> @@ -523,6 +523,8 @@ static inline void tpm_msleep(unsigned int delay_msec)
>   		     delay_msec * 1000);
>   };
>
> +int tpm_chip_start(struct tpm_chip *chip, unsigned int flags);
> +void tpm_chip_stop(struct tpm_chip *chip, unsigned int flags);
>   struct tpm_chip *tpm_find_get_ops(struct tpm_chip *chip);
>   __must_check int tpm_try_get_ops(struct tpm_chip *chip);
>   void tpm_put_ops(struct tpm_chip *chip);
Stefan Berger Nov. 14, 2018, 1:56 a.m. UTC | #5
On 11/13/18 5:34 PM, Stefan Berger wrote:
> On 11/13/18 1:36 PM, Jarkko Sakkinen wrote:
>> Encapsulate power gating and locality functionality to tpm_chip_start()
>> and tpm_chip_stop() in order to clean up the branching mess in
>> tpm_transmit().
>
>
> I ran the vtpm proxy test suite on this series and got this error when 
> running it with 'make check-j5' 
> (https://github.com/stefanberger/linux-vtpm-tests).
>
> It's was actually difficult to hit this bug since I ran it with -j1 , 
> -j2 and so on before.

This is the diff against your nested branch that fixes this bug and the 
other issue I found:

diff --git a/drivers/char/tpm/tpm-chip.c b/drivers/char/tpm/tpm-chip.c
index 46aa68756bac..42bce9bc41b1 100644
--- a/drivers/char/tpm/tpm-chip.c
+++ b/drivers/char/tpm/tpm-chip.c
@@ -155,7 +155,13 @@ int tpm_try_get_ops(struct tpm_chip *chip)
          goto out_lock;

      mutex_lock(&chip->tpm_mutex);
-    return tpm_chip_start(chip);
+    rc = tpm_chip_start(chip);
+    if (rc)
+        goto out_unlock;
+    return 0;
+
+out_unlock:
+    mutex_unlock(&chip->tpm_mutex);
  out_lock:
      up_read(&chip->ops_sem);
      put_device(&chip->dev);
diff --git a/drivers/char/tpm/tpm-interface.c 
b/drivers/char/tpm/tpm-interface.c
index 5e3d5e95ea46..c3260ae8aca3 100644
--- a/drivers/char/tpm/tpm-interface.c
+++ b/drivers/char/tpm/tpm-interface.c
@@ -167,6 +167,8 @@ ssize_t tpm_transmit(struct tpm_chip *chip, u8 *buf, 
size_t bufsiz)
      for (;;) {
          ret = tpm_try_transmit(chip, buf, bufsiz);

+        if (ret < 0)
+            break;
          rc = be32_to_cpu(header->return_code);
          if (rc != TPM2_RC_RETRY && rc != TPM2_RC_TESTING)
              break;





