Merge tpm 2017/10/19 v1

-----BEGIN PGP SIGNATURE-----
 
 iQEcBAABAgAGBQJZ6MfvAAoJEHWtZYAqC0IRWbQIAJ2PxlWGzc8s1EjgiGexRlfQ
 8dVDBhRhRZPp+OrrJwbnMQdOqjhdjsfzaJD4kXeokMdz2OkDQflC4DMbLVnCi5l3
 UZCommUtvrRBuNpVhxqude8BWM7Yc6GH4Y//52OyVeM3yZkE35LXwm/wtiEW2RUK
 E1XGT+OAN1Mnn6ocGGiEiZnD3noZrnfc6YOxlVGJOhgREo1Fg9W+pt1ecicA/bKe
 o2spHbZMh+l3ZXAg3/Fzp3T29XeMBUSgnQRyNJGDNYDRALwJhI1qi0akG3YKvnqn
 2MHzQQQwaHsEfObnhDPphm0h498gy4hx8kBWFUjsfHUxxznzQTLFk8sMmO232p8=
 =vEq0
 -----END PGP SIGNATURE-----

Merge remote-tracking branch 'remotes/stefanberger/tags/pull-tpm-2017-10-19-1' into staging

Merge tpm 2017/10/19 v1

# gpg: Signature made Thu 19 Oct 2017 16:42:39 BST
# gpg:                using RSA key 0x75AD65802A0B4211
# gpg: Good signature from "Stefan Berger <stefanb@linux.vnet.ibm.com>"
# gpg: WARNING: This key is not certified with a trusted signature!
# gpg:          There is no indication that the signature belongs to the owner.
# Primary key fingerprint: B818 B9CA DF90 89C2 D5CE  C66B 75AD 6580 2A0B 4211

* remotes/stefanberger/tags/pull-tpm-2017-10-19-1: (21 commits)
  tpm: move recv_data_callback to TPM interface
  tpm: add a QOM TPM interface
  tpm-tis: fold TPMTISEmuState in TPMState
  tpm-tis: remove tpm_tis.h header
  tpm-tis: move TPMState to TIS header
  tpm: remove locty_data from TPMState
  tpm-emulator: fix error handling
  tpm: add TPMBackendCmd to hold the request state
  tpm: remove locty argument from receive_cb
  tpm: remove needless cast
  tpm: remove unused TPMBackendCmd
  tpm: remove configure_tpm() hop
  tpm: remove init() class method
  tpm: remove TPMDriverOps
  tpm: move TPMSizedBuffer to tpm_tis.h
  tpm: remove tpm_register_driver()
  tpm: replace tpm_get_backend_driver() to drop be_drivers
  tpm: lookup tpm backend class in tpm_driver_find_by_type()
  tpm: make tpm_get_backend_driver() static
  tpm-tis: remove RAISE_STS_IRQ
  ...

Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
master
Peter Maydell 2017-10-20 10:49:55 +01:00
commit e67277f8f3
10 changed files with 379 additions and 483 deletions

View File

@ -17,6 +17,7 @@
#include "qapi/error.h" #include "qapi/error.h"
#include "qapi/qmp/qerror.h" #include "qapi/qmp/qerror.h"
#include "sysemu/tpm.h" #include "sysemu/tpm.h"
#include "hw/tpm/tpm_int.h"
#include "qemu/thread.h" #include "qemu/thread.h"
static void tpm_backend_worker_thread(gpointer data, gpointer user_data) static void tpm_backend_worker_thread(gpointer data, gpointer user_data)
@ -25,13 +26,12 @@ static void tpm_backend_worker_thread(gpointer data, gpointer user_data)
TPMBackendClass *k = TPM_BACKEND_GET_CLASS(s); TPMBackendClass *k = TPM_BACKEND_GET_CLASS(s);
assert(k->handle_request != NULL); assert(k->handle_request != NULL);
k->handle_request(s, (TPMBackendCmd)data); k->handle_request(s, (TPMBackendCmd *)data);
} }
static void tpm_backend_thread_end(TPMBackend *s) static void tpm_backend_thread_end(TPMBackend *s)
{ {
if (s->thread_pool) { if (s->thread_pool) {
g_thread_pool_push(s->thread_pool, (gpointer)TPM_BACKEND_CMD_END, NULL);
g_thread_pool_free(s->thread_pool, FALSE, TRUE); g_thread_pool_free(s->thread_pool, FALSE, TRUE);
s->thread_pool = NULL; s->thread_pool = NULL;
} }
@ -41,19 +41,15 @@ enum TpmType tpm_backend_get_type(TPMBackend *s)
{ {
TPMBackendClass *k = TPM_BACKEND_GET_CLASS(s); TPMBackendClass *k = TPM_BACKEND_GET_CLASS(s);
return k->ops->type; return k->type;
} }
int tpm_backend_init(TPMBackend *s, TPMState *state, int tpm_backend_init(TPMBackend *s, TPMState *state)
TPMRecvDataCB *datacb)
{ {
TPMBackendClass *k = TPM_BACKEND_GET_CLASS(s);
s->tpm_state = state; s->tpm_state = state;
s->recv_data_callback = datacb;
s->had_startup_error = false; s->had_startup_error = false;
return k->ops->init ? k->ops->init(s) : 0; return 0;
} }
int tpm_backend_startup_tpm(TPMBackend *s) int tpm_backend_startup_tpm(TPMBackend *s)
@ -66,9 +62,8 @@ int tpm_backend_startup_tpm(TPMBackend *s)
s->thread_pool = g_thread_pool_new(tpm_backend_worker_thread, s, 1, TRUE, s->thread_pool = g_thread_pool_new(tpm_backend_worker_thread, s, 1, TRUE,
NULL); NULL);
g_thread_pool_push(s->thread_pool, (gpointer)TPM_BACKEND_CMD_INIT, NULL);
res = k->ops->startup_tpm ? k->ops->startup_tpm(s) : 0; res = k->startup_tpm ? k->startup_tpm(s) : 0;
s->had_startup_error = (res != 0); s->had_startup_error = (res != 0);
@ -80,18 +75,17 @@ bool tpm_backend_had_startup_error(TPMBackend *s)
return s->had_startup_error; return s->had_startup_error;
} }
void tpm_backend_deliver_request(TPMBackend *s) void tpm_backend_deliver_request(TPMBackend *s, TPMBackendCmd *cmd)
{ {
g_thread_pool_push(s->thread_pool, (gpointer)TPM_BACKEND_CMD_PROCESS_CMD, g_thread_pool_push(s->thread_pool, cmd, NULL);
NULL);
} }
void tpm_backend_reset(TPMBackend *s) void tpm_backend_reset(TPMBackend *s)
{ {
TPMBackendClass *k = TPM_BACKEND_GET_CLASS(s); TPMBackendClass *k = TPM_BACKEND_GET_CLASS(s);
if (k->ops->reset) { if (k->reset) {
k->ops->reset(s); k->reset(s);
} }
tpm_backend_thread_end(s); tpm_backend_thread_end(s);
@ -103,34 +97,34 @@ void tpm_backend_cancel_cmd(TPMBackend *s)
{ {
TPMBackendClass *k = TPM_BACKEND_GET_CLASS(s); TPMBackendClass *k = TPM_BACKEND_GET_CLASS(s);
assert(k->ops->cancel_cmd); assert(k->cancel_cmd);
k->ops->cancel_cmd(s); k->cancel_cmd(s);
} }
bool tpm_backend_get_tpm_established_flag(TPMBackend *s) bool tpm_backend_get_tpm_established_flag(TPMBackend *s)
{ {
TPMBackendClass *k = TPM_BACKEND_GET_CLASS(s); TPMBackendClass *k = TPM_BACKEND_GET_CLASS(s);
return k->ops->get_tpm_established_flag ? return k->get_tpm_established_flag ?
k->ops->get_tpm_established_flag(s) : false; k->get_tpm_established_flag(s) : false;
} }
int tpm_backend_reset_tpm_established_flag(TPMBackend *s, uint8_t locty) int tpm_backend_reset_tpm_established_flag(TPMBackend *s, uint8_t locty)
{ {
TPMBackendClass *k = TPM_BACKEND_GET_CLASS(s); TPMBackendClass *k = TPM_BACKEND_GET_CLASS(s);
return k->ops->reset_tpm_established_flag ? return k->reset_tpm_established_flag ?
k->ops->reset_tpm_established_flag(s, locty) : 0; k->reset_tpm_established_flag(s, locty) : 0;
} }
TPMVersion tpm_backend_get_tpm_version(TPMBackend *s) TPMVersion tpm_backend_get_tpm_version(TPMBackend *s)
{ {
TPMBackendClass *k = TPM_BACKEND_GET_CLASS(s); TPMBackendClass *k = TPM_BACKEND_GET_CLASS(s);
assert(k->ops->get_tpm_version); assert(k->get_tpm_version);
return k->ops->get_tpm_version(s); return k->get_tpm_version(s);
} }
TPMInfo *tpm_backend_query_tpm(TPMBackend *s) TPMInfo *tpm_backend_query_tpm(TPMBackend *s)
@ -140,8 +134,9 @@ TPMInfo *tpm_backend_query_tpm(TPMBackend *s)
info->id = g_strdup(s->id); info->id = g_strdup(s->id);
info->model = s->fe_model; info->model = s->fe_model;
info->options = k->ops->get_tpm_options ? if (k->get_tpm_options) {
k->ops->get_tpm_options(s) : NULL; info->options = k->get_tpm_options(s);
}
return info; return info;
} }
@ -213,9 +208,16 @@ static const TypeInfo tpm_backend_info = {
.abstract = true, .abstract = true,
}; };
static const TypeInfo tpm_if_info = {
.name = TYPE_TPM_IF,
.parent = TYPE_INTERFACE,
.class_size = sizeof(TPMIfClass),
};
static void register_types(void) static void register_types(void)
{ {
type_register_static(&tpm_backend_info); type_register_static(&tpm_backend_info);
type_register_static(&tpm_if_info);
} }
type_init(register_types); type_init(register_types);