>
>
> [ 3003.838138] BUG: unable to handle kernel NULL pointer dereference 
> at 0000000000000000
> [ 3003.838806] PGD 0 P4D 0
> [ 3003.838806] Oops: 0010 [#1] SMP PTI
> [ 3003.840394] CPU: 3 PID: 111 Comm: kworker/3:1 Not tainted 
> 4.20.0-rc2+ #6
> [ 3003.840394] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), 
> BIOS rel-1.11.0-50-g14221cd-dirty-20181018_164544-sbct-4.pok.ibm.com 
> 04/01/2014
> [ 3003.840394] Workqueue: tpm-vtpm vtpm_proxy_work
> [ 3003.840394] RIP: 0010:          (null)
> [ 3003.840394] Code: Bad RIP value.
> [ 3003.840394] RSP: 0018:ffffa6e6816d7e10 EFLAGS: 00010246
> [ 3003.840394] RAX: 00000000ffffffe0 RBX: ffff9698077ad000 RCX: 
> 0000000000000006
> [ 3003.840394] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 
> ffff9698077ad000
> [ 3003.840394] RBP: ffff9698077ad000 R08: fffff59bc6172d08 R09: 
> 0000000000000000
> [ 3003.840394] R10: 0000000000000000 R11: 0000000000000000 R12: 
> ffff9698b78f0700
> [ 3003.840394] R13: ffff9698b78fbc00 R14: 0000000000000000 R15: 
> ffff9697f8ea10f8
> [ 3003.840394] FS:  0000000000000000(0000) GS:ffff9698b78c0000(0000) 
> knlGS:0000000000000000
> [ 3003.840394] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> [ 3003.840394] CR2: ffffffffffffffd6 CR3: 0000000190606000 CR4: 
> 00000000000006e0
> [ 3003.840394] Call Trace:
> [ 3003.840394]  ? tpm_chip_start+0xb8/0xe0
> [ 3003.840394]  ? tpm_chip_register+0x15/0x240
> [ 3003.840394]  ? vtpm_proxy_work+0x15/0x30
> [ 3003.840394]  ? process_one_work+0x237/0x5c0
> [ 3003.840394]  ? worker_thread+0x1d5/0x390
> [ 3003.840394]  ? process_one_work+0x5c0/0x5c0
> [ 3003.840394]  ? kthread+0x11e/0x140
> [ 3003.840394]  ? kthread_park+0x90/0x90
> [ 3003.840394]  ? ret_from_fork+0x3a/0x50
> [ 3003.840394] Modules linked in: xt_CHECKSUM ipt_MASQUERADE tun 
> nf_conntrack_netbios_ns nf_conntrack_broadcast xt_CT ip6t_rpfilter 
> ip6t_REJECT nf_reject_ipv6 xt_conntrack ip_set nfnetlink ebtable_nat 
> ebtable_broute bridge stp llc ip6table_nat nf_nat_ipv6 ip6table_mangle 
> ip6table_raw ip6table_security iptable_nat nf_nat_ipv4 nf_nat 
> nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 libcrc32c iptable_mangle 
> iptable_raw iptable_security ebtable_filter ebtables ip6table_filter 
> ip6_tables sunrpc virtio_gpu ttm drm_kms_helper drm joydev syscopyarea 
> sysfillrect sysimgblt pcspkr virtio_balloon i2c_piix4 fb_sys_fops 
> virtio_net net_failover virtio_console failover virtio_blk 
> crc32c_intel virtio_pci serio_raw ata_generic virtio_ring virtio 
> pata_acpi floppy qemu_fw_cfg
> [ 3003.840394] CR2: 0000000000000000
> [ 3003.840394] ---[ end trace 29e5990b605a7ccb ]---
> [ 3003.840394] RIP: 0010:          (null)
> [ 3003.840394] Code: Bad RIP value.
> [ 3003.840394] RSP: 0018:ffffa6e6816d7e10 EFLAGS: 00010246
> [ 3003.840394] RAX: 00000000ffffffe0 RBX: ffff9698077ad000 RCX: 
> 0000000000000006
> [ 3003.840394] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 
> ffff9698077ad000
> [ 3003.840394] RBP: ffff9698077ad000 R08: fffff59bc6172d08 R09: 
> 0000000000000000
> [ 3003.840394] R10: 0000000000000000 R11: 0000000000000000 R12: 
> ffff9698b78f0700
> [ 3003.840394] R13: ffff9698b78fbc00 R14: 0000000000000000 R15: 
> ffff9697f8ea10f8
> [ 3003.840394] FS:  0000000000000000(0000) GS:ffff9698b78c0000(0000) 
> knlGS:0000000000000000
> [ 3003.840394] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> [ 3003.840394] CR2: ffffffffffffffd6 CR3: 0000000190606000 CR4: 
> 00000000000006e0
> [ 3003.840394] BUG: sleeping function called from invalid context at 
> ./include/linux/percpu-rwsem.h:34
> [ 3003.840394] in_atomic(): 0, irqs_disabled(): 1, pid: 111, name: 
> kworker/3:1
> [ 3003.840394] INFO: lockdep is turned off.
> [ 3003.840394] irq event stamp: 165206
> [ 3003.840394] hardirqs last  enabled at (165205): 
> [<ffffffff8b220113>] free_unref_page+0xf3/0x1f0
> [ 3003.840394] hardirqs last disabled at (165206): 
> [<ffffffff8b0019ee>] trace_hardirqs_off_thunk+0x1a/0x1c
> [ 3003.840394] softirqs last  enabled at (165182): 
> [<ffffffff8b785e01>] peernet2id+0x41/0x50
> [ 3003.840394] softirqs last disabled at (165180): 
> [<ffffffff8b785de2>] peernet2id+0x22/0x50
> [ 3003.840394] CPU: 3 PID: 111 Comm: kworker/3:1 Tainted: G 
> D           4.20.0-rc2+ #6
> [ 3003.840394] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), 
> BIOS rel-1.11.0-50-g14221cd-dirty-20181018_164544-sbct-4.pok.ibm.com 
> 04/01/2014
> [ 3003.840394] Workqueue: tpm-vtpm vtpm_proxy_work
> [ 3003.840394] Call Trace:
> [ 3003.840394]  dump_stack+0x67/0x9b
> [ 3003.840394]  ___might_sleep+0x149/0x230
> [ 3003.840394]  exit_signals+0x20/0x210
> [ 3003.840394]  ? worker_thread+0x1d5/0x390
> [ 3003.840394]  do_exit+0xa0/0xc70
> [ 3003.840394]  ? process_one_work+0x5c0/0x5c0
> [ 3003.840394]  ? kthread+0x11e/0x140
> [ 3003.840394]  rewind_stack_do_exit+0x17/0x20
> [ 3004.389582] tpm tpm1803: tpm_try_transmit: tpm_send: error -14
>
>
>>
>> Signed-off-by: Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com>
>> ---
>>   drivers/char/tpm/tpm-chip.c      | 110 +++++++++++++++++++++++++++++++
>>   drivers/char/tpm/tpm-interface.c |  87 +-----------------------
>>   drivers/char/tpm/tpm.h           |   2 +
>>   3 files changed, 115 insertions(+), 84 deletions(-)
>>
>> diff --git a/drivers/char/tpm/tpm-chip.c b/drivers/char/tpm/tpm-chip.c
>> index 157505b0f755..65f1561eba81 100644
>> --- a/drivers/char/tpm/tpm-chip.c
>> +++ b/drivers/char/tpm/tpm-chip.c
>> @@ -37,6 +37,116 @@ struct class *tpm_class;
>>   struct class *tpmrm_class;
>>   dev_t tpm_devt;
>>
>> +static int tpm_request_locality(struct tpm_chip *chip, unsigned int 
>> flags)
>> +{
>> +    int rc;
>> +
>> +    if (flags & TPM_TRANSMIT_NESTED)
>> +        return 0;
>> +
>> +    if (!chip->ops->request_locality)
>> +        return 0;
>> +
>> +    rc = chip->ops->request_locality(chip, 0);
>> +    if (rc < 0)
>> +        return rc;
>> +
>> +    chip->locality = rc;
>> +    return 0;
>> +}
>> +
>> +static void tpm_relinquish_locality(struct tpm_chip *chip, unsigned 
>> int flags)
>> +{
>> +    int rc;
>> +
>> +    if (flags & TPM_TRANSMIT_NESTED)
>> +        return;
>> +
>> +    if (!chip->ops->relinquish_locality)
>> +        return;
>> +
>> +    rc = chip->ops->relinquish_locality(chip, chip->locality);
>> +    if (rc)