View File

@ -60,8 +60,6 @@
#define TPM_EMULATOR_IMPLEMENTS_ALL_CAPS(S, cap) (((S)->caps & (cap)) == (cap)) #define TPM_EMULATOR_IMPLEMENTS_ALL_CAPS(S, cap) (((S)->caps & (cap)) == (cap))
static const TPMDriverOps tpm_emulator_driver;
/* data structures */ /* data structures */
typedef struct TPMEmulator { typedef struct TPMEmulator {
TPMBackend parent; TPMBackend parent;
@ -143,7 +141,8 @@ static int tpm_emulator_unix_tx_bufs(TPMEmulator *tpm_emu,
return 0; return 0;
} }
static int tpm_emulator_set_locality(TPMEmulator *tpm_emu, uint8_t locty_number) static int tpm_emulator_set_locality(TPMEmulator *tpm_emu, uint8_t locty_number,
Error **errp)
{ {
ptm_loc loc; ptm_loc loc;
@ -157,15 +156,15 @@ static int tpm_emulator_set_locality(TPMEmulator *tpm_emu, uint8_t locty_number)
loc.u.req.loc = locty_number; loc.u.req.loc = locty_number;
if (tpm_emulator_ctrlcmd(&tpm_emu->ctrl_chr, CMD_SET_LOCALITY, &loc, if (tpm_emulator_ctrlcmd(&tpm_emu->ctrl_chr, CMD_SET_LOCALITY, &loc,
sizeof(loc), sizeof(loc)) < 0) { sizeof(loc), sizeof(loc)) < 0) {
error_report("tpm-emulator: could not set locality : %s", error_setg(errp, "tpm-emulator: could not set locality : %s",
strerror(errno)); strerror(errno));
return -1; return -1;
} }
loc.u.resp.tpm_result = be32_to_cpu(loc.u.resp.tpm_result); loc.u.resp.tpm_result = be32_to_cpu(loc.u.resp.tpm_result);
if (loc.u.resp.tpm_result != 0) { if (loc.u.resp.tpm_result != 0) {
error_report("tpm-emulator: TPM result for set locality : 0x%x", error_setg(errp, "tpm-emulator: TPM result for set locality : 0x%x",
loc.u.resp.tpm_result); loc.u.resp.tpm_result);
return -1; return -1;
} }
@ -174,39 +173,30 @@ static int tpm_emulator_set_locality(TPMEmulator *tpm_emu, uint8_t locty_number)
return 0; return 0;
} }
static void tpm_emulator_handle_request(TPMBackend *tb, TPMBackendCmd cmd) static void tpm_emulator_handle_request(TPMBackend *tb, TPMBackendCmd *cmd)
{ {
TPMEmulator *tpm_emu = TPM_EMULATOR(tb); TPMEmulator *tpm_emu = TPM_EMULATOR(tb);
TPMLocality *locty = NULL; TPMIfClass *tic = TPM_IF_GET_CLASS(tb->tpm_state);
bool selftest_done = false;
Error *err = NULL; Error *err = NULL;
DPRINTF("processing command type %d", cmd); DPRINTF("processing TPM command");
switch (cmd) { if (tpm_emulator_set_locality(tpm_emu, cmd->locty, &err) < 0) {
case TPM_BACKEND_CMD_PROCESS_CMD: goto error;
locty = tb->tpm_state->locty_data;
if (tpm_emulator_set_locality(tpm_emu,
tb->tpm_state->locty_number) < 0 ||
tpm_emulator_unix_tx_bufs(tpm_emu, locty->w_buffer.buffer,
locty->w_offset, locty->r_buffer.buffer,
locty->r_buffer.size, &selftest_done,
&err) < 0) {
tpm_util_write_fatal_error_response(locty->r_buffer.buffer,
locty->r_buffer.size);
error_report_err(err);
}
tb->recv_data_callback(tb->tpm_state, tb->tpm_state->locty_number,
selftest_done);
break;
case TPM_BACKEND_CMD_INIT:
case TPM_BACKEND_CMD_END:
case TPM_BACKEND_CMD_TPM_RESET:
/* nothing to do */
break;
} }
if (tpm_emulator_unix_tx_bufs(tpm_emu, cmd->in, cmd->in_len,
cmd->out, cmd->out_len,
&cmd->selftest_done, &err) < 0) {
goto error;
}
tic->request_completed(TPM_IF(tb->tpm_state));
return;
error:
tpm_util_write_fatal_error_response(cmd->out, cmd->out_len);
error_report_err(err);
} }
static int tpm_emulator_probe_caps(TPMEmulator *tpm_emu) static int tpm_emulator_probe_caps(TPMEmulator *tpm_emu)
@ -504,20 +494,6 @@ static const QemuOptDesc tpm_emulator_cmdline_opts[] = {
{ /* end of list */ }, { /* end of list */ },
}; };
static const TPMDriverOps tpm_emulator_driver = {
.type = TPM_TYPE_EMULATOR,
.opts = tpm_emulator_cmdline_opts,
.desc = "TPM emulator backend driver",
.create = tpm_emulator_create,
.startup_tpm = tpm_emulator_startup_tpm,
.cancel_cmd = tpm_emulator_cancel_cmd,
.get_tpm_established_flag = tpm_emulator_get_tpm_established_flag,
.reset_tpm_established_flag = tpm_emulator_reset_tpm_established_flag,
.get_tpm_version = tpm_emulator_get_tpm_version,
.get_tpm_options = tpm_emulator_get_tpm_options,
};
static void tpm_emulator_inst_init(Object *obj) static void tpm_emulator_inst_init(Object *obj)
{ {
TPMEmulator *tpm_emu = TPM_EMULATOR(obj); TPMEmulator *tpm_emu = TPM_EMULATOR(obj);
@ -565,7 +541,18 @@ static void tpm_emulator_inst_finalize(Object *obj)
static void tpm_emulator_class_init(ObjectClass *klass, void *data) static void tpm_emulator_class_init(ObjectClass *klass, void *data)
{ {
TPMBackendClass *tbc = TPM_BACKEND_CLASS(klass); TPMBackendClass *tbc = TPM_BACKEND_CLASS(klass);
tbc->ops = &tpm_emulator_driver;
tbc->type = TPM_TYPE_EMULATOR;
tbc->opts = tpm_emulator_cmdline_opts;
tbc->desc = "TPM emulator backend driver";
tbc->create = tpm_emulator_create;
tbc->startup_tpm = tpm_emulator_startup_tpm;
tbc->cancel_cmd = tpm_emulator_cancel_cmd;
tbc->get_tpm_established_flag = tpm_emulator_get_tpm_established_flag;
tbc->reset_tpm_established_flag = tpm_emulator_reset_tpm_established_flag;
tbc->get_tpm_version = tpm_emulator_get_tpm_version;
tbc->get_tpm_options = tpm_emulator_get_tpm_options;
tbc->handle_request = tpm_emulator_handle_request; tbc->handle_request = tpm_emulator_handle_request;
} }
@ -581,7 +568,6 @@ static const TypeInfo tpm_emulator_info = {
static void tpm_emulator_register(void) static void tpm_emulator_register(void)
{ {
type_register_static(&tpm_emulator_info); type_register_static(&tpm_emulator_info);
tpm_register_driver(&tpm_emulator_driver);
} }
type_init(tpm_emulator_register) type_init(tpm_emulator_register)

View File

@ -12,29 +12,29 @@
#ifndef TPM_TPM_INT_H #ifndef TPM_TPM_INT_H
#define TPM_TPM_INT_H #define TPM_TPM_INT_H
#include "exec/memory.h" #include "qemu/osdep.h"
#include "tpm_tis.h" #include "qom/object.h"
/* overall state of the TPM interface */ #define TYPE_TPM_IF "tpm-if"
struct TPMState { #define TPM_IF_CLASS(klass) \
ISADevice busdev; OBJECT_CLASS_CHECK(TPMIfClass, (klass), TYPE_TPM_IF)
MemoryRegion mmio; #define TPM_IF_GET_CLASS(obj) \
OBJECT_GET_CLASS(TPMIfClass, (obj), TYPE_TPM_IF)
#define TPM_IF(obj) \
INTERFACE_CHECK(TPMIf, (obj), TYPE_TPM_IF)
union { typedef struct TPMIf {
TPMTISEmuState tis; Object parent_obj;
} s; } TPMIf;
uint8_t locty_number; typedef struct TPMIfClass {
TPMLocality *locty_data; InterfaceClass parent_class;
char *backend; /* run in thread pool by backend */
TPMBackend *be_driver; void (*request_completed)(TPMIf *obj);
TPMVersion be_tpm_version; } TPMIfClass;
};
#define TPM(obj) OBJECT_CHECK(TPMState, (obj), TYPE_TPM_TIS) #define TPM_STANDARD_CMDLINE_OPTS \
#define TPM_STANDARD_CMDLINE_OPTS \
{ \ { \
.name = "type", \ .name = "type", \
.type = QEMU_OPT_STRING, \ .type = QEMU_OPT_STRING, \

View File

@ -31,7 +31,6 @@
#include "hw/hw.h" #include "hw/hw.h"
#include "hw/i386/pc.h" #include "hw/i386/pc.h"
#include "qapi/clone-visitor.h" #include "qapi/clone-visitor.h"
#include "tpm_tis.h"
#include "tpm_util.h" #include "tpm_util.h"
#define DEBUG_TPM 0 #define DEBUG_TPM 0
@ -96,7 +95,7 @@ static int tpm_passthrough_unix_tx_bufs(TPMPassthruState *tpm_pt,
is_selftest = tpm_util_is_selftest(in, in_len); is_selftest = tpm_util_is_selftest(in, in_len);
ret = qemu_write_full(tpm_pt->tpm_fd, (const void *)in, (size_t)in_len); ret = qemu_write_full(tpm_pt->tpm_fd, in, in_len);
if (ret != in_len) { if (ret != in_len) {
if (!tpm_pt->tpm_op_canceled || errno != ECANCELED) { if (!tpm_pt->tpm_op_canceled || errno != ECANCELED) {
error_report("tpm_passthrough: error while transmitting data " error_report("tpm_passthrough: error while transmitting data "
@ -137,41 +136,17 @@ err_exit:
return ret; return ret;
} }
static int tpm_passthrough_unix_transfer(TPMPassthruState *tpm_pt, static void tpm_passthrough_handle_request(TPMBackend *tb, TPMBackendCmd *cmd)
const TPMLocality *locty_data,
bool *selftest_done)
{
return tpm_passthrough_unix_tx_bufs(tpm_pt,
locty_data->w_buffer.buffer,
locty_data->w_offset,
locty_data->r_buffer.buffer,
locty_data->r_buffer.size,
selftest_done);
}
static void tpm_passthrough_handle_request(TPMBackend *tb, TPMBackendCmd cmd)
{ {
TPMPassthruState *tpm_pt = TPM_PASSTHROUGH(tb); TPMPassthruState *tpm_pt = TPM_PASSTHROUGH(tb);
bool selftest_done = false; TPMIfClass *tic = TPM_IF_GET_CLASS(tb->tpm_state);
DPRINTF("tpm_passthrough: processing command type %d\n", cmd); DPRINTF("tpm_passthrough: processing command %p\n", cmd);
switch (cmd) { tpm_passthrough_unix_tx_bufs(tpm_pt, cmd->in, cmd->in_len,
case TPM_BACKEND_CMD_PROCESS_CMD: cmd->out, cmd->out_len, &cmd->selftest_done);
tpm_passthrough_unix_transfer(tpm_pt,
tb->tpm_state->locty_data,
&selftest_done);
tb->recv_data_callback(tb->tpm_state, tic->request_completed(TPM_IF(tb->tpm_state));
tb->tpm_state->locty_number,
selftest_done);
break;
case TPM_BACKEND_CMD_INIT:
case TPM_BACKEND_CMD_END:
case TPM_BACKEND_CMD_TPM_RESET:
/* nothing to do */
break;
}
} }
static void tpm_passthrough_reset(TPMBackend *tb) static void tpm_passthrough_reset(TPMBackend *tb)
@ -365,19 +340,6 @@ static const QemuOptDesc tpm_passthrough_cmdline_opts[] = {
{ /* end of list */ }, { /* end of list */ },
}; };
static const TPMDriverOps tpm_passthrough_driver = {
.type = TPM_TYPE_PASSTHROUGH,
.opts = tpm_passthrough_cmdline_opts,
.desc = "Passthrough TPM backend driver",
.create = tpm_passthrough_create,
.reset = tpm_passthrough_reset,
.cancel_cmd = tpm_passthrough_cancel_cmd,
.get_tpm_established_flag = tpm_passthrough_get_tpm_established_flag,
.reset_tpm_established_flag = tpm_passthrough_reset_tpm_established_flag,
.get_tpm_version = tpm_passthrough_get_tpm_version,
.get_tpm_options = tpm_passthrough_get_tpm_options,
};
static void tpm_passthrough_inst_init(Object *obj) static void tpm_passthrough_inst_init(Object *obj)
{ {
TPMPassthruState *tpm_pt = TPM_PASSTHROUGH(obj); TPMPassthruState *tpm_pt = TPM_PASSTHROUGH(obj);
@ -402,7 +364,17 @@ static void tpm_passthrough_class_init(ObjectClass *klass, void *data)
{ {
TPMBackendClass *tbc = TPM_BACKEND_CLASS(klass); TPMBackendClass *tbc = TPM_BACKEND_CLASS(klass);
tbc->ops = &tpm_passthrough_driver; tbc->type = TPM_TYPE_PASSTHROUGH;
tbc->opts = tpm_passthrough_cmdline_opts;
tbc->desc = "Passthrough TPM backend driver";
tbc->create = tpm_passthrough_create;
tbc->reset = tpm_passthrough_reset;
tbc->cancel_cmd = tpm_passthrough_cancel_cmd;
tbc->get_tpm_established_flag = tpm_passthrough_get_tpm_established_flag;
tbc->reset_tpm_established_flag =
tpm_passthrough_reset_tpm_established_flag;
tbc->get_tpm_version = tpm_passthrough_get_tpm_version;
tbc->get_tpm_options = tpm_passthrough_get_tpm_options;
tbc->handle_request = tpm_passthrough_handle_request; tbc->handle_request = tpm_passthrough_handle_request;
} }
@ -418,7 +390,6 @@ static const TypeInfo tpm_passthrough_info = {
static void tpm_passthrough_register(void) static void tpm_passthrough_register(void)
{ {
type_register_static(&tpm_passthrough_info); type_register_static(&tpm_passthrough_info);
tpm_register_driver(&tpm_passthrough_driver);
} }
type_init(tpm_passthrough_register) type_init(tpm_passthrough_register)