>> +        dev_err(&chip->dev, "%s: : error %d\n", __func__, rc);
>> +
>> +    chip->locality = -1;
>> +}
>> +
>> +static int tpm_cmd_ready(struct tpm_chip *chip, unsigned int flags)
>> +{
>> +    if (flags & TPM_TRANSMIT_NESTED)
>> +        return 0;
>> +
>> +    if (!chip->ops->cmd_ready)
>> +        return 0;
>> +
>> +    return chip->ops->cmd_ready(chip);
>> +}
>> +
>> +static int tpm_go_idle(struct tpm_chip *chip, unsigned int flags)
>> +{
>> +    if (flags & TPM_TRANSMIT_NESTED)
>> +        return 0;
>> +
>> +    if (!chip->ops->go_idle)
>> +        return 0;
>> +
>> +    return chip->ops->go_idle(chip);
>> +}
>> +
>> +/**
>> + * tpm_chip_start() - power on the TPM
>> + * @chip:    a TPM chip to use
>> + * @flags:    TPM transmit flags
>> + *
>> + * Return:
>> + * * The response length    - OK
>> + * * -errno            - A system error
>> + */
>> +int tpm_chip_start(struct tpm_chip *chip, unsigned int flags)
>> +{
>> +    int ret;
>> +
>> +    if (chip->ops->clk_enable)
>> +        chip->ops->clk_enable(chip, true);
>> +
>> +    if (chip->locality == -1) {
>> +        ret = tpm_request_locality(chip, flags);
>> +        if (ret) {
>> +            chip->ops->clk_enable(chip, false);
>> +            return ret;
>> +        }
>> +    }
>> +
>> +    ret = tpm_cmd_ready(chip, flags);
>> +    if (ret) {
>> +        tpm_relinquish_locality(chip, flags);
>> +        if (chip->ops->clk_enable)
>> +            chip->ops->clk_enable(chip, false);
>> +        return ret;
>> +    }
>> +
>> +    return 0;
>> +}
>> +
>> +/**
>> + * tpm_chip_stop() - power off the TPM
>> + * @chip:    a TPM chip to use
>> + * @flags:    TPM transmit flags
>> + *
>> + * Return:
>> + * * The response length    - OK
>> + * * -errno            - A system error
>> + */
>> +void tpm_chip_stop(struct tpm_chip *chip, unsigned int flags)
>> +{
>> +    tpm_go_idle(chip, flags);
>> +    tpm_relinquish_locality(chip, flags);
>> +    if (chip->ops->clk_enable)
>> +        chip->ops->clk_enable(chip, false);
>> +}
>> +
>> +
>>   /**
>>    * tpm_try_get_ops() - Get a ref to the tpm_chip
>>    * @chip: Chip to ref
>> diff --git a/drivers/char/tpm/tpm-interface.c 
>> b/drivers/char/tpm/tpm-interface.c
>> index 5865b9671d20..888c9923fca1 100644
>> --- a/drivers/char/tpm/tpm-interface.c
>> +++ b/drivers/char/tpm/tpm-interface.c
>> @@ -62,64 +62,6 @@ unsigned long tpm_calc_ordinal_duration(struct 
>> tpm_chip *chip, u32 ordinal)
>>   }
>>   EXPORT_SYMBOL_GPL(tpm_calc_ordinal_duration);
>>
>> -static int tpm_request_locality(struct tpm_chip *chip, unsigned int 
>> flags)
>> -{
>> -    int rc;
>> -
>> -    if (flags & TPM_TRANSMIT_NESTED)
>> -        return 0;
>> -
>> -    if (!chip->ops->request_locality)
>> -        return 0;
>> -
>> -    rc = chip->ops->request_locality(chip, 0);
>> -    if (rc < 0)
>> -        return rc;
>> -
>> -    chip->locality = rc;
>> -
>> -    return 0;
>> -}
>> -
>> -static void tpm_relinquish_locality(struct tpm_chip *chip, unsigned 
>> int flags)
>> -{
>> -    int rc;
>> -
>> -    if (flags & TPM_TRANSMIT_NESTED)
>> -        return;
>> -
>> -    if (!chip->ops->relinquish_locality)
>> -        return;
>> -
>> -    rc = chip->ops->relinquish_locality(chip, chip->locality);
>> -    if (rc)
>> -        dev_err(&chip->dev, "%s: : error %d\n", __func__, rc);
>> -
>> -    chip->locality = -1;
>> -}
>> -
>> -static int tpm_cmd_ready(struct tpm_chip *chip, unsigned int flags)
>> -{
>> -    if (flags & TPM_TRANSMIT_NESTED)
>> -        return 0;
>> -
>> -    if (!chip->ops->cmd_ready)
>> -        return 0;
>> -
>> -    return chip->ops->cmd_ready(chip);
>> -}
>> -
>> -static int tpm_go_idle(struct tpm_chip *chip, unsigned int flags)
>> -{
>> -    if (flags & TPM_TRANSMIT_NESTED)
>> -        return 0;
>> -
>> -    if (!chip->ops->go_idle)
>> -        return 0;
>> -
>> -    return chip->ops->go_idle(chip);
>> -}
>> -
>>   static ssize_t tpm_try_transmit(struct tpm_chip *chip, u8 *buf, 
>> size_t bufsiz,
>>                   unsigned int flags)
>>   {
>> @@ -212,7 +154,6 @@ ssize_t tpm_transmit(struct tpm_chip *chip, u8 
>> *buf, size_t bufsiz,
>>       /* space for header and handles */
>>       u8 save[TPM_HEADER_SIZE + 3*sizeof(u32)];
>>       unsigned int delay_msec = TPM2_DURATION_SHORT;
>> -    bool has_locality = false;
>>       u32 rc = 0;
>>       ssize_t ret;
>>       const size_t save_size = min(sizeof(save), bufsiz);
>> @@ -227,34 +168,12 @@ ssize_t tpm_transmit(struct tpm_chip *chip, u8 
>> *buf, size_t bufsiz,
>>       memcpy(save, buf, save_size);
>>
>>       for (;;) {
>> -        if (chip->ops->clk_enable != NULL)
>> -            chip->ops->clk_enable(chip, true);
>> -
>> -        if (chip->locality == -1) {
>> -            ret = tpm_request_locality(chip, flags);
>> -            if (ret)
>> -                goto out_locality;
>> -            has_locality = true;
>> -        }
>> -
>> -        ret = tpm_cmd_ready(chip, flags);
>> +        ret = tpm_chip_start(chip, flags);
>>           if (ret)
>> -            goto out_locality;
>> -
>> +            return ret;
>>           ret = tpm_try_transmit(chip, buf, bufsiz, flags);
>> +        tpm_chip_stop(chip, flags);
>>
>> -        /* This may fail but do not override ret. */
>> -        tpm_go_idle(chip, flags);
>> -
>> -out_locality:
>> -        if (has_locality)
>> -            tpm_relinquish_locality(chip, flags);
>> -
>> -        if (chip->ops->clk_enable != NULL)
>> -            chip->ops->clk_enable(chip, false);
>> -
>> -        if (ret < 0)
>> -            break;
>>           rc = be32_to_cpu(header->return_code);
>>           if (rc != TPM2_RC_RETRY && rc != TPM2_RC_TESTING)
>>               break;
>> diff --git a/drivers/char/tpm/tpm.h b/drivers/char/tpm/tpm.h
>> index c7c06de651a0..c42a75710b70 100644
>> --- a/drivers/char/tpm/tpm.h
>> +++ b/drivers/char/tpm/tpm.h
>> @@ -523,6 +523,8 @@ static inline void tpm_msleep(unsigned int 
>> delay_msec)
>>                delay_msec * 1000);
>>   };
>>
>> +int tpm_chip_start(struct tpm_chip *chip, unsigned int flags);
>> +void tpm_chip_stop(struct tpm_chip *chip, unsigned int flags);
>>   struct tpm_chip *tpm_find_get_ops(struct tpm_chip *chip);
>>   __must_check int tpm_try_get_ops(struct tpm_chip *chip);
>>   void tpm_put_ops(struct tpm_chip *chip);
>
>
Jarkko Sakkinen Nov. 15, 2018, 8:26 p.m. UTC | #6
On Tue, Nov 13, 2018 at 05:34:54PM -0500, Stefan Berger wrote:
> On 11/13/18 1:36 PM, Jarkko Sakkinen wrote:
> > Encapsulate power gating and locality functionality to tpm_chip_start()
> > and tpm_chip_stop() in order to clean up the branching mess in
> > tpm_transmit().
> 
> 
> I ran the vtpm proxy test suite on this series and got this error when
> running it with 'make check-j5'
> (https://github.com/stefanberger/linux-vtpm-tests).
> 
> It's was actually difficult to hit this bug since I ran it with -j1 , -j2
> and so on before.
> 
> 
> [ 3003.838138] BUG: unable to handle kernel NULL pointer dereference at
> 0000000000000000
> [ 3003.838806] PGD 0 P4D 0
> [ 3003.838806] Oops: 0010 [#1] SMP PTI
> [ 3003.840394] CPU: 3 PID: 111 Comm: kworker/3:1 Not tainted 4.20.0-rc2+ #6
> [ 3003.840394] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
> rel-1.11.0-50-g14221cd-dirty-20181018_164544-sbct-4.pok.ibm.com 04/01/2014
> [ 3003.840394] Workqueue: tpm-vtpm vtpm_proxy_work
> [ 3003.840394] RIP: 0010:          (null)
> [ 3003.840394] Code: Bad RIP value.
> [ 3003.840394] RSP: 0018:ffffa6e6816d7e10 EFLAGS: 00010246
> [ 3003.840394] RAX: 00000000ffffffe0 RBX: ffff9698077ad000 RCX:
> 0000000000000006
> [ 3003.840394] RDX: 0000000000000000 RSI: 0000000000000000 RDI:
> ffff9698077ad000
> [ 3003.840394] RBP: ffff9698077ad000 R08: fffff59bc6172d08 R09:
> 0000000000000000
> [ 3003.840394] R10: 0000000000000000 R11: 0000000000000000 R12:
> ffff9698b78f0700
> [ 3003.840394] R13: ffff9698b78fbc00 R14: 0000000000000000 R15:
> ffff9697f8ea10f8
> [ 3003.840394] FS:  0000000000000000(0000) GS:ffff9698b78c0000(0000)
> knlGS:0000000000000000
> [ 3003.840394] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> [ 3003.840394] CR2: ffffffffffffffd6 CR3: 0000000190606000 CR4:
> 00000000000006e0
> [ 3003.840394] Call Trace:
> [ 3003.840394]  ? tpm_chip_start+0xb8/0xe0
> [ 3003.840394]  ? tpm_chip_register+0x15/0x240
> [ 3003.840394]  ? vtpm_proxy_work+0x15/0x30
> [ 3003.840394]  ? process_one_work+0x237/0x5c0
> [ 3003.840394]  ? worker_thread+0x1d5/0x390
> [ 3003.840394]  ? process_one_work+0x5c0/0x5c0
> [ 3003.840394]  ? kthread+0x11e/0x140
> [ 3003.840394]  ? kthread_park+0x90/0x90
> [ 3003.840394]  ? ret_from_fork+0x3a/0x50
> [ 3003.840394] Modules linked in: xt_CHECKSUM ipt_MASQUERADE tun
> nf_conntrack_netbios_ns nf_conntrack_broadcast xt_CT ip6t_rpfilter
> ip6t_REJECT nf_reject_ipv6 xt_conntrack ip_set nfnetlink ebtable_nat
> ebtable_broute bridge stp llc ip6table_nat nf_nat_ipv6 ip6table_mangle
> ip6table_raw ip6table_security iptable_nat nf_nat_ipv4 nf_nat nf_conntrack
> nf_defrag_ipv6 nf_defrag_ipv4 libcrc32c iptable_mangle iptable_raw
> iptable_security ebtable_filter ebtables ip6table_filter ip6_tables sunrpc
> virtio_gpu ttm drm_kms_helper drm joydev syscopyarea sysfillrect sysimgblt
> pcspkr virtio_balloon i2c_piix4 fb_sys_fops virtio_net net_failover
> virtio_console failover virtio_blk crc32c_intel virtio_pci serio_raw
> ata_generic virtio_ring virtio pata_acpi floppy qemu_fw_cfg
> [ 3003.840394] CR2: 0000000000000000
> [ 3003.840394] ---[ end trace 29e5990b605a7ccb ]---
> [ 3003.840394] RIP: 0010:          (null)
> [ 3003.840394] Code: Bad RIP value.
> [ 3003.840394] RSP: 0018:ffffa6e6816d7e10 EFLAGS: 00010246
> [ 3003.840394] RAX: 00000000ffffffe0 RBX: ffff9698077ad000 RCX:
> 0000000000000006
> [ 3003.840394] RDX: 0000000000000000 RSI: 0000000000000000 RDI:
> ffff9698077ad000
> [ 3003.840394] RBP: ffff9698077ad000 R08: fffff59bc6172d08 R09:
> 0000000000000000
> [ 3003.840394] R10: 0000000000000000 R11: 0000000000000000 R12:
> ffff9698b78f0700
> [ 3003.840394] R13: ffff9698b78fbc00 R14: 0000000000000000 R15:
> ffff9697f8ea10f8
> [ 3003.840394] FS:  0000000000000000(0000) GS:ffff9698b78c0000(0000)
> knlGS:0000000000000000
> [ 3003.840394] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> [ 3003.840394] CR2: ffffffffffffffd6 CR3: 0000000190606000 CR4:
> 00000000000006e0
> [ 3003.840394] BUG: sleeping function called from invalid context at
> ./include/linux/percpu-rwsem.h:34
> [ 3003.840394] in_atomic(): 0, irqs_disabled(): 1, pid: 111, name:
> kworker/3:1
> [ 3003.840394] INFO: lockdep is turned off.
> [ 3003.840394] irq event stamp: 165206
> [ 3003.840394] hardirqs last  enabled at (165205): [<ffffffff8b220113>]
> free_unref_page+0xf3/0x1f0
> [ 3003.840394] hardirqs last disabled at (165206): [<ffffffff8b0019ee>]
> trace_hardirqs_off_thunk+0x1a/0x1c
> [ 3003.840394] softirqs last  enabled at (165182): [<ffffffff8b785e01>]
> peernet2id+0x41/0x50
> [ 3003.840394] softirqs last disabled at (165180): [<ffffffff8b785de2>]
> peernet2id+0x22/0x50
> [ 3003.840394] CPU: 3 PID: 111 Comm: kworker/3:1 Tainted: G D          
> 4.20.0-rc2+ #6
> [ 3003.840394] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
> rel-1.11.0-50-g14221cd-dirty-20181018_164544-sbct-4.pok.ibm.com 04/01/2014
> [ 3003.840394] Workqueue: tpm-vtpm vtpm_proxy_work
> [ 3003.840394] Call Trace:
> [ 3003.840394]  dump_stack+0x67/0x9b
> [ 3003.840394]  ___might_sleep+0x149/0x230
> [ 3003.840394]  exit_signals+0x20/0x210
> [ 3003.840394]  ? worker_thread+0x1d5/0x390
> [ 3003.840394]  do_exit+0xa0/0xc70
> [ 3003.840394]  ? process_one_work+0x5c0/0x5c0
> [ 3003.840394]  ? kthread+0x11e/0x140
> [ 3003.840394]  rewind_stack_do_exit+0x17/0x20
> [ 3004.389582] tpm tpm1803: tpm_try_transmit: tpm_send: error -14
> 
> 
> > 
> > Signed-off-by: Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com>
> > ---
> >   drivers/char/tpm/tpm-chip.c      | 110 +++++++++++++++++++++++++++++++
> >   drivers/char/tpm/tpm-interface.c |  87 +-----------------------
> >   drivers/char/tpm/tpm.h           |   2 +
> >   3 files changed, 115 insertions(+), 84 deletions(-)
> > 
> > diff --git a/drivers/char/tpm/tpm-chip.c b/drivers/char/tpm/tpm-chip.c
> > index 157505b0f755..65f1561eba81 100644
> > --- a/drivers/char/tpm/tpm-chip.c
> > +++ b/drivers/char/tpm/tpm-chip.c
> > @@ -37,6 +37,116 @@ struct class *tpm_class;
> >   struct class *tpmrm_class;
> >   dev_t tpm_devt;
> > 
> > +static int tpm_request_locality(struct tpm_chip *chip, unsigned int flags)
> > +{
> > +	int rc;
> > +
> > +	if (flags & TPM_TRANSMIT_NESTED)
> > +		return 0;
> > +
> > +	if (!chip->ops->request_locality)
> > +		return 0;
> > +
> > +	rc = chip->ops->request_locality(chip, 0);
> > +	if (rc < 0)