View File

@ -23,6 +23,7 @@
*/ */
#include "qemu/osdep.h" #include "qemu/osdep.h"
#include "hw/isa/isa.h"
#include "sysemu/tpm_backend.h" #include "sysemu/tpm_backend.h"
#include "tpm_int.h" #include "tpm_int.h"
#include "sysemu/block-backend.h" #include "sysemu/block-backend.h"
@ -30,10 +31,73 @@
#include "hw/hw.h" #include "hw/hw.h"
#include "hw/i386/pc.h" #include "hw/i386/pc.h"
#include "hw/pci/pci_ids.h" #include "hw/pci/pci_ids.h"
#include "tpm_tis.h"
#include "qapi/error.h" #include "qapi/error.h"
#include "qemu-common.h" #include "qemu-common.h"
#include "qemu/main-loop.h" #include "qemu/main-loop.h"
#include "hw/acpi/tpm.h"
#define TPM_TIS_NUM_LOCALITIES 5 /* per spec */
#define TPM_TIS_LOCALITY_SHIFT 12
#define TPM_TIS_NO_LOCALITY 0xff
#define TPM_TIS_IS_VALID_LOCTY(x) ((x) < TPM_TIS_NUM_LOCALITIES)
#define TPM_TIS_BUFFER_MAX 4096
typedef enum {
TPM_TIS_STATE_IDLE = 0,
TPM_TIS_STATE_READY,
TPM_TIS_STATE_COMPLETION,
TPM_TIS_STATE_EXECUTION,
TPM_TIS_STATE_RECEPTION,
} TPMTISState;
typedef struct TPMSizedBuffer {
uint32_t size;
uint8_t *buffer;
} TPMSizedBuffer;
/* locality data -- all fields are persisted */
typedef struct TPMLocality {
TPMTISState state;
uint8_t access;
uint32_t sts;
uint32_t iface_id;
uint32_t inte;
uint32_t ints;
uint16_t w_offset;
uint16_t r_offset;
TPMSizedBuffer w_buffer;
TPMSizedBuffer r_buffer;
} TPMLocality;
struct TPMState {
ISADevice busdev;
MemoryRegion mmio;
QEMUBH *bh;
uint32_t offset;
uint8_t buf[TPM_TIS_BUFFER_MAX];
uint8_t active_locty;
uint8_t aborting_locty;
uint8_t next_locty;
TPMLocality loc[TPM_TIS_NUM_LOCALITIES];
qemu_irq irq;
uint32_t irq_num;
uint8_t locty_number;
TPMBackendCmd cmd;
char *backend;
TPMBackend *be_driver;
TPMVersion be_tpm_version;
};
#define TPM(obj) OBJECT_CHECK(TPMState, (obj), TYPE_TPM_TIS)
#define DEBUG_TIS 0 #define DEBUG_TIS 0
@ -43,9 +107,6 @@
} \ } \
} while (0); } while (0);
/* whether the STS interrupt is supported */
#define RAISE_STS_IRQ
/* tis registers */ /* tis registers */
#define TPM_TIS_REG_ACCESS 0x00 #define TPM_TIS_REG_ACCESS 0x00
#define TPM_TIS_REG_INT_ENABLE 0x08 #define TPM_TIS_REG_INT_ENABLE 0x08
@ -98,21 +159,11 @@
#define TPM_TIS_INT_POLARITY_MASK (3 << 3) #define TPM_TIS_INT_POLARITY_MASK (3 << 3)
#define TPM_TIS_INT_POLARITY_LOW_LEVEL (1 << 3) #define TPM_TIS_INT_POLARITY_LOW_LEVEL (1 << 3)
#ifndef RAISE_STS_IRQ
#define TPM_TIS_INTERRUPTS_SUPPORTED (TPM_TIS_INT_LOCALITY_CHANGED | \
TPM_TIS_INT_DATA_AVAILABLE | \
TPM_TIS_INT_COMMAND_READY)
#else
#define TPM_TIS_INTERRUPTS_SUPPORTED (TPM_TIS_INT_LOCALITY_CHANGED | \ #define TPM_TIS_INTERRUPTS_SUPPORTED (TPM_TIS_INT_LOCALITY_CHANGED | \
TPM_TIS_INT_DATA_AVAILABLE | \ TPM_TIS_INT_DATA_AVAILABLE | \
TPM_TIS_INT_STS_VALID | \ TPM_TIS_INT_STS_VALID | \
TPM_TIS_INT_COMMAND_READY) TPM_TIS_INT_COMMAND_READY)
#endif
#define TPM_TIS_CAP_INTERFACE_VERSION1_3 (2 << 28) #define TPM_TIS_CAP_INTERFACE_VERSION1_3 (2 << 28)
#define TPM_TIS_CAP_INTERFACE_VERSION1_3_FOR_TPM2_0 (3 << 28) #define TPM_TIS_CAP_INTERFACE_VERSION1_3_FOR_TPM2_0 (3 << 28)
#define TPM_TIS_CAP_DATA_TRANSFER_64B (3 << 9) #define TPM_TIS_CAP_DATA_TRANSFER_64B (3 << 9)
@ -215,36 +266,39 @@ static void tpm_tis_sts_set(TPMLocality *l, uint32_t flags)
*/ */
static void tpm_tis_tpm_send(TPMState *s, uint8_t locty) static void tpm_tis_tpm_send(TPMState *s, uint8_t locty)
{ {
TPMTISEmuState *tis = &s->s.tis; TPMLocality *locty_data = &s->loc[locty];
tpm_tis_show_buffer(&tis->loc[locty].w_buffer, "tpm_tis: To TPM"); tpm_tis_show_buffer(&s->loc[locty].w_buffer, "tpm_tis: To TPM");
s->locty_number = locty;
s->locty_data = &tis->loc[locty];
/* /*
* w_offset serves as length indicator for length of data; * w_offset serves as length indicator for length of data;
* it's reset when the response comes back * it's reset when the response comes back
*/ */
tis->loc[locty].state = TPM_TIS_STATE_EXECUTION; s->loc[locty].state = TPM_TIS_STATE_EXECUTION;
tpm_backend_deliver_request(s->be_driver); s->cmd = (TPMBackendCmd) {
.locty = locty,
.in = locty_data->w_buffer.buffer,
.in_len = locty_data->w_offset,
.out = locty_data->r_buffer.buffer,
.out_len = locty_data->r_buffer.size
};
tpm_backend_deliver_request(s->be_driver, &s->cmd);
} }
/* raise an interrupt if allowed */ /* raise an interrupt if allowed */
static void tpm_tis_raise_irq(TPMState *s, uint8_t locty, uint32_t irqmask) static void tpm_tis_raise_irq(TPMState *s, uint8_t locty, uint32_t irqmask)
{ {
TPMTISEmuState *tis = &s->s.tis;
if (!TPM_TIS_IS_VALID_LOCTY(locty)) { if (!TPM_TIS_IS_VALID_LOCTY(locty)) {
return; return;
} }
if ((tis->loc[locty].inte & TPM_TIS_INT_ENABLED) && if ((s->loc[locty].inte & TPM_TIS_INT_ENABLED) &&
(tis->loc[locty].inte & irqmask)) { (s->loc[locty].inte & irqmask)) {
DPRINTF("tpm_tis: Raising IRQ for flag %08x\n", irqmask); DPRINTF("tpm_tis: Raising IRQ for flag %08x\n", irqmask);
qemu_irq_raise(s->s.tis.irq); qemu_irq_raise(s->irq);
tis->loc[locty].ints |= irqmask; s->loc[locty].ints |= irqmask;
} }
} }
@ -256,7 +310,7 @@ static uint32_t tpm_tis_check_request_use_except(TPMState *s, uint8_t locty)
if (l == locty) { if (l == locty) {
continue; continue;
} }
if ((s->s.tis.loc[l].access & TPM_TIS_ACCESS_REQUEST_USE)) { if ((s->loc[l].access & TPM_TIS_ACCESS_REQUEST_USE)) {
return 1; return 1;
} }
} }
@ -266,14 +320,13 @@ static uint32_t tpm_tis_check_request_use_except(TPMState *s, uint8_t locty)
static void tpm_tis_new_active_locality(TPMState *s, uint8_t new_active_locty) static void tpm_tis_new_active_locality(TPMState *s, uint8_t new_active_locty)
{ {
TPMTISEmuState *tis = &s->s.tis; bool change = (s->active_locty != new_active_locty);
bool change = (s->s.tis.active_locty != new_active_locty);
bool is_seize; bool is_seize;
uint8_t mask; uint8_t mask;
if (change && TPM_TIS_IS_VALID_LOCTY(s->s.tis.active_locty)) { if (change && TPM_TIS_IS_VALID_LOCTY(s->active_locty)) {
is_seize = TPM_TIS_IS_VALID_LOCTY(new_active_locty) && is_seize = TPM_TIS_IS_VALID_LOCTY(new_active_locty) &&
tis->loc[new_active_locty].access & TPM_TIS_ACCESS_SEIZE; s->loc[new_active_locty].access & TPM_TIS_ACCESS_SEIZE;
if (is_seize) { if (is_seize) {
mask = ~(TPM_TIS_ACCESS_ACTIVE_LOCALITY); mask = ~(TPM_TIS_ACCESS_ACTIVE_LOCALITY);
@ -282,73 +335,70 @@ static void tpm_tis_new_active_locality(TPMState *s, uint8_t new_active_locty)
TPM_TIS_ACCESS_REQUEST_USE); TPM_TIS_ACCESS_REQUEST_USE);
} }
/* reset flags on the old active locality */ /* reset flags on the old active locality */
tis->loc[s->s.tis.active_locty].access &= mask; s->loc[s->active_locty].access &= mask;
if (is_seize) { if (is_seize) {
tis->loc[tis->active_locty].access |= TPM_TIS_ACCESS_BEEN_SEIZED; s->loc[s->active_locty].access |= TPM_TIS_ACCESS_BEEN_SEIZED;
} }
} }
tis->active_locty = new_active_locty; s->active_locty = new_active_locty;
DPRINTF("tpm_tis: Active locality is now %d\n", s->s.tis.active_locty); DPRINTF("tpm_tis: Active locality is now %d\n", s->active_locty);
if (TPM_TIS_IS_VALID_LOCTY(new_active_locty)) { if (TPM_TIS_IS_VALID_LOCTY(new_active_locty)) {
/* set flags on the new active locality */ /* set flags on the new active locality */
tis->loc[new_active_locty].access |= TPM_TIS_ACCESS_ACTIVE_LOCALITY; s->loc[new_active_locty].access |= TPM_TIS_ACCESS_ACTIVE_LOCALITY;
tis->loc[new_active_locty].access &= ~(TPM_TIS_ACCESS_REQUEST_USE | s->loc[new_active_locty].access &= ~(TPM_TIS_ACCESS_REQUEST_USE |
TPM_TIS_ACCESS_SEIZE); TPM_TIS_ACCESS_SEIZE);
} }
if (change) { if (change) {
tpm_tis_raise_irq(s, tis->active_locty, TPM_TIS_INT_LOCALITY_CHANGED); tpm_tis_raise_irq(s, s->active_locty, TPM_TIS_INT_LOCALITY_CHANGED);
} }
} }
/* abort -- this function switches the locality */ /* abort -- this function switches the locality */
static void tpm_tis_abort(TPMState *s, uint8_t locty) static void tpm_tis_abort(TPMState *s, uint8_t locty)
{ {
TPMTISEmuState *tis = &s->s.tis; s->loc[locty].r_offset = 0;
s->loc[locty].w_offset = 0;
tis->loc[locty].r_offset = 0; DPRINTF("tpm_tis: tis_abort: new active locality is %d\n", s->next_locty);
tis->loc[locty].w_offset = 0;
DPRINTF("tpm_tis: tis_abort: new active locality is %d\n", tis->next_locty);
/* /*
* Need to react differently depending on who's aborting now and * Need to react differently depending on who's aborting now and
* which locality will become active afterwards. * which locality will become active afterwards.
*/ */
if (tis->aborting_locty == tis->next_locty) { if (s->aborting_locty == s->next_locty) {
tis->loc[tis->aborting_locty].state = TPM_TIS_STATE_READY; s->loc[s->aborting_locty].state = TPM_TIS_STATE_READY;
tpm_tis_sts_set(&tis->loc[tis->aborting_locty], tpm_tis_sts_set(&s->loc[s->aborting_locty],
TPM_TIS_STS_COMMAND_READY); TPM_TIS_STS_COMMAND_READY);
tpm_tis_raise_irq(s, tis->aborting_locty, TPM_TIS_INT_COMMAND_READY); tpm_tis_raise_irq(s, s->aborting_locty, TPM_TIS_INT_COMMAND_READY);
} }
/* locality after abort is another one than the current one */ /* locality after abort is another one than the current one */
tpm_tis_new_active_locality(s, tis->next_locty); tpm_tis_new_active_locality(s, s->next_locty);
tis->next_locty = TPM_TIS_NO_LOCALITY; s->next_locty = TPM_TIS_NO_LOCALITY;
/* nobody's aborting a command anymore */ /* nobody's aborting a command anymore */
tis->aborting_locty = TPM_TIS_NO_LOCALITY; s->aborting_locty = TPM_TIS_NO_LOCALITY;
} }
/* prepare aborting current command */ /* prepare aborting current command */
static void tpm_tis_prep_abort(TPMState *s, uint8_t locty, uint8_t newlocty) static void tpm_tis_prep_abort(TPMState *s, uint8_t locty, uint8_t newlocty)
{ {
TPMTISEmuState *tis = &s->s.tis;
uint8_t busy_locty; uint8_t busy_locty;
tis->aborting_locty = locty; s->aborting_locty = locty;
tis->next_locty = newlocty; /* locality after successful abort */ s->next_locty = newlocty; /* locality after successful abort */
/* /*