> > +		return rc;
> > +
> > +	chip->locality = rc;
> > +	return 0;
> > +}
> > +
> > +static void tpm_relinquish_locality(struct tpm_chip *chip, unsigned int flags)
> > +{
> > +	int rc;
> > +
> > +	if (flags & TPM_TRANSMIT_NESTED)
> > +		return;
> > +
> > +	if (!chip->ops->relinquish_locality)
> > +		return;
> > +
> > +	rc = chip->ops->relinquish_locality(chip, chip->locality);
> > +	if (rc)
> > +		dev_err(&chip->dev, "%s: : error %d\n", __func__, rc);
> > +
> > +	chip->locality = -1;
> > +}
> > +
> > +static int tpm_cmd_ready(struct tpm_chip *chip, unsigned int flags)
> > +{
> > +	if (flags & TPM_TRANSMIT_NESTED)
> > +		return 0;
> > +
> > +	if (!chip->ops->cmd_ready)
> > +		return 0;
> > +
> > +	return chip->ops->cmd_ready(chip);
> > +}
> > +
> > +static int tpm_go_idle(struct tpm_chip *chip, unsigned int flags)
> > +{
> > +	if (flags & TPM_TRANSMIT_NESTED)
> > +		return 0;
> > +
> > +	if (!chip->ops->go_idle)
> > +		return 0;
> > +
> > +	return chip->ops->go_idle(chip);
> > +}
> > +
> > +/**
> > + * tpm_chip_start() - power on the TPM
> > + * @chip:	a TPM chip to use
> > + * @flags:	TPM transmit flags
> > + *
> > + * Return:
> > + * * The response length	- OK
> > + * * -errno			- A system error
> > + */
> > +int tpm_chip_start(struct tpm_chip *chip, unsigned int flags)
> > +{
> > +	int ret;
> > +
> > +	if (chip->ops->clk_enable)
> > +		chip->ops->clk_enable(chip, true);
> > +
> > +	if (chip->locality == -1) {
> > +		ret = tpm_request_locality(chip, flags);
> > +		if (ret) {
> > +			chip->ops->clk_enable(chip, false);
> > +			return ret;
> > +		}
> > +	}
> > +
> > +	ret = tpm_cmd_ready(chip, flags);
> > +	if (ret) {
> > +		tpm_relinquish_locality(chip, flags);
> > +		if (chip->ops->clk_enable)
> > +			chip->ops->clk_enable(chip, false);
> > +		return ret;
> > +	}
> > +
> > +	return 0;
> > +}
> > +
> > +/**
> > + * tpm_chip_stop() - power off the TPM
> > + * @chip:	a TPM chip to use
> > + * @flags:	TPM transmit flags
> > + *
> > + * Return:
> > + * * The response length	- OK
> > + * * -errno			- A system error
> > + */
> > +void tpm_chip_stop(struct tpm_chip *chip, unsigned int flags)
> > +{
> > +	tpm_go_idle(chip, flags);
> > +	tpm_relinquish_locality(chip, flags);
> > +	if (chip->ops->clk_enable)
> > +		chip->ops->clk_enable(chip, false);
> > +}
> > +
> > +
> >   /**
> >    * tpm_try_get_ops() - Get a ref to the tpm_chip
> >    * @chip: Chip to ref
> > diff --git a/drivers/char/tpm/tpm-interface.c b/drivers/char/tpm/tpm-interface.c
> > index 5865b9671d20..888c9923fca1 100644
> > --- a/drivers/char/tpm/tpm-interface.c
> > +++ b/drivers/char/tpm/tpm-interface.c
> > @@ -62,64 +62,6 @@ unsigned long tpm_calc_ordinal_duration(struct tpm_chip *chip, u32 ordinal)
> >   }
> >   EXPORT_SYMBOL_GPL(tpm_calc_ordinal_duration);
> > 
> > -static int tpm_request_locality(struct tpm_chip *chip, unsigned int flags)
> > -{
> > -	int rc;
> > -
> > -	if (flags & TPM_TRANSMIT_NESTED)
> > -		return 0;
> > -
> > -	if (!chip->ops->request_locality)
> > -		return 0;
> > -
> > -	rc = chip->ops->request_locality(chip, 0);
> > -	if (rc < 0)
> > -		return rc;
> > -
> > -	chip->locality = rc;
> > -
> > -	return 0;
> > -}
> > -
> > -static void tpm_relinquish_locality(struct tpm_chip *chip, unsigned int flags)
> > -{
> > -	int rc;
> > -
> > -	if (flags & TPM_TRANSMIT_NESTED)
> > -		return;
> > -
> > -	if (!chip->ops->relinquish_locality)
> > -		return;
> > -
> > -	rc = chip->ops->relinquish_locality(chip, chip->locality);
> > -	if (rc)
> > -		dev_err(&chip->dev, "%s: : error %d\n", __func__, rc);
> > -
> > -	chip->locality = -1;
> > -}
> > -
> > -static int tpm_cmd_ready(struct tpm_chip *chip, unsigned int flags)
> > -{
> > -	if (flags & TPM_TRANSMIT_NESTED)
> > -		return 0;
> > -
> > -	if (!chip->ops->cmd_ready)
> > -		return 0;
> > -
> > -	return chip->ops->cmd_ready(chip);
> > -}
> > -
> > -static int tpm_go_idle(struct tpm_chip *chip, unsigned int flags)
> > -{
> > -	if (flags & TPM_TRANSMIT_NESTED)
> > -		return 0;
> > -
> > -	if (!chip->ops->go_idle)
> > -		return 0;
> > -
> > -	return chip->ops->go_idle(chip);
> > -}
> > -
> >   static ssize_t tpm_try_transmit(struct tpm_chip *chip, u8 *buf, size_t bufsiz,
> >   				unsigned int flags)
> >   {
> > @@ -212,7 +154,6 @@ ssize_t tpm_transmit(struct tpm_chip *chip, u8 *buf, size_t bufsiz,
> >   	/* space for header and handles */
> >   	u8 save[TPM_HEADER_SIZE + 3*sizeof(u32)];
> >   	unsigned int delay_msec = TPM2_DURATION_SHORT;
> > -	bool has_locality = false;
> >   	u32 rc = 0;
> >   	ssize_t ret;
> >   	const size_t save_size = min(sizeof(save), bufsiz);
> > @@ -227,34 +168,12 @@ ssize_t tpm_transmit(struct tpm_chip *chip, u8 *buf, size_t bufsiz,
> >   	memcpy(save, buf, save_size);
> > 
> >   	for (;;) {
> > -		if (chip->ops->clk_enable != NULL)
> > -			chip->ops->clk_enable(chip, true);
> > -
> > -		if (chip->locality == -1) {
> > -			ret = tpm_request_locality(chip, flags);
> > -			if (ret)
> > -				goto out_locality;
> > -			has_locality = true;
> > -		}
> > -
> > -		ret = tpm_cmd_ready(chip, flags);
> > +		ret = tpm_chip_start(chip, flags);
> >   		if (ret)
> > -			goto out_locality;
> > -
> > +			return ret;
> >   		ret = tpm_try_transmit(chip, buf, bufsiz, flags);
> > +		tpm_chip_stop(chip, flags);
> > 
> > -		/* This may fail but do not override ret. */
> > -		tpm_go_idle(chip, flags);
> > -
> > -out_locality:
> > -		if (has_locality)
> > -			tpm_relinquish_locality(chip, flags);
> > -
> > -		if (chip->ops->clk_enable != NULL)
> > -			chip->ops->clk_enable(chip, false);
> > -
> > -		if (ret < 0)
> > -			break;
> >   		rc = be32_to_cpu(header->return_code);
> >   		if (rc != TPM2_RC_RETRY && rc != TPM2_RC_TESTING)
> >   			break;
> > diff --git a/drivers/char/tpm/tpm.h b/drivers/char/tpm/tpm.h
> > index c7c06de651a0..c42a75710b70 100644
> > --- a/drivers/char/tpm/tpm.h
> > +++ b/drivers/char/tpm/tpm.h
> > @@ -523,6 +523,8 @@ static inline void tpm_msleep(unsigned int delay_msec)
> >   		     delay_msec * 1000);
> >   };
> > 
> > +int tpm_chip_start(struct tpm_chip *chip, unsigned int flags);
> > +void tpm_chip_stop(struct tpm_chip *chip, unsigned int flags);
> >   struct tpm_chip *tpm_find_get_ops(struct tpm_chip *chip);
> >   __must_check int tpm_try_get_ops(struct tpm_chip *chip);
> >   void tpm_put_ops(struct tpm_chip *chip);
> 
> 