* only abort a command using an interrupt if currently executing * only abort a command using an interrupt if currently executing
* a command AND if there's a valid connection to the vTPM. * a command AND if there's a valid connection to the vTPM.
*/ */
for (busy_locty = 0; busy_locty < TPM_TIS_NUM_LOCALITIES; busy_locty++) { for (busy_locty = 0; busy_locty < TPM_TIS_NUM_LOCALITIES; busy_locty++) {
if (tis->loc[busy_locty].state == TPM_TIS_STATE_EXECUTION) { if (s->loc[busy_locty].state == TPM_TIS_STATE_EXECUTION) {
/* /*
* request the backend to cancel. Some backends may not * request the backend to cancel. Some backends may not
* support it * support it
@ -364,45 +414,37 @@ static void tpm_tis_prep_abort(TPMState *s, uint8_t locty, uint8_t newlocty)
static void tpm_tis_receive_bh(void *opaque) static void tpm_tis_receive_bh(void *opaque)
{ {
TPMState *s = opaque; TPMState *s = opaque;
TPMTISEmuState *tis = &s->s.tis; uint8_t locty = s->cmd.locty;
uint8_t locty = s->locty_number;
tpm_tis_sts_set(&tis->loc[locty], tpm_tis_sts_set(&s->loc[locty],
TPM_TIS_STS_VALID | TPM_TIS_STS_DATA_AVAILABLE); TPM_TIS_STS_VALID | TPM_TIS_STS_DATA_AVAILABLE);
tis->loc[locty].state = TPM_TIS_STATE_COMPLETION; s->loc[locty].state = TPM_TIS_STATE_COMPLETION;
tis->loc[locty].r_offset = 0; s->loc[locty].r_offset = 0;
tis->loc[locty].w_offset = 0; s->loc[locty].w_offset = 0;
if (TPM_TIS_IS_VALID_LOCTY(tis->next_locty)) { if (TPM_TIS_IS_VALID_LOCTY(s->next_locty)) {
tpm_tis_abort(s, locty); tpm_tis_abort(s, locty);
} }
#ifndef RAISE_STS_IRQ
tpm_tis_raise_irq(s, locty, TPM_TIS_INT_DATA_AVAILABLE);
#else
tpm_tis_raise_irq(s, locty, tpm_tis_raise_irq(s, locty,
TPM_TIS_INT_DATA_AVAILABLE | TPM_TIS_INT_STS_VALID); TPM_TIS_INT_DATA_AVAILABLE | TPM_TIS_INT_STS_VALID);
#endif
} }
/* static void tpm_tis_request_completed(TPMIf *ti)
* Callback from the TPM to indicate that the response was received.
*/
static void tpm_tis_receive_cb(TPMState *s, uint8_t locty,
bool is_selftest_done)
{ {
TPMTISEmuState *tis = &s->s.tis; TPMState *s = TPM(ti);
uint8_t l;
assert(s->locty_number == locty); bool is_selftest_done = s->cmd.selftest_done;
uint8_t locty = s->cmd.locty;
uint8_t l;
if (is_selftest_done) { if (is_selftest_done) {
for (l = 0; l < TPM_TIS_NUM_LOCALITIES; l++) { for (l = 0; l < TPM_TIS_NUM_LOCALITIES; l++) {
tis->loc[locty].sts |= TPM_TIS_STS_SELFTEST_DONE; s->loc[locty].sts |= TPM_TIS_STS_SELFTEST_DONE;
} }
} }
qemu_bh_schedule(tis->bh); qemu_bh_schedule(s->bh);
} }
/* /*
@ -410,23 +452,20 @@ static void tpm_tis_receive_cb(TPMState *s, uint8_t locty,
*/ */
static uint32_t tpm_tis_data_read(TPMState *s, uint8_t locty) static uint32_t tpm_tis_data_read(TPMState *s, uint8_t locty)
{ {
TPMTISEmuState *tis = &s->s.tis;
uint32_t ret = TPM_TIS_NO_DATA_BYTE; uint32_t ret = TPM_TIS_NO_DATA_BYTE;
uint16_t len; uint16_t len;
if ((tis->loc[locty].sts & TPM_TIS_STS_DATA_AVAILABLE)) { if ((s->loc[locty].sts & TPM_TIS_STS_DATA_AVAILABLE)) {
len = tpm_tis_get_size_from_buffer(&tis->loc[locty].r_buffer); len = tpm_tis_get_size_from_buffer(&s->loc[locty].r_buffer);
ret = tis->loc[locty].r_buffer.buffer[tis->loc[locty].r_offset++]; ret = s->loc[locty].r_buffer.buffer[s->loc[locty].r_offset++];
if (tis->loc[locty].r_offset >= len) { if (s->loc[locty].r_offset >= len) {
/* got last byte */ /* got last byte */
tpm_tis_sts_set(&tis->loc[locty], TPM_TIS_STS_VALID); tpm_tis_sts_set(&s->loc[locty], TPM_TIS_STS_VALID);
#ifdef RAISE_STS_IRQ
tpm_tis_raise_irq(s, locty, TPM_TIS_INT_STS_VALID); tpm_tis_raise_irq(s, locty, TPM_TIS_INT_STS_VALID);
#endif
} }
DPRINTF("tpm_tis: tpm_tis_data_read byte 0x%02x [%d]\n", DPRINTF("tpm_tis: tpm_tis_data_read byte 0x%02x [%d]\n",
ret, tis->loc[locty].r_offset-1); ret, s->loc[locty].r_offset - 1);
} }
return ret; return ret;
@ -449,13 +488,12 @@ static void tpm_tis_dump_state(void *opaque, hwaddr addr)
uint8_t locty = tpm_tis_locality_from_addr(addr); uint8_t locty = tpm_tis_locality_from_addr(addr);
hwaddr base = addr & ~0xfff; hwaddr base = addr & ~0xfff;
TPMState *s = opaque; TPMState *s = opaque;
TPMTISEmuState *tis = &s->s.tis;
DPRINTF("tpm_tis: active locality : %d\n" DPRINTF("tpm_tis: active locality : %d\n"
"tpm_tis: state of locality %d : %d\n" "tpm_tis: state of locality %d : %d\n"
"tpm_tis: register dump:\n", "tpm_tis: register dump:\n",
tis->active_locty, s->active_locty,
locty, tis->loc[locty].state); locty, s->loc[locty].state);
for (idx = 0; regs[idx] != 0xfff; idx++) { for (idx = 0; regs[idx] != 0xfff; idx++) {
DPRINTF("tpm_tis: 0x%04x : 0x%08x\n", regs[idx], DPRINTF("tpm_tis: 0x%04x : 0x%08x\n", regs[idx],
@ -464,25 +502,25 @@ static void tpm_tis_dump_state(void *opaque, hwaddr addr)
DPRINTF("tpm_tis: read offset : %d\n" DPRINTF("tpm_tis: read offset : %d\n"
"tpm_tis: result buffer : ", "tpm_tis: result buffer : ",
tis->loc[locty].r_offset); s->loc[locty].r_offset);
for (idx = 0; for (idx = 0;
idx < tpm_tis_get_size_from_buffer(&tis->loc[locty].r_buffer); idx < tpm_tis_get_size_from_buffer(&s->loc[locty].r_buffer);
idx++) { idx++) {
DPRINTF("%c%02x%s", DPRINTF("%c%02x%s",
tis->loc[locty].r_offset == idx ? '>' : ' ', s->loc[locty].r_offset == idx ? '>' : ' ',
tis->loc[locty].r_buffer.buffer[idx], s->loc[locty].r_buffer.buffer[idx],
((idx & 0xf) == 0xf) ? "\ntpm_tis: " : ""); ((idx & 0xf) == 0xf) ? "\ntpm_tis: " : "");
} }
DPRINTF("\n" DPRINTF("\n"
"tpm_tis: write offset : %d\n" "tpm_tis: write offset : %d\n"
"tpm_tis: request buffer: ", "tpm_tis: request buffer: ",
tis->loc[locty].w_offset); s->loc[locty].w_offset);
for (idx = 0; for (idx = 0;
idx < tpm_tis_get_size_from_buffer(&tis->loc[locty].w_buffer); idx < tpm_tis_get_size_from_buffer(&s->loc[locty].w_buffer);
idx++) { idx++) {
DPRINTF("%c%02x%s", DPRINTF("%c%02x%s",
tis->loc[locty].w_offset == idx ? '>' : ' ', s->loc[locty].w_offset == idx ? '>' : ' ',
tis->loc[locty].w_buffer.buffer[idx], s->loc[locty].w_buffer.buffer[idx],
((idx & 0xf) == 0xf) ? "\ntpm_tis: " : ""); ((idx & 0xf) == 0xf) ? "\ntpm_tis: " : "");
} }
DPRINTF("\n"); DPRINTF("\n");
@ -497,7 +535,6 @@ static uint64_t tpm_tis_mmio_read(void *opaque, hwaddr addr,
unsigned size) unsigned size)
{ {
TPMState *s = opaque; TPMState *s = opaque;
TPMTISEmuState *tis = &s->s.tis;
uint16_t offset = addr & 0xffc; uint16_t offset = addr & 0xffc;
uint8_t shift = (addr & 0x3) * 8; uint8_t shift = (addr & 0x3) * 8;
uint32_t val = 0xffffffff; uint32_t val = 0xffffffff;
@ -512,7 +549,7 @@ static uint64_t tpm_tis_mmio_read(void *opaque, hwaddr addr,
switch (offset) { switch (offset) {
case TPM_TIS_REG_ACCESS: case TPM_TIS_REG_ACCESS:
/* never show the SEIZE flag even though we use it internally */ /* never show the SEIZE flag even though we use it internally */
val = tis->loc[locty].access & ~TPM_TIS_ACCESS_SEIZE; val = s->loc[locty].access & ~TPM_TIS_ACCESS_SEIZE;
/* the pending flag is always calculated */ /* the pending flag is always calculated */
if (tpm_tis_check_request_use_except(s, locty)) { if (tpm_tis_check_request_use_except(s, locty)) {
val |= TPM_TIS_ACCESS_PENDING_REQUEST; val |= TPM_TIS_ACCESS_PENDING_REQUEST;
@ -520,13 +557,13 @@ static uint64_t tpm_tis_mmio_read(void *opaque, hwaddr addr,
val |= !tpm_backend_get_tpm_established_flag(s->be_driver); val |= !tpm_backend_get_tpm_established_flag(s->be_driver);
break; break;
case TPM_TIS_REG_INT_ENABLE: case TPM_TIS_REG_INT_ENABLE:
val = tis->loc[locty].inte; val = s->loc[locty].inte;
break; break;
case TPM_TIS_REG_INT_VECTOR: case TPM_TIS_REG_INT_VECTOR:
val = tis->irq_num; val = s->irq_num;
break; break;
case TPM_TIS_REG_INT_STATUS: case TPM_TIS_REG_INT_STATUS:
val = tis->loc[locty].ints; val = s->loc[locty].ints;
break; break;
case TPM_TIS_REG_INTF_CAPABILITY: case TPM_TIS_REG_INTF_CAPABILITY:
switch (s->be_tpm_version) { switch (s->be_tpm_version) {
@ -542,14 +579,14 @@ static uint64_t tpm_tis_mmio_read(void *opaque, hwaddr addr,
} }
break; break;
case TPM_TIS_REG_STS: case TPM_TIS_REG_STS:
if (tis->active_locty == locty) { if (s->active_locty == locty) {
if ((tis->loc[locty].sts & TPM_TIS_STS_DATA_AVAILABLE)) { if ((s->loc[locty].sts & TPM_TIS_STS_DATA_AVAILABLE)) {
val = TPM_TIS_BURST_COUNT( val = TPM_TIS_BURST_COUNT(
tpm_tis_get_size_from_buffer(&tis->loc[locty].r_buffer) tpm_tis_get_size_from_buffer(&s->loc[locty].r_buffer)
- tis->loc[locty].r_offset) | tis->loc[locty].sts; - s->loc[locty].r_offset) | s->loc[locty].sts;
} else { } else {
avail = tis->loc[locty].w_buffer.size avail = s->loc[locty].w_buffer.size
- tis->loc[locty].w_offset; - s->loc[locty].w_offset;
/* /*
* byte-sized reads should not return 0x00 for 0x100 * byte-sized reads should not return 0x00 for 0x100
* available bytes. * available bytes.
@ -557,13 +594,13 @@ static uint64_t tpm_tis_mmio_read(void *opaque, hwaddr addr,
if (size == 1 && avail > 0xff) { if (size == 1 && avail > 0xff) {
avail = 0xff; avail = 0xff;
} }
val = TPM_TIS_BURST_COUNT(avail) | tis->loc[locty].sts; val = TPM_TIS_BURST_COUNT(avail) | s->loc[locty].sts;
} }
} }
break; break;
case TPM_TIS_REG_DATA_FIFO: case TPM_TIS_REG_DATA_FIFO:
case TPM_TIS_REG_DATA_XFIFO ... TPM_TIS_REG_DATA_XFIFO_END: case TPM_TIS_REG_DATA_XFIFO ... TPM_TIS_REG_DATA_XFIFO_END:
if (tis->active_locty == locty) { if (s->active_locty == locty) {
if (size > 4 - (addr & 0x3)) { if (size > 4 - (addr & 0x3)) {
/* prevent access beyond FIFO */ /* prevent access beyond FIFO */
size = 4 - (addr & 0x3); size = 4 - (addr & 0x3);
@ -571,7 +608,7 @@ static uint64_t tpm_tis_mmio_read(void *opaque, hwaddr addr,
val = 0; val = 0;
shift = 0; shift = 0;
while (size > 0) { while (size > 0) {
switch (tis->loc[locty].state) { switch (s->loc[locty].state) {
case TPM_TIS_STATE_COMPLETION: case TPM_TIS_STATE_COMPLETION:
v = tpm_tis_data_read(s, locty); v = tpm_tis_data_read(s, locty);
break; break;
@ -587,7 +624,7 @@ static uint64_t tpm_tis_mmio_read(void *opaque, hwaddr addr,
} }
break; break;
case TPM_TIS_REG_INTERFACE_ID: case TPM_TIS_REG_INTERFACE_ID:
val = tis->loc[locty].iface_id; val = s->loc[locty].iface_id;
break; break;
case TPM_TIS_REG_DID_VID: case TPM_TIS_REG_DID_VID:
val = (TPM_TIS_TPM_DID << 16) | TPM_TIS_TPM_VID; val = (TPM_TIS_TPM_DID << 16) | TPM_TIS_TPM_VID;
@ -615,12 +652,10 @@ static uint64_t tpm_tis_mmio_read(void *opaque, hwaddr addr,
* Write a value to a register of the TIS interface * Write a value to a register of the TIS interface
* See specs pages 33-63 for description of the registers * See specs pages 33-63 for description of the registers
*/ */
static void tpm_tis_mmio_write_intern(void *opaque, hwaddr addr, static void tpm_tis_mmio_write(void *opaque, hwaddr addr,
uint64_t val, unsigned size, uint64_t val, unsigned size)
bool hw_access)
{ {
TPMState *s = opaque; TPMState *s = opaque;
TPMTISEmuState *tis = &s->s.tis;
uint16_t off = addr & 0xffc; uint16_t off = addr & 0xffc;
uint8_t shift = (addr & 0x3) * 8; uint8_t shift = (addr & 0x3) * 8;
uint8_t locty = tpm_tis_locality_from_addr(addr); uint8_t locty = tpm_tis_locality_from_addr(addr);
@ -631,7 +666,7 @@ static void tpm_tis_mmio_write_intern(void *opaque, hwaddr addr,
DPRINTF("tpm_tis: write.%u(%08x) = %08x\n", size, (int)addr, (int)val); DPRINTF("tpm_tis: write.%u(%08x) = %08x\n", size, (int)addr, (int)val);
if (locty == 4 && !hw_access) { if (locty == 4) {
DPRINTF("tpm_tis: Access to locality 4 only allowed from hardware\n"); DPRINTF("tpm_tis: Access to locality 4 only allowed from hardware\n");
return; return;
} }
@ -657,17 +692,17 @@ static void tpm_tis_mmio_write_intern(void *opaque, hwaddr addr,
TPM_TIS_ACCESS_ACTIVE_LOCALITY); TPM_TIS_ACCESS_ACTIVE_LOCALITY);
} }
active_locty = tis->active_locty; active_locty = s->active_locty;
if ((val & TPM_TIS_ACCESS_ACTIVE_LOCALITY)) { if ((val & TPM_TIS_ACCESS_ACTIVE_LOCALITY)) {
/* give up locality if currently owned */ /* give up locality if currently owned */
if (tis->active_locty == locty) { if (s->active_locty == locty) {
DPRINTF("tpm_tis: Releasing locality %d\n", locty); DPRINTF("tpm_tis: Releasing locality %d\n", locty);
uint8_t newlocty = TPM_TIS_NO_LOCALITY; uint8_t newlocty = TPM_TIS_NO_LOCALITY;
/* anybody wants the locality ? */ /* anybody wants the locality ? */
for (c = TPM_TIS_NUM_LOCALITIES - 1; c >= 0; c--) { for (c = TPM_TIS_NUM_LOCALITIES - 1; c >= 0; c--) {
if ((tis->loc[c].access & TPM_TIS_ACCESS_REQUEST_USE)) { if ((s->loc[c].access & TPM_TIS_ACCESS_REQUEST_USE)) {
DPRINTF("tpm_tis: Locality %d requests use.\n", c); DPRINTF("tpm_tis: Locality %d requests use.\n", c);
newlocty = c; newlocty = c;
break; break;
@ -685,12 +720,12 @@ static void tpm_tis_mmio_write_intern(void *opaque, hwaddr addr,
} }
} else { } else {
/* not currently the owner; clear a pending request */ /* not currently the owner; clear a pending request */
tis->loc[locty].access &= ~TPM_TIS_ACCESS_REQUEST_USE; s->loc[locty].access &= ~TPM_TIS_ACCESS_REQUEST_USE;
} }
} }
if ((val & TPM_TIS_ACCESS_BEEN_SEIZED)) { if ((val & TPM_TIS_ACCESS_BEEN_SEIZED)) {
tis->loc[locty].access &= ~TPM_TIS_ACCESS_BEEN_SEIZED; s->loc[locty].access &= ~TPM_TIS_ACCESS_BEEN_SEIZED;
} }
if ((val & TPM_TIS_ACCESS_SEIZE)) { if ((val & TPM_TIS_ACCESS_SEIZE)) {
@ -701,19 +736,19 @@ static void tpm_tis_mmio_write_intern(void *opaque, hwaddr addr,
* allow seize for requesting locality if no locality is * allow seize for requesting locality if no locality is
* active * active
*/ */
while ((TPM_TIS_IS_VALID_LOCTY(tis->active_locty) && while ((TPM_TIS_IS_VALID_LOCTY(s->active_locty) &&
locty > tis->active_locty) || locty > s->active_locty) ||
!TPM_TIS_IS_VALID_LOCTY(tis->active_locty)) { !TPM_TIS_IS_VALID_LOCTY(s->active_locty)) {
bool higher_seize = FALSE; bool higher_seize = FALSE;
/* already a pending SEIZE ? */ /* already a pending SEIZE ? */
if ((tis->loc[locty].access & TPM_TIS_ACCESS_SEIZE)) { if ((s->loc[locty].access & TPM_TIS_ACCESS_SEIZE)) {
break; break;
} }
/* check for ongoing seize by a higher locality */ /* check for ongoing seize by a higher locality */
for (l = locty + 1; l < TPM_TIS_NUM_LOCALITIES; l++) { for (l = locty + 1; l < TPM_TIS_NUM_LOCALITIES; l++) {
if ((tis->loc[l].access & TPM_TIS_ACCESS_SEIZE)) { if ((s->loc[l].access & TPM_TIS_ACCESS_SEIZE)) {
higher_seize = TRUE; higher_seize = TRUE;
break; break;
} }
@ -725,24 +760,24 @@ static void tpm_tis_mmio_write_intern(void *opaque, hwaddr addr,
/* cancel any seize by a lower locality */ /* cancel any seize by a lower locality */
for (l = 0; l < locty - 1; l++) { for (l = 0; l < locty - 1; l++) {
tis->loc[l].access &= ~TPM_TIS_ACCESS_SEIZE; s->loc[l].access &= ~TPM_TIS_ACCESS_SEIZE;
} }
tis->loc[locty].access |= TPM_TIS_ACCESS_SEIZE; s->loc[locty].access |= TPM_TIS_ACCESS_SEIZE;
DPRINTF("tpm_tis: TPM_TIS_ACCESS_SEIZE: " DPRINTF("tpm_tis: TPM_TIS_ACCESS_SEIZE: "
"Locality %d seized from locality %d\n", "Locality %d seized from locality %d\n",
locty, tis->active_locty); locty, s->active_locty);
DPRINTF("tpm_tis: TPM_TIS_ACCESS_SEIZE: Initiating abort.\n"); DPRINTF("tpm_tis: TPM_TIS_ACCESS_SEIZE: Initiating abort.\n");
set_new_locty = 0; set_new_locty = 0;
tpm_tis_prep_abort(s, tis->active_locty, locty); tpm_tis_prep_abort(s, s->active_locty, locty);
break; break;
} }
} }
if ((val & TPM_TIS_ACCESS_REQUEST_USE)) { if ((val & TPM_TIS_ACCESS_REQUEST_USE)) {
if (tis->active_locty != locty) { if (s->active_locty != locty) {
if (TPM_TIS_IS_VALID_LOCTY(tis->active_locty)) { if (TPM_TIS_IS_VALID_LOCTY(s->active_locty)) {
tis->loc[locty].access |= TPM_TIS_ACCESS_REQUEST_USE; s->loc[locty].access |= TPM_TIS_ACCESS_REQUEST_USE;
} else { } else {
/* no locality active -> make this one active now */ /* no locality active -> make this one active now */
active_locty = locty; active_locty = locty;
@ -756,12 +791,12 @@ static void tpm_tis_mmio_write_intern(void *opaque, hwaddr addr,
break; break;
case TPM_TIS_REG_INT_ENABLE: case TPM_TIS_REG_INT_ENABLE:
if (tis->active_locty != locty) { if (s->active_locty != locty) {
break; break;
} }
tis->loc[locty].inte &= mask; s->loc[locty].inte &= mask;
tis->loc[locty].inte |= (val & (TPM_TIS_INT_ENABLED | s->loc[locty].inte |= (val & (TPM_TIS_INT_ENABLED |
TPM_TIS_INT_POLARITY_MASK | TPM_TIS_INT_POLARITY_MASK |
TPM_TIS_INTERRUPTS_SUPPORTED)); TPM_TIS_INTERRUPTS_SUPPORTED));
break; break;
@ -769,30 +804,30 @@ static void tpm_tis_mmio_write_intern(void *opaque, hwaddr addr,
/* hard wired -- ignore */ /* hard wired -- ignore */
break; break;
case TPM_TIS_REG_INT_STATUS: case TPM_TIS_REG_INT_STATUS:
if (tis->active_locty != locty) { if (s->active_locty != locty) {
break; break;
} }
/* clearing of interrupt flags */ /* clearing of interrupt flags */
if (((val & TPM_TIS_INTERRUPTS_SUPPORTED)) && if (((val & TPM_TIS_INTERRUPTS_SUPPORTED)) &&
(tis->loc[locty].ints & TPM_TIS_INTERRUPTS_SUPPORTED)) { (s->loc[locty].ints & TPM_TIS_INTERRUPTS_SUPPORTED)) {
tis->loc[locty].ints &= ~val; s->loc[locty].ints &= ~val;
if (tis->loc[locty].ints == 0) { if (s->loc[locty].ints == 0) {
qemu_irq_lower(tis->irq); qemu_irq_lower(s->irq);
DPRINTF("tpm_tis: Lowering IRQ\n"); DPRINTF("tpm_tis: Lowering IRQ\n");
} }
} }
tis->loc[locty].ints &= ~(val & TPM_TIS_INTERRUPTS_SUPPORTED); s->loc[locty].ints &= ~(val & TPM_TIS_INTERRUPTS_SUPPORTED);
break; break;
case TPM_TIS_REG_STS: case TPM_TIS_REG_STS:
if (tis->active_locty != locty) { if (s->active_locty != locty) {
break; break;
} }
if (s->be_tpm_version == TPM_VERSION_2_0) { if (s->be_tpm_version == TPM_VERSION_2_0) {
/* some flags that are only supported for TPM 2 */ /* some flags that are only supported for TPM 2 */
if (val & TPM_TIS_STS_COMMAND_CANCEL) { if (val & TPM_TIS_STS_COMMAND_CANCEL) {
if (tis->loc[locty].state == TPM_TIS_STATE_EXECUTION) { if (s->loc[locty].state == TPM_TIS_STATE_EXECUTION) {
/* /*
* request the backend to cancel. Some backends may not * request the backend to cancel. Some backends may not
* support it * support it
@ -812,16 +847,16 @@ static void tpm_tis_mmio_write_intern(void *opaque, hwaddr addr,
TPM_TIS_STS_RESPONSE_RETRY); TPM_TIS_STS_RESPONSE_RETRY);
if (val == TPM_TIS_STS_COMMAND_READY) { if (val == TPM_TIS_STS_COMMAND_READY) {
switch (tis->loc[locty].state) { switch (s->loc[locty].state) {
case TPM_TIS_STATE_READY: case TPM_TIS_STATE_READY:
tis->loc[locty].w_offset = 0; s->loc[locty].w_offset = 0;
tis->loc[locty].r_offset = 0; s->loc[locty].r_offset = 0;
break; break;
case TPM_TIS_STATE_IDLE: case TPM_TIS_STATE_IDLE:
tpm_tis_sts_set(&tis->loc[locty], TPM_TIS_STS_COMMAND_READY); tpm_tis_sts_set(&s->loc[locty], TPM_TIS_STS_COMMAND_READY);
tis->loc[locty].state = TPM_TIS_STATE_READY; s->loc[locty].state = TPM_TIS_STATE_READY;
tpm_tis_raise_irq(s, locty, TPM_TIS_INT_COMMAND_READY); tpm_tis_raise_irq(s, locty, TPM_TIS_INT_COMMAND_READY);
break; break;
@ -834,23 +869,23 @@ static void tpm_tis_mmio_write_intern(void *opaque, hwaddr addr,
break; break;
case TPM_TIS_STATE_COMPLETION: case TPM_TIS_STATE_COMPLETION:
tis->loc[locty].w_offset = 0; s->loc[locty].w_offset = 0;
tis->loc[locty].r_offset = 0; s->loc[locty].r_offset = 0;
/* shortcut to ready state with C/R set */ /* shortcut to ready state with C/R set */
tis->loc[locty].state = TPM_TIS_STATE_READY; s->loc[locty].state = TPM_TIS_STATE_READY;
if (!(tis->loc[locty].sts & TPM_TIS_STS_COMMAND_READY)) { if (!(s->loc[locty].sts & TPM_TIS_STS_COMMAND_READY)) {
tpm_tis_sts_set(&tis->loc[locty], tpm_tis_sts_set(&s->loc[locty],
TPM_TIS_STS_COMMAND_READY); TPM_TIS_STS_COMMAND_READY);
tpm_tis_raise_irq(s, locty, TPM_TIS_INT_COMMAND_READY); tpm_tis_raise_irq(s, locty, TPM_TIS_INT_COMMAND_READY);
} }
tis->loc[locty].sts &= ~(TPM_TIS_STS_DATA_AVAILABLE); s->loc[locty].sts &= ~(TPM_TIS_STS_DATA_AVAILABLE);
break; break;
} }
} else if (val == TPM_TIS_STS_TPM_GO) { } else if (val == TPM_TIS_STS_TPM_GO) {
switch (tis->loc[locty].state) { switch (s->loc[locty].state) {
case TPM_TIS_STATE_RECEPTION: case TPM_TIS_STATE_RECEPTION:
if ((tis->loc[locty].sts & TPM_TIS_STS_EXPECT) == 0) { if ((s->loc[locty].sts & TPM_TIS_STS_EXPECT) == 0) {
tpm_tis_tpm_send(s, locty); tpm_tis_tpm_send(s, locty);
} }
break; break;
@ -859,10 +894,10 @@ static void tpm_tis_mmio_write_intern(void *opaque, hwaddr addr,
break; break;
} }
} else if (val == TPM_TIS_STS_RESPONSE_RETRY) { } else if (val == TPM_TIS_STS_RESPONSE_RETRY) {
switch (tis->loc[locty].state) { switch (s->loc[locty].state) {
case TPM_TIS_STATE_COMPLETION: case TPM_TIS_STATE_COMPLETION:
tis->loc[locty].r_offset = 0; s->loc[locty].r_offset = 0;
tpm_tis_sts_set(&tis->loc[locty], tpm_tis_sts_set(&s->loc[locty],
TPM_TIS_STS_VALID| TPM_TIS_STS_VALID|
TPM_TIS_STS_DATA_AVAILABLE); TPM_TIS_STS_DATA_AVAILABLE);
break; break;
@ -875,20 +910,20 @@ static void tpm_tis_mmio_write_intern(void *opaque, hwaddr addr,
case TPM_TIS_REG_DATA_FIFO: case TPM_TIS_REG_DATA_FIFO:
case TPM_TIS_REG_DATA_XFIFO ... TPM_TIS_REG_DATA_XFIFO_END: case TPM_TIS_REG_DATA_XFIFO ... TPM_TIS_REG_DATA_XFIFO_END:
/* data fifo */ /* data fifo */
if (tis->active_locty != locty) { if (s->active_locty != locty) {
break; break;
} }
if (tis->loc[locty].state == TPM_TIS_STATE_IDLE || if (s->loc[locty].state == TPM_TIS_STATE_IDLE ||
tis->loc[locty].state == TPM_TIS_STATE_EXECUTION || s->loc[locty].state == TPM_TIS_STATE_EXECUTION ||
tis->loc[locty].state == TPM_TIS_STATE_COMPLETION) { s->loc[locty].state == TPM_TIS_STATE_COMPLETION) {
/* drop the byte */ /* drop the byte */
} else { } else {
DPRINTF("tpm_tis: Data to send to TPM: %08x (size=%d)\n", DPRINTF("tpm_tis: Data to send to TPM: %08x (size=%d)\n",
(int)val, size); (int)val, size);
if (tis->loc[locty].state == TPM_TIS_STATE_READY) { if (s->loc[locty].state == TPM_TIS_STATE_READY) {
tis->loc[locty].state = TPM_TIS_STATE_RECEPTION; s->loc[locty].state = TPM_TIS_STATE_RECEPTION;
tpm_tis_sts_set(&tis->loc[locty], tpm_tis_sts_set(&s->loc[locty],
TPM_TIS_STS_EXPECT | TPM_TIS_STS_VALID); TPM_TIS_STS_EXPECT | TPM_TIS_STS_VALID);
} }
@ -898,56 +933,47 @@ static void tpm_tis_mmio_write_intern(void *opaque, hwaddr addr,
size = 4 - (addr & 0x3); size = 4 - (addr & 0x3);
} }
while ((tis->loc[locty].sts & TPM_TIS_STS_EXPECT) && size > 0) { while ((s->loc[locty].sts & TPM_TIS_STS_EXPECT) && size > 0) {
if (tis->loc[locty].w_offset < tis->loc[locty].w_buffer.size) { if (s->loc[locty].w_offset < s->loc[locty].w_buffer.size) {
tis->loc[locty].w_buffer. s->loc[locty].w_buffer.
buffer[tis->loc[locty].w_offset++] = (uint8_t)val; buffer[s->loc[locty].w_offset++] = (uint8_t)val;
val >>= 8; val >>= 8;
size--; size--;
} else { } else {
tpm_tis_sts_set(&tis->loc[locty], TPM_TIS_STS_VALID); tpm_tis_sts_set(&s->loc[locty], TPM_TIS_STS_VALID);
} }
} }
/* check for complete packet */ /* check for complete packet */
if (tis->loc[locty].w_offset > 5 && if (s->loc[locty].w_offset > 5 &&
(tis->loc[locty].sts & TPM_TIS_STS_EXPECT)) { (s->loc[locty].sts & TPM_TIS_STS_EXPECT)) {
/* we have a packet length - see if we have all of it */ /* we have a packet length - see if we have all of it */
#ifdef RAISE_STS_IRQ bool need_irq = !(s->loc[locty].sts & TPM_TIS_STS_VALID);
bool need_irq = !(tis->loc[locty].sts & TPM_TIS_STS_VALID);
#endif len = tpm_tis_get_size_from_buffer(&s->loc[locty].w_buffer);
len = tpm_tis_get_size_from_buffer(&tis->loc[locty].w_buffer); if (len > s->loc[locty].w_offset) {
if (len > tis->loc[locty].w_offset) { tpm_tis_sts_set(&s->loc[locty],
tpm_tis_sts_set(&tis->loc[locty],
TPM_TIS_STS_EXPECT | TPM_TIS_STS_VALID); TPM_TIS_STS_EXPECT | TPM_TIS_STS_VALID);
} else { } else {
/* packet complete */ /* packet complete */
tpm_tis_sts_set(&tis->loc[locty], TPM_TIS_STS_VALID); tpm_tis_sts_set(&s->loc[locty], TPM_TIS_STS_VALID);
} }
#ifdef RAISE_STS_IRQ
if (need_irq) { if (need_irq) {
tpm_tis_raise_irq(s, locty, TPM_TIS_INT_STS_VALID); tpm_tis_raise_irq(s, locty, TPM_TIS_INT_STS_VALID);
} }
#endif
} }
} }
break; break;
case TPM_TIS_REG_INTERFACE_ID: case TPM_TIS_REG_INTERFACE_ID:
if (val & TPM_TIS_IFACE_ID_INT_SEL_LOCK) { if (val & TPM_TIS_IFACE_ID_INT_SEL_LOCK) {
for (l = 0; l < TPM_TIS_NUM_LOCALITIES; l++) { for (l = 0; l < TPM_TIS_NUM_LOCALITIES; l++) {
tis->loc[l].iface_id |= TPM_TIS_IFACE_ID_INT_SEL_LOCK; s->loc[l].iface_id |= TPM_TIS_IFACE_ID_INT_SEL_LOCK;
} }
} }
break; break;
} }
} }
static void tpm_tis_mmio_write(void *opaque, hwaddr addr,
uint64_t val, unsigned size)
{
tpm_tis_mmio_write_intern(opaque, addr, val, size, false);
}
static const MemoryRegionOps tpm_tis_memory_ops = { static const MemoryRegionOps tpm_tis_memory_ops = {
.read = tpm_tis_mmio_read, .read = tpm_tis_mmio_read,
.write = tpm_tis_mmio_write, .write = tpm_tis_mmio_write,
@ -990,39 +1016,38 @@ TPMVersion tpm_tis_get_tpm_version(Object *obj)
static void tpm_tis_reset(DeviceState *dev) static void tpm_tis_reset(DeviceState *dev)
{ {
TPMState *s = TPM(dev); TPMState *s = TPM(dev);
TPMTISEmuState *tis = &s->s.tis;
int c; int c;
s->be_tpm_version = tpm_backend_get_tpm_version(s->be_driver); s->be_tpm_version = tpm_backend_get_tpm_version(s->be_driver);
tpm_backend_reset(s->be_driver); tpm_backend_reset(s->be_driver);
tis->active_locty = TPM_TIS_NO_LOCALITY; s->active_locty = TPM_TIS_NO_LOCALITY;
tis->next_locty = TPM_TIS_NO_LOCALITY; s->next_locty = TPM_TIS_NO_LOCALITY;
tis->aborting_locty = TPM_TIS_NO_LOCALITY; s->aborting_locty = TPM_TIS_NO_LOCALITY;
for (c = 0; c < TPM_TIS_NUM_LOCALITIES; c++) { for (c = 0; c < TPM_TIS_NUM_LOCALITIES; c++) {
tis->loc[c].access = TPM_TIS_ACCESS_TPM_REG_VALID_STS; s->loc[c].access = TPM_TIS_ACCESS_TPM_REG_VALID_STS;
switch (s->be_tpm_version) { switch (s->be_tpm_version) {
case TPM_VERSION_UNSPEC: case TPM_VERSION_UNSPEC:
break; break;
case TPM_VERSION_1_2: case TPM_VERSION_1_2:
tis->loc[c].sts = TPM_TIS_STS_TPM_FAMILY1_2; s->loc[c].sts = TPM_TIS_STS_TPM_FAMILY1_2;
tis->loc[c].iface_id = TPM_TIS_IFACE_ID_SUPPORTED_FLAGS1_3; s->loc[c].iface_id = TPM_TIS_IFACE_ID_SUPPORTED_FLAGS1_3;
break; break;
case TPM_VERSION_2_0: case TPM_VERSION_2_0:
tis->loc[c].sts = TPM_TIS_STS_TPM_FAMILY2_0; s->loc[c].sts = TPM_TIS_STS_TPM_FAMILY2_0;
tis->loc[c].iface_id = TPM_TIS_IFACE_ID_SUPPORTED_FLAGS2_0; s->loc[c].iface_id = TPM_TIS_IFACE_ID_SUPPORTED_FLAGS2_0;
break; break;
} }
tis->loc[c].inte = TPM_TIS_INT_POLARITY_LOW_LEVEL; s->loc[c].inte = TPM_TIS_INT_POLARITY_LOW_LEVEL;
tis->loc[c].ints = 0; s->loc[c].ints = 0;
tis->loc[c].state = TPM_TIS_STATE_IDLE; s->loc[c].state = TPM_TIS_STATE_IDLE;
tis->loc[c].w_offset = 0; s->loc[c].w_offset = 0;
tpm_tis_realloc_buffer(&tis->loc[c].w_buffer); tpm_tis_realloc_buffer(&s->loc[c].w_buffer);
tis->loc[c].r_offset = 0; s->loc[c].r_offset = 0;
tpm_tis_realloc_buffer(&tis->loc[c].r_buffer); tpm_tis_realloc_buffer(&s->loc[c].r_buffer);
} }
tpm_tis_do_startup_tpm(s); tpm_tis_do_startup_tpm(s);
@ -1034,8 +1059,7 @@ static const VMStateDescription vmstate_tpm_tis = {
}; };
static Property tpm_tis_properties[] = { static Property tpm_tis_properties[] = {
DEFINE_PROP_UINT32("irq", TPMState, DEFINE_PROP_UINT32("irq", TPMState, irq_num, TPM_TIS_IRQ),
s.tis.irq_num, TPM_TIS_IRQ),
DEFINE_PROP_STRING("tpmdev", TPMState, backend), DEFINE_PROP_STRING("tpmdev", TPMState, backend),
DEFINE_PROP_END_OF_LIST(), DEFINE_PROP_END_OF_LIST(),
}; };
@ -1043,7 +1067,6 @@ static Property tpm_tis_properties[] = {
static void tpm_tis_realizefn(DeviceState *dev, Error **errp) static void tpm_tis_realizefn(DeviceState *dev, Error **errp)
{ {
TPMState *s = TPM(dev); TPMState *s = TPM(dev);
TPMTISEmuState *tis = &s->s.tis;
s->be_driver = qemu_find_tpm(s->backend); s->be_driver = qemu_find_tpm(s->backend);
if (!s->be_driver) { if (!s->be_driver) {
@ -1054,21 +1077,21 @@ static void tpm_tis_realizefn(DeviceState *dev, Error **errp)
s->be_driver->fe_model = TPM_MODEL_TPM_TIS; s->be_driver->fe_model = TPM_MODEL_TPM_TIS;
if (tpm_backend_init(s->be_driver, s, tpm_tis_receive_cb)) { if (tpm_backend_init(s->be_driver, s)) {
error_setg(errp, "tpm_tis: backend driver with id %s could not be " error_setg(errp, "tpm_tis: backend driver with id %s could not be "
"initialized", s->backend); "initialized", s->backend);
return; return;
} }
if (tis->irq_num > 15) { if (s->irq_num > 15) {
error_setg(errp, "tpm_tis: IRQ %d for TPM TIS is outside valid range " error_setg(errp, "tpm_tis: IRQ %d for TPM TIS is outside valid range "
"of 0 to 15", tis->irq_num); "of 0 to 15", s->irq_num);
return; return;
} }
tis->bh = qemu_bh_new(tpm_tis_receive_bh, s); s->bh = qemu_bh_new(tpm_tis_receive_bh, s);
isa_init_irq(&s->busdev, &tis->irq, tis->irq_num); isa_init_irq(&s->busdev, &s->irq, s->irq_num);
memory_region_add_subregion(isa_address_space(ISA_DEVICE(dev)), memory_region_add_subregion(isa_address_space(ISA_DEVICE(dev)),
TPM_TIS_ADDR_BASE, &s->mmio); TPM_TIS_ADDR_BASE, &s->mmio);
@ -1086,11 +1109,13 @@ static void tpm_tis_initfn(Object *obj)
static void tpm_tis_class_init(ObjectClass *klass, void *data) static void tpm_tis_class_init(ObjectClass *klass, void *data)
{ {
DeviceClass *dc = DEVICE_CLASS(klass); DeviceClass *dc = DEVICE_CLASS(klass);
TPMIfClass *tc = TPM_IF_CLASS(klass);
dc->realize = tpm_tis_realizefn; dc->realize = tpm_tis_realizefn;
dc->props = tpm_tis_properties; dc->props = tpm_tis_properties;
dc->reset = tpm_tis_reset; dc->reset = tpm_tis_reset;
dc->vmsd = &vmstate_tpm_tis; dc->vmsd = &vmstate_tpm_tis;
tc->request_completed = tpm_tis_request_completed;
} }
static const TypeInfo tpm_tis_info = { static const TypeInfo tpm_tis_info = {
@ -1099,6 +1124,10 @@ static const TypeInfo tpm_tis_info = {
.instance_size = sizeof(TPMState), .instance_size = sizeof(TPMState),
.instance_init = tpm_tis_initfn, .instance_init = tpm_tis_initfn,
.class_init = tpm_tis_class_init, .class_init = tpm_tis_class_init,
.interfaces = (InterfaceInfo[]) {
{ TYPE_TPM_IF },
{ }
}
}; };
static void tpm_tis_register(void) static void tpm_tis_register(void)