Thank you for the feedback. I'll try to reproduce this myself.

/Jarkko
Jarkko Sakkinen Nov. 16, 2018, 12:32 p.m. UTC | #7
On Tue, Nov 13, 2018 at 08:56:51PM -0500, Stefan Berger wrote:
> On 11/13/18 5:34 PM, Stefan Berger wrote:
> > On 11/13/18 1:36 PM, Jarkko Sakkinen wrote:
> > > Encapsulate power gating and locality functionality to tpm_chip_start()
> > > and tpm_chip_stop() in order to clean up the branching mess in
> > > tpm_transmit().
> > 
> > 
> > I ran the vtpm proxy test suite on this series and got this error when
> > running it with 'make check-j5'
> > (https://github.com/stefanberger/linux-vtpm-tests).
> > 
> > It's was actually difficult to hit this bug since I ran it with -j1 ,
> > -j2 and so on before.
> 
> This is the diff against your nested branch that fixes this bug and the
> other issue I found:
> 
> diff --git a/drivers/char/tpm/tpm-chip.c b/drivers/char/tpm/tpm-chip.c
> index 46aa68756bac..42bce9bc41b1 100644
> --- a/drivers/char/tpm/tpm-chip.c
> +++ b/drivers/char/tpm/tpm-chip.c
> @@ -155,7 +155,13 @@ int tpm_try_get_ops(struct tpm_chip *chip)
>          goto out_lock;
> 
>      mutex_lock(&chip->tpm_mutex);
> -    return tpm_chip_start(chip);
> +    rc = tpm_chip_start(chip);
> +    if (rc)
> +        goto out_unlock;
> +    return 0;
> +
> +out_unlock:
> +    mutex_unlock(&chip->tpm_mutex);
>  out_lock:
>      up_read(&chip->ops_sem);
>      put_device(&chip->dev);
> diff --git a/drivers/char/tpm/tpm-interface.c
> b/drivers/char/tpm/tpm-interface.c
> index 5e3d5e95ea46..c3260ae8aca3 100644
> --- a/drivers/char/tpm/tpm-interface.c
> +++ b/drivers/char/tpm/tpm-interface.c
> @@ -167,6 +167,8 @@ ssize_t tpm_transmit(struct tpm_chip *chip, u8 *buf,
> size_t bufsiz)
>      for (;;) {
>          ret = tpm_try_transmit(chip, buf, bufsiz);
> 
> +        if (ret < 0)
> +            break;
>          rc = be32_to_cpu(header->return_code);
>          if (rc != TPM2_RC_RETRY && rc != TPM2_RC_TESTING)
>              break;
> 
> 
> 
> 
> 
> > 
> > 
> > [ 3003.838138] BUG: unable to handle kernel NULL pointer dereference at
> > 0000000000000000
> > [ 3003.838806] PGD 0 P4D 0
> > [ 3003.838806] Oops: 0010 [#1] SMP PTI
> > [ 3003.840394] CPU: 3 PID: 111 Comm: kworker/3:1 Not tainted 4.20.0-rc2+
> > #6
> > [ 3003.840394] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996),
> > BIOS rel-1.11.0-50-g14221cd-dirty-20181018_164544-sbct-4.pok.ibm.com
> > 04/01/2014
> > [ 3003.840394] Workqueue: tpm-vtpm vtpm_proxy_work
> > [ 3003.840394] RIP: 0010:          (null)
> > [ 3003.840394] Code: Bad RIP value.
> > [ 3003.840394] RSP: 0018:ffffa6e6816d7e10 EFLAGS: 00010246
> > [ 3003.840394] RAX: 00000000ffffffe0 RBX: ffff9698077ad000 RCX:
> > 0000000000000006
> > [ 3003.840394] RDX: 0000000000000000 RSI: 0000000000000000 RDI:
> > ffff9698077ad000
> > [ 3003.840394] RBP: ffff9698077ad000 R08: fffff59bc6172d08 R09:
> > 0000000000000000
> > [ 3003.840394] R10: 0000000000000000 R11: 0000000000000000 R12:
> > ffff9698b78f0700
> > [ 3003.840394] R13: ffff9698b78fbc00 R14: 0000000000000000 R15:
> > ffff9697f8ea10f8
> > [ 3003.840394] FS:  0000000000000000(0000) GS:ffff9698b78c0000(0000)
> > knlGS:0000000000000000
> > [ 3003.840394] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> > [ 3003.840394] CR2: ffffffffffffffd6 CR3: 0000000190606000 CR4:
> > 00000000000006e0
> > [ 3003.840394] Call Trace:
> > [ 3003.840394]  ? tpm_chip_start+0xb8/0xe0
> > [ 3003.840394]  ? tpm_chip_register+0x15/0x240
> > [ 3003.840394]  ? vtpm_proxy_work+0x15/0x30
> > [ 3003.840394]  ? process_one_work+0x237/0x5c0
> > [ 3003.840394]  ? worker_thread+0x1d5/0x390
> > [ 3003.840394]  ? process_one_work+0x5c0/0x5c0
> > [ 3003.840394]  ? kthread+0x11e/0x140
> > [ 3003.840394]  ? kthread_park+0x90/0x90
> > [ 3003.840394]  ? ret_from_fork+0x3a/0x50
> > [ 3003.840394] Modules linked in: xt_CHECKSUM ipt_MASQUERADE tun
> > nf_conntrack_netbios_ns nf_conntrack_broadcast xt_CT ip6t_rpfilter
> > ip6t_REJECT nf_reject_ipv6 xt_conntrack ip_set nfnetlink ebtable_nat
> > ebtable_broute bridge stp llc ip6table_nat nf_nat_ipv6 ip6table_mangle
> > ip6table_raw ip6table_security iptable_nat nf_nat_ipv4 nf_nat
> > nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 libcrc32c iptable_mangle
> > iptable_raw iptable_security ebtable_filter ebtables ip6table_filter
> > ip6_tables sunrpc virtio_gpu ttm drm_kms_helper drm joydev syscopyarea
> > sysfillrect sysimgblt pcspkr virtio_balloon i2c_piix4 fb_sys_fops
> > virtio_net net_failover virtio_console failover virtio_blk crc32c_intel
> > virtio_pci serio_raw ata_generic virtio_ring virtio pata_acpi floppy
> > qemu_fw_cfg
> > [ 3003.840394] CR2: 0000000000000000
> > [ 3003.840394] ---[ end trace 29e5990b605a7ccb ]---
> > [ 3003.840394] RIP: 0010:          (null)
> > [ 3003.840394] Code: Bad RIP value.
> > [ 3003.840394] RSP: 0018:ffffa6e6816d7e10 EFLAGS: 00010246
> > [ 3003.840394] RAX: 00000000ffffffe0 RBX: ffff9698077ad000 RCX:
> > 0000000000000006
> > [ 3003.840394] RDX: 0000000000000000 RSI: 0000000000000000 RDI:
> > ffff9698077ad000
> > [ 3003.840394] RBP: ffff9698077ad000 R08: fffff59bc6172d08 R09:
> > 0000000000000000
> > [ 3003.840394] R10: 0000000000000000 R11: 0000000000000000 R12:
> > ffff9698b78f0700
> > [ 3003.840394] R13: ffff9698b78fbc00 R14: 0000000000000000 R15:
> > ffff9697f8ea10f8
> > [ 3003.840394] FS:  0000000000000000(0000) GS:ffff9698b78c0000(0000)
> > knlGS:0000000000000000
> > [ 3003.840394] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> > [ 3003.840394] CR2: ffffffffffffffd6 CR3: 0000000190606000 CR4:
> > 00000000000006e0
> > [ 3003.840394] BUG: sleeping function called from invalid context at
> > ./include/linux/percpu-rwsem.h:34
> > [ 3003.840394] in_atomic(): 0, irqs_disabled(): 1, pid: 111, name:
> > kworker/3:1
> > [ 3003.840394] INFO: lockdep is turned off.
> > [ 3003.840394] irq event stamp: 165206
> > [ 3003.840394] hardirqs last  enabled at (165205): [<ffffffff8b220113>]
> > free_unref_page+0xf3/0x1f0
> > [ 3003.840394] hardirqs last disabled at (165206): [<ffffffff8b0019ee>]
> > trace_hardirqs_off_thunk+0x1a/0x1c
> > [ 3003.840394] softirqs last  enabled at (165182): [<ffffffff8b785e01>]
> > peernet2id+0x41/0x50
> > [ 3003.840394] softirqs last disabled at (165180): [<ffffffff8b785de2>]
> > peernet2id+0x22/0x50
> > [ 3003.840394] CPU: 3 PID: 111 Comm: kworker/3:1 Tainted: G D          
> > 4.20.0-rc2+ #6
> > [ 3003.840394] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996),
> > BIOS rel-1.11.0-50-g14221cd-dirty-20181018_164544-sbct-4.pok.ibm.com
> > 04/01/2014
> > [ 3003.840394] Workqueue: tpm-vtpm vtpm_proxy_work
> > [ 3003.840394] Call Trace:
> > [ 3003.840394]  dump_stack+0x67/0x9b
> > [ 3003.840394]  ___might_sleep+0x149/0x230
> > [ 3003.840394]  exit_signals+0x20/0x210
> > [ 3003.840394]  ? worker_thread+0x1d5/0x390
> > [ 3003.840394]  do_exit+0xa0/0xc70
> > [ 3003.840394]  ? process_one_work+0x5c0/0x5c0
> > [ 3003.840394]  ? kthread+0x11e/0x140
> > [ 3003.840394]  rewind_stack_do_exit+0x17/0x20
> > [ 3004.389582] tpm tpm1803: tpm_try_transmit: tpm_send: error -14
> > 
> > 
> > > 
> > > Signed-off-by: Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com>
> > > ---
> > >   drivers/char/tpm/tpm-chip.c      | 110 +++++++++++++++++++++++++++++++
> > >   drivers/char/tpm/tpm-interface.c |  87 +-----------------------
> > >   drivers/char/tpm/tpm.h           |   2 +
> > >   3 files changed, 115 insertions(+), 84 deletions(-)
> > > 
> > > diff --git a/drivers/char/tpm/tpm-chip.c b/drivers/char/tpm/tpm-chip.c
> > > index 157505b0f755..65f1561eba81 100644
> > > --- a/drivers/char/tpm/tpm-chip.c
> > > +++ b/drivers/char/tpm/tpm-chip.c
> > > @@ -37,6 +37,116 @@ struct class *tpm_class;
> > >   struct class *tpmrm_class;
> > >   dev_t tpm_devt;
> > > 