View File

@ -1,70 +0,0 @@
/*
* tpm_tis.h - QEMU's TPM TIS interface emulator
*
* Copyright (C) 2006, 2010-2013 IBM Corporation
*
* Authors:
* Stefan Berger <stefanb@us.ibm.com>
* David Safford <safford@us.ibm.com>
*
* This work is licensed under the terms of the GNU GPL, version 2 or later.
* See the COPYING file in the top-level directory.
*
* Implementation of the TIS interface according to specs found at
* http://www.trustedcomputinggroup.org
*
*/
#ifndef TPM_TPM_TIS_H
#define TPM_TPM_TIS_H
#include "hw/isa/isa.h"
#include "hw/acpi/tpm.h"
#include "qemu-common.h"
#define TPM_TIS_NUM_LOCALITIES 5 /* per spec */
#define TPM_TIS_LOCALITY_SHIFT 12
#define TPM_TIS_NO_LOCALITY 0xff
#define TPM_TIS_IS_VALID_LOCTY(x) ((x) < TPM_TIS_NUM_LOCALITIES)
#define TPM_TIS_BUFFER_MAX 4096
typedef enum {
TPM_TIS_STATE_IDLE = 0,
TPM_TIS_STATE_READY,
TPM_TIS_STATE_COMPLETION,
TPM_TIS_STATE_EXECUTION,
TPM_TIS_STATE_RECEPTION,
} TPMTISState;
/* locality data -- all fields are persisted */
typedef struct TPMLocality {
TPMTISState state;
uint8_t access;
uint32_t sts;
uint32_t iface_id;
uint32_t inte;
uint32_t ints;
uint16_t w_offset;
uint16_t r_offset;
TPMSizedBuffer w_buffer;
TPMSizedBuffer r_buffer;
} TPMLocality;
typedef struct TPMTISEmuState {
QEMUBH *bh;
uint32_t offset;
uint8_t buf[TPM_TIS_BUFFER_MAX];
uint8_t active_locty;
uint8_t aborting_locty;
uint8_t next_locty;
TPMLocality loc[TPM_TIS_NUM_LOCALITIES];
qemu_irq irq;
uint32_t irq_num;
} TPMTISEmuState;
#endif /* TPM_TPM_TIS_H */

View File

@ -22,6 +22,7 @@
#include "qemu/osdep.h" #include "qemu/osdep.h"
#include "tpm_util.h" #include "tpm_util.h"
#include "tpm_int.h" #include "tpm_int.h"
#include "exec/memory.h"
/* /*
* Write an error message in the given output buffer. * Write an error message in the given output buffer.