> > > +static int tpm_request_locality(struct tpm_chip *chip, unsigned int
> > > flags)
> > > +{
> > > +    int rc;
> > > +
> > > +    if (flags & TPM_TRANSMIT_NESTED)
> > > +        return 0;
> > > +
> > > +    if (!chip->ops->request_locality)
> > > +        return 0;
> > > +
> > > +    rc = chip->ops->request_locality(chip, 0);
> > > +    if (rc < 0)
> > > +        return rc;
> > > +
> > > +    chip->locality = rc;
> > > +    return 0;
> > > +}
> > > +
> > > +static void tpm_relinquish_locality(struct tpm_chip *chip, unsigned
> > > int flags)
> > > +{
> > > +    int rc;
> > > +
> > > +    if (flags & TPM_TRANSMIT_NESTED)
> > > +        return;
> > > +
> > > +    if (!chip->ops->relinquish_locality)
> > > +        return;
> > > +
> > > +    rc = chip->ops->relinquish_locality(chip, chip->locality);
> > > +    if (rc)
> > > +        dev_err(&chip->dev, "%s: : error %d\n", __func__, rc);
> > > +
> > > +    chip->locality = -1;
> > > +}
> > > +
> > > +static int tpm_cmd_ready(struct tpm_chip *chip, unsigned int flags)
> > > +{
> > > +    if (flags & TPM_TRANSMIT_NESTED)
> > > +        return 0;
> > > +
> > > +    if (!chip->ops->cmd_ready)
> > > +        return 0;
> > > +
> > > +    return chip->ops->cmd_ready(chip);
> > > +}
> > > +
> > > +static int tpm_go_idle(struct tpm_chip *chip, unsigned int flags)
> > > +{
> > > +    if (flags & TPM_TRANSMIT_NESTED)
> > > +        return 0;
> > > +
> > > +    if (!chip->ops->go_idle)
> > > +        return 0;
> > > +
> > > +    return chip->ops->go_idle(chip);
> > > +}
> > > +
> > > +/**
> > > + * tpm_chip_start() - power on the TPM
> > > + * @chip:    a TPM chip to use
> > > + * @flags:    TPM transmit flags
> > > + *
> > > + * Return:
> > > + * * The response length    - OK
> > > + * * -errno            - A system error
> > > + */
> > > +int tpm_chip_start(struct tpm_chip *chip, unsigned int flags)
> > > +{
> > > +    int ret;
> > > +
> > > +    if (chip->ops->clk_enable)
> > > +        chip->ops->clk_enable(chip, true);
> > > +
> > > +    if (chip->locality == -1) {
> > > +        ret = tpm_request_locality(chip, flags);
> > > +        if (ret) {
> > > +            chip->ops->clk_enable(chip, false);
> > > +            return ret;
> > > +        }
> > > +    }
> > > +
> > > +    ret = tpm_cmd_ready(chip, flags);
> > > +    if (ret) {
> > > +        tpm_relinquish_locality(chip, flags);
> > > +        if (chip->ops->clk_enable)
> > > +            chip->ops->clk_enable(chip, false);
> > > +        return ret;
> > > +    }
> > > +
> > > +    return 0;
> > > +}
> > > +
> > > +/**
> > > + * tpm_chip_stop() - power off the TPM
> > > + * @chip:    a TPM chip to use
> > > + * @flags:    TPM transmit flags
> > > + *
> > > + * Return:
> > > + * * The response length    - OK
> > > + * * -errno            - A system error
> > > + */
> > > +void tpm_chip_stop(struct tpm_chip *chip, unsigned int flags)
> > > +{
> > > +    tpm_go_idle(chip, flags);
> > > +    tpm_relinquish_locality(chip, flags);
> > > +    if (chip->ops->clk_enable)
> > > +        chip->ops->clk_enable(chip, false);
> > > +}
> > > +
> > > +
> > >   /**
> > >    * tpm_try_get_ops() - Get a ref to the tpm_chip
> > >    * @chip: Chip to ref
> > > diff --git a/drivers/char/tpm/tpm-interface.c
> > > b/drivers/char/tpm/tpm-interface.c
> > > index 5865b9671d20..888c9923fca1 100644
> > > --- a/drivers/char/tpm/tpm-interface.c
> > > +++ b/drivers/char/tpm/tpm-interface.c
> > > @@ -62,64 +62,6 @@ unsigned long tpm_calc_ordinal_duration(struct
> > > tpm_chip *chip, u32 ordinal)
> > >   }
> > >   EXPORT_SYMBOL_GPL(tpm_calc_ordinal_duration);
> > > 
> > > -static int tpm_request_locality(struct tpm_chip *chip, unsigned int
> > > flags)
> > > -{
> > > -    int rc;
> > > -
> > > -    if (flags & TPM_TRANSMIT_NESTED)
> > > -        return 0;
> > > -
> > > -    if (!chip->ops->request_locality)
> > > -        return 0;
> > > -
> > > -    rc = chip->ops->request_locality(chip, 0);
> > > -    if (rc < 0)
> > > -        return rc;
> > > -
> > > -    chip->locality = rc;
> > > -
> > > -    return 0;
> > > -}
> > > -
> > > -static void tpm_relinquish_locality(struct tpm_chip *chip, unsigned
> > > int flags)
> > > -{
> > > -    int rc;
> > > -
> > > -    if (flags & TPM_TRANSMIT_NESTED)
> > > -        return;
> > > -
> > > -    if (!chip->ops->relinquish_locality)
> > > -        return;
> > > -
> > > -    rc = chip->ops->relinquish_locality(chip, chip->locality);
> > > -    if (rc)
> > > -        dev_err(&chip->dev, "%s: : error %d\n", __func__, rc);
> > > -
> > > -    chip->locality = -1;
> > > -}
> > > -
> > > -static int tpm_cmd_ready(struct tpm_chip *chip, unsigned int flags)
> > > -{
> > > -    if (flags & TPM_TRANSMIT_NESTED)
> > > -        return 0;
> > > -
> > > -    if (!chip->ops->cmd_ready)
> > > -        return 0;
> > > -
> > > -    return chip->ops->cmd_ready(chip);
> > > -}
> > > -
> > > -static int tpm_go_idle(struct tpm_chip *chip, unsigned int flags)
> > > -{
> > > -    if (flags & TPM_TRANSMIT_NESTED)
> > > -        return 0;
> > > -
> > > -    if (!chip->ops->go_idle)
> > > -        return 0;
> > > -
> > > -    return chip->ops->go_idle(chip);
> > > -}
> > > -
> > >   static ssize_t tpm_try_transmit(struct tpm_chip *chip, u8 *buf,
> > > size_t bufsiz,
> > >                   unsigned int flags)
> > >   {
> > > @@ -212,7 +154,6 @@ ssize_t tpm_transmit(struct tpm_chip *chip, u8
> > > *buf, size_t bufsiz,
> > >       /* space for header and handles */
> > >       u8 save[TPM_HEADER_SIZE + 3*sizeof(u32)];
> > >       unsigned int delay_msec = TPM2_DURATION_SHORT;
> > > -    bool has_locality = false;
> > >       u32 rc = 0;
> > >       ssize_t ret;
> > >       const size_t save_size = min(sizeof(save), bufsiz);
> > > @@ -227,34 +168,12 @@ ssize_t tpm_transmit(struct tpm_chip *chip, u8
> > > *buf, size_t bufsiz,
> > >       memcpy(save, buf, save_size);
> > > 
> > >       for (;;) {
> > > -        if (chip->ops->clk_enable != NULL)
> > > -            chip->ops->clk_enable(chip, true);
> > > -
> > > -        if (chip->locality == -1) {
> > > -            ret = tpm_request_locality(chip, flags);
> > > -            if (ret)
> > > -                goto out_locality;
> > > -            has_locality = true;
> > > -        }
> > > -
> > > -        ret = tpm_cmd_ready(chip, flags);
> > > +        ret = tpm_chip_start(chip, flags);
> > >           if (ret)
> > > -            goto out_locality;
> > > -
> > > +            return ret;
> > >           ret = tpm_try_transmit(chip, buf, bufsiz, flags);
> > > +        tpm_chip_stop(chip, flags);
> > > 
> > > -        /* This may fail but do not override ret. */
> > > -        tpm_go_idle(chip, flags);
> > > -
> > > -out_locality:
> > > -        if (has_locality)
> > > -            tpm_relinquish_locality(chip, flags);
> > > -
> > > -        if (chip->ops->clk_enable != NULL)
> > > -            chip->ops->clk_enable(chip, false);
> > > -
> > > -        if (ret < 0)
> > > -            break;
> > >           rc = be32_to_cpu(header->return_code);
> > >           if (rc != TPM2_RC_RETRY && rc != TPM2_RC_TESTING)
> > >               break;
> > > diff --git a/drivers/char/tpm/tpm.h b/drivers/char/tpm/tpm.h
> > > index c7c06de651a0..c42a75710b70 100644
> > > --- a/drivers/char/tpm/tpm.h
> > > +++ b/drivers/char/tpm/tpm.h
> > > @@ -523,6 +523,8 @@ static inline void tpm_msleep(unsigned int
> > > delay_msec)
> > >                delay_msec * 1000);
> > >   };
> > > 
> > > +int tpm_chip_start(struct tpm_chip *chip, unsigned int flags);
> > > +void tpm_chip_stop(struct tpm_chip *chip, unsigned int flags);
> > >   struct tpm_chip *tpm_find_get_ops(struct tpm_chip *chip);
> > >   __must_check int tpm_try_get_ops(struct tpm_chip *chip);
> > >   void tpm_put_ops(struct tpm_chip *chip);
> > 
> > 
> 