View File

@ -29,14 +29,14 @@
typedef struct TPMBackendClass TPMBackendClass; typedef struct TPMBackendClass TPMBackendClass;
typedef struct TPMBackend TPMBackend; typedef struct TPMBackend TPMBackend;
typedef struct TPMDriverOps TPMDriverOps;
typedef void (TPMRecvDataCB)(TPMState *, uint8_t locty, bool selftest_done);
typedef enum TPMBackendCmd { typedef struct TPMBackendCmd {
TPM_BACKEND_CMD_INIT = 1, uint8_t locty;
TPM_BACKEND_CMD_PROCESS_CMD, const uint8_t *in;
TPM_BACKEND_CMD_END, uint32_t in_len;
TPM_BACKEND_CMD_TPM_RESET, uint8_t *out;
uint32_t out_len;
bool selftest_done;
} TPMBackendCmd; } TPMBackendCmd;
struct TPMBackend { struct TPMBackend {
@ -46,7 +46,6 @@ struct TPMBackend {
bool opened; bool opened;
TPMState *tpm_state; TPMState *tpm_state;
GThreadPool *thread_pool; GThreadPool *thread_pool;
TPMRecvDataCB *recv_data_callback;
bool had_startup_error; bool had_startup_error;
/* <public> */ /* <public> */
@ -59,19 +58,6 @@ struct TPMBackend {
struct TPMBackendClass { struct TPMBackendClass {
ObjectClass parent_class; ObjectClass parent_class;
const TPMDriverOps *ops;
void (*opened)(TPMBackend *s, Error **errp);
void (*handle_request)(TPMBackend *s, TPMBackendCmd cmd);
};
typedef struct TPMSizedBuffer {
uint32_t size;
uint8_t *buffer;
} TPMSizedBuffer;
struct TPMDriverOps {
enum TpmType type; enum TpmType type;
const QemuOptDesc *opts; const QemuOptDesc *opts;
/* get a descriptive text of the backend to display to the user */ /* get a descriptive text of the backend to display to the user */
@ -79,8 +65,6 @@ struct TPMDriverOps {
TPMBackend *(*create)(QemuOpts *opts, const char *id); TPMBackend *(*create)(QemuOpts *opts, const char *id);
/* initialize the backend */
int (*init)(TPMBackend *t);
/* start up the TPM on the backend */ /* start up the TPM on the backend */
int (*startup_tpm)(TPMBackend *t); int (*startup_tpm)(TPMBackend *t);
@ -95,8 +79,11 @@ struct TPMDriverOps {
TPMVersion (*get_tpm_version)(TPMBackend *t); TPMVersion (*get_tpm_version)(TPMBackend *t);
TpmTypeOptions *(*get_tpm_options)(TPMBackend *t); TpmTypeOptions *(*get_tpm_options)(TPMBackend *t);
};
void (*opened)(TPMBackend *s, Error **errp);
void (*handle_request)(TPMBackend *s, TPMBackendCmd *cmd);
};
/** /**
* tpm_backend_get_type: * tpm_backend_get_type:
@ -116,8 +103,7 @@ enum TpmType tpm_backend_get_type(TPMBackend *s);
* *
* Returns 0 on success. * Returns 0 on success.
*/ */
int tpm_backend_init(TPMBackend *s, TPMState *state, int tpm_backend_init(TPMBackend *s, TPMState *state);
TPMRecvDataCB *datacb);
/** /**
* tpm_backend_startup_tpm: * tpm_backend_startup_tpm:
@ -140,11 +126,12 @@ bool tpm_backend_had_startup_error(TPMBackend *s);
/** /**
* tpm_backend_deliver_request: * tpm_backend_deliver_request:
* @s: the backend to send the request to * @s: the backend to send the request to
* @cmd: the command to deliver
* *
* Send a request to the backend. The backend will then send the request * Send a request to the backend. The backend will then send the request
* to the TPM implementation. * to the TPM implementation.
*/ */
void tpm_backend_deliver_request(TPMBackend *s); void tpm_backend_deliver_request(TPMBackend *s, TPMBackendCmd *cmd);
/** /**
* tpm_backend_reset: * tpm_backend_reset:
@ -215,8 +202,6 @@ TPMInfo *tpm_backend_query_tpm(TPMBackend *s);
TPMBackend *qemu_find_tpm(const char *id); TPMBackend *qemu_find_tpm(const char *id);
const TPMDriverOps *tpm_get_backend_driver(const char *type);
void tpm_register_model(enum TpmModel model); void tpm_register_model(enum TpmModel model);
void tpm_register_driver(const TPMDriverOps *tdo);
#endif #endif

View File

@ -2603,7 +2603,6 @@ sub process {
SCSIBusInfo| SCSIBusInfo|
SCSIReqOps| SCSIReqOps|
Spice[A-Z][a-zA-Z0-9]*Interface| Spice[A-Z][a-zA-Z0-9]*Interface|
TPMDriverOps|
USBDesc[A-Z][a-zA-Z0-9]*| USBDesc[A-Z][a-zA-Z0-9]*|
VhostOps| VhostOps|
VMStateDescription| VMStateDescription|

49
tpm.c
View File

@ -23,7 +23,6 @@
static QLIST_HEAD(, TPMBackend) tpm_backends = static QLIST_HEAD(, TPMBackend) tpm_backends =
QLIST_HEAD_INITIALIZER(tpm_backends); QLIST_HEAD_INITIALIZER(tpm_backends);
static TPMDriverOps const *be_drivers[TPM_TYPE__MAX];
static bool tpm_models[TPM_MODEL__MAX]; static bool tpm_models[TPM_MODEL__MAX];
void tpm_register_model(enum TpmModel model) void tpm_register_model(enum TpmModel model)
@ -31,20 +30,22 @@ void tpm_register_model(enum TpmModel model)
tpm_models[model] = true; tpm_models[model] = true;
} }
const TPMDriverOps *tpm_get_backend_driver(const char *type)
{
int i = qapi_enum_parse(&TpmType_lookup, type, -1, NULL);
return i >= 0 ? be_drivers[i] : NULL;
}
#ifdef CONFIG_TPM #ifdef CONFIG_TPM
void tpm_register_driver(const TPMDriverOps *tdo) static const TPMBackendClass *
tpm_be_find_by_type(enum TpmType type)
{ {
assert(!be_drivers[tdo->type]); ObjectClass *oc;
char *typename = g_strdup_printf("tpm-%s", TpmType_str(type));
be_drivers[tdo->type] = tdo; oc = object_class_by_name(typename);
g_free(typename);
if (!object_class_dynamic_cast(oc, TYPE_TPM_BACKEND)) {
return NULL;
}
return TPM_BACKEND_CLASS(oc);
} }
/* /*
@ -58,11 +59,11 @@ static void tpm_display_backend_drivers(void)
fprintf(stderr, "Supported TPM types (choose only one):\n"); fprintf(stderr, "Supported TPM types (choose only one):\n");
for (i = 0; i < TPM_TYPE__MAX; i++) { for (i = 0; i < TPM_TYPE__MAX; i++) {
if (be_drivers[i] == NULL) { const TPMBackendClass *bc = tpm_be_find_by_type(i);
if (!bc) {
continue; continue;
} }
fprintf(stderr, "%12s %s\n", fprintf(stderr, "%12s %s\n", TpmType_str(i), bc->desc);
TpmType_str(i), be_drivers[i]->desc);
} }
fprintf(stderr, "\n"); fprintf(stderr, "\n");
} }
@ -85,13 +86,14 @@ TPMBackend *qemu_find_tpm(const char *id)
return NULL; return NULL;
} }
static int configure_tpm(QemuOpts *opts) static int tpm_init_tpmdev(void *dummy, QemuOpts *opts, Error **errp)
{ {
const char *value; const char *value;
const char *id; const char *id;
const TPMDriverOps *be; const TPMBackendClass *be;
TPMBackend *drv; TPMBackend *drv;
Error *local_err = NULL; Error *local_err = NULL;
int i;
if (!QLIST_EMPTY(&tpm_backends)) { if (!QLIST_EMPTY(&tpm_backends)) {
error_report("Only one TPM is allowed."); error_report("Only one TPM is allowed.");
@ -111,7 +113,8 @@ static int configure_tpm(QemuOpts *opts)
return 1; return 1;
} }
be = tpm_get_backend_driver(value); i = qapi_enum_parse(&TpmType_lookup, value, -1, NULL);
be = i >= 0 ? tpm_be_find_by_type(i) : NULL;
if (be == NULL) { if (be == NULL) {
error_report(QERR_INVALID_PARAMETER_VALUE, error_report(QERR_INVALID_PARAMETER_VALUE,
"type", "a TPM backend type"); "type", "a TPM backend type");
@ -142,11 +145,6 @@ static int configure_tpm(QemuOpts *opts)
return 0; return 0;
} }
static int tpm_init_tpmdev(void *dummy, QemuOpts *opts, Error **errp)
{
return configure_tpm(opts);
}
/* /*
* Walk the list of TPM backend drivers that are in use and call their * Walk the list of TPM backend drivers that are in use and call their
* destroy function to have them cleaned up. * destroy function to have them cleaned up.
@ -196,11 +194,6 @@ int tpm_config_parse(QemuOptsList *opts_list, const char *optarg)
#endif /* CONFIG_TPM */ #endif /* CONFIG_TPM */
static const TPMDriverOps *tpm_driver_find_by_type(enum TpmType type)
{
return be_drivers[type];
}
/* /*
* Walk the list of active TPM backends and collect information about them * Walk the list of active TPM backends and collect information about them
* following the schema description in qapi-schema.json. * following the schema description in qapi-schema.json.
@ -234,7 +227,7 @@ TpmTypeList *qmp_query_tpm_types(Error **errp)
TpmTypeList *head = NULL, *prev = NULL, *cur_item; TpmTypeList *head = NULL, *prev = NULL, *cur_item;
for (i = 0; i < TPM_TYPE__MAX; i++) { for (i = 0; i < TPM_TYPE__MAX; i++) {
if (!tpm_driver_find_by_type(i)) { if (!tpm_be_find_by_type(i)) {
continue; continue;
} }
cur_item = g_new0(TpmTypeList, 1); cur_item = g_new0(TpmTypeList, 1);