Thank you!

/Jarkko
diff mbox series

Patch

diff --git a/drivers/char/tpm/tpm-chip.c b/drivers/char/tpm/tpm-chip.c
index 157505b0f755..65f1561eba81 100644
--- a/drivers/char/tpm/tpm-chip.c
+++ b/drivers/char/tpm/tpm-chip.c
@@ -37,6 +37,116 @@  struct class *tpm_class;
 struct class *tpmrm_class;
 dev_t tpm_devt;
 
+static int tpm_request_locality(struct tpm_chip *chip, unsigned int flags)
+{
+	int rc;
+
+	if (flags & TPM_TRANSMIT_NESTED)
+		return 0;
+
+	if (!chip->ops->request_locality)
+		return 0;
+
+	rc = chip->ops->request_locality(chip, 0);
+	if (rc < 0)
+		return rc;
+
+	chip->locality = rc;
+	return 0;
+}
+
+static void tpm_relinquish_locality(struct tpm_chip *chip, unsigned int flags)
+{
+	int rc;
+
+	if (flags & TPM_TRANSMIT_NESTED)
+		return;
+
+	if (!chip->ops->relinquish_locality)
+		return;
+
+	rc = chip->ops->relinquish_locality(chip, chip->locality);
+	if (rc)
+		dev_err(&chip->dev, "%s: : error %d\n", __func__, rc);
+
+	chip->locality = -1;
+}
+
+static int tpm_cmd_ready(struct tpm_chip *chip, unsigned int flags)
+{
+	if (flags & TPM_TRANSMIT_NESTED)
+		return 0;
+
+	if (!chip->ops->cmd_ready)
+		return 0;
+
+	return chip->ops->cmd_ready(chip);
+}
+
+static int tpm_go_idle(struct tpm_chip *chip, unsigned int flags)
+{
+	if (flags & TPM_TRANSMIT_NESTED)
+		return 0;
+
+	if (!chip->ops->go_idle)
+		return 0;
+
+	return chip->ops->go_idle(chip);
+}
+
+/**
+ * tpm_chip_start() - power on the TPM
+ * @chip:	a TPM chip to use
+ * @flags:	TPM transmit flags
+ *
+ * Return:
+ * * The response length	- OK
+ * * -errno			- A system error
+ */
+int tpm_chip_start(struct tpm_chip *chip, unsigned int flags)
+{
+	int ret;
+
+	if (chip->ops->clk_enable)
+		chip->ops->clk_enable(chip, true);
+
+	if (chip->locality == -1) {
+		ret = tpm_request_locality(chip, flags);
+		if (ret) {
+			chip->ops->clk_enable(chip, false);
+			return ret;
+		}
+	}
+
+	ret = tpm_cmd_ready(chip, flags);
+	if (ret) {
+		tpm_relinquish_locality(chip, flags);
+		if (chip->ops->clk_enable)
+			chip->ops->clk_enable(chip, false);
+		return ret;
+	}
+
+	return 0;
+}
+
+/**
+ * tpm_chip_stop() - power off the TPM
+ * @chip:	a TPM chip to use
+ * @flags:	TPM transmit flags
+ *
+ * Return:
+ * * The response length	- OK
+ * * -errno			- A system error
+ */
+void tpm_chip_stop(struct tpm_chip *chip, unsigned int flags)
+{
+	tpm_go_idle(chip, flags);
+	tpm_relinquish_locality(chip, flags);
+	if (chip->ops->clk_enable)
+		chip->ops->clk_enable(chip, false);
+}
+
+
 /**
  * tpm_try_get_ops() - Get a ref to the tpm_chip
  * @chip: Chip to ref
diff --git a/drivers/char/tpm/tpm-interface.c b/drivers/char/tpm/tpm-interface.c
index 5865b9671d20..888c9923fca1 100644
--- a/drivers/char/tpm/tpm-interface.c
+++ b/drivers/char/tpm/tpm-interface.c
@@ -62,64 +62,6 @@  unsigned long tpm_calc_ordinal_duration(struct tpm_chip *chip, u32 ordinal)
 }
 EXPORT_SYMBOL_GPL(tpm_calc_ordinal_duration);
 
-static int tpm_request_locality(struct tpm_chip *chip, unsigned int flags)
-{
-	int rc;
-
-	if (flags & TPM_TRANSMIT_NESTED)
-		return 0;
-
-	if (!chip->ops->request_locality)
-		return 0;
-
-	rc = chip->ops->request_locality(chip, 0);
-	if (rc < 0)
-		return rc;
-
-	chip->locality = rc;
-
-	return 0;
-}
-
-static void tpm_relinquish_locality(struct tpm_chip *chip, unsigned int flags)
-{
-	int rc;
-
-	if (flags & TPM_TRANSMIT_NESTED)
-		return;
-
-	if (!chip->ops->relinquish_locality)
-		return;
-
-	rc = chip->ops->relinquish_locality(chip, chip->locality);
-	if (rc)
-		dev_err(&chip->dev, "%s: : error %d\n", __func__, rc);
-
-	chip->locality = -1;
-}
-
-static int tpm_cmd_ready(struct tpm_chip *chip, unsigned int flags)
-{
-	if (flags & TPM_TRANSMIT_NESTED)
-		return 0;
-
-	if (!chip->ops->cmd_ready)
-		return 0;
-
-	return chip->ops->cmd_ready(chip);
-}
-
-static int tpm_go_idle(struct tpm_chip *chip, unsigned int flags)
-{
-	if (flags & TPM_TRANSMIT_NESTED)
-		return 0;
-
-	if (!chip->ops->go_idle)
-		return 0;
-
-	return chip->ops->go_idle(chip);
-}
-
 static ssize_t tpm_try_transmit(struct tpm_chip *chip, u8 *buf, size_t bufsiz,
 				unsigned int flags)
 {
@@ -212,7 +154,6 @@  ssize_t tpm_transmit(struct tpm_chip *chip, u8 *buf, size_t bufsiz,
 	/* space for header and handles */
 	u8 save[TPM_HEADER_SIZE + 3*sizeof(u32)];
 	unsigned int delay_msec = TPM2_DURATION_SHORT;
-	bool has_locality = false;
 	u32 rc = 0;
 	ssize_t ret;
 	const size_t save_size = min(sizeof(save), bufsiz);
@@ -227,34 +168,12 @@  ssize_t tpm_transmit(struct tpm_chip *chip, u8 *buf, size_t bufsiz,
 	memcpy(save, buf, save_size);
 
 	for (;;) {
-		if (chip->ops->clk_enable != NULL)
-			chip->ops->clk_enable(chip, true);
-
-		if (chip->locality == -1) {
-			ret = tpm_request_locality(chip, flags);
-			if (ret)
-				goto out_locality;
-			has_locality = true;
-		}
-
-		ret = tpm_cmd_ready(chip, flags);
+		ret = tpm_chip_start(chip, flags);
 		if (ret)
-			goto out_locality;
-
+			return ret;
 		ret = tpm_try_transmit(chip, buf, bufsiz, flags);
+		tpm_chip_stop(chip, flags);
 
-		/* This may fail but do not override ret. */
-		tpm_go_idle(chip, flags);
-
-out_locality:
-		if (has_locality)
-			tpm_relinquish_locality(chip, flags);
-
-		if (chip->ops->clk_enable != NULL)
-			chip->ops->clk_enable(chip, false);
-
-		if (ret < 0)
-			break;
 		rc = be32_to_cpu(header->return_code);
 		if (rc != TPM2_RC_RETRY && rc != TPM2_RC_TESTING)
 			break;
diff --git a/drivers/char/tpm/tpm.h b/drivers/char/tpm/tpm.h
index c7c06de651a0..c42a75710b70 100644
--- a/drivers/char/tpm/tpm.h
+++ b/drivers/char/tpm/tpm.h
@@ -523,6 +523,8 @@  static inline void tpm_msleep(unsigned int delay_msec)
 		     delay_msec * 1000);
 };
 
+int tpm_chip_start(struct tpm_chip *chip, unsigned int flags);
+void tpm_chip_stop(struct tpm_chip *chip, unsigned int flags);
 struct tpm_chip *tpm_find_get_ops(struct tpm_chip *chip);
 __must_check int tpm_try_get_ops(struct tpm_chip *chip);
 void tpm_put_ops(struct tpm_chip *chip);