blob: 38939171187c35863e83f3aa86967cdcae9985b1 [file] [log] [blame]
Angel Pons8a3453f2020-04-02 23:48:19 +02001/* SPDX-License-Identifier: GPL-2.0-only */
Christian Walter7706a042019-07-05 19:46:30 +02002
Christian Walter7706a042019-07-05 19:46:30 +02003#include <console/console.h>
4#include <security/tpm/tis.h>
Furquan Shaikh76cedd22020-05-02 10:24:23 -07005#include <acpi/acpigen.h>
Christian Walter7706a042019-07-05 19:46:30 +02006#include <device/device.h>
Christian Walter542268192019-07-16 20:07:36 +02007#include <drivers/intel/ptt/ptt.h>
Michał Żygowskiea66f822022-05-17 11:02:06 +02008#include <drivers/tpm/tpm_ppi.h>
Michał Żygowski283e5872022-05-04 14:12:17 +02009#include <security/tpm/tss.h>
10#include <endian.h>
11#include <smbios.h>
12#include <string.h>
Christian Walter7706a042019-07-05 19:46:30 +020013
14#include "tpm.h"
15#include "chip.h"
16
Christian Walter7706a042019-07-05 19:46:30 +020017static const struct {
18 uint16_t vid;
19 uint16_t did;
20 const char *device_name;
21} dev_map[] = {
22 {0x1ae0, 0x0028, "CR50"},
23 {0xa13a, 0x8086, "Intel iTPM"}
24};
25
Sergii Dmytruk1a903142024-04-12 15:47:04 +030026static const char *tis_get_dev_name(struct crb_tpm_info *info)
Christian Walter7706a042019-07-05 19:46:30 +020027{
28 int i;
29
30 for (i = 0; i < ARRAY_SIZE(dev_map); i++)
31 if ((dev_map[i].vid == info->vendor_id) && (dev_map[i].did == info->device_id))
32 return dev_map[i].device_name;
33 return "Unknown";
34}
35
Sergii Dmytruk963f7b92022-10-29 20:42:28 +030036static tpm_result_t crb_tpm_sendrecv(const uint8_t *sendbuf, size_t sbuf_size, uint8_t *recvbuf,
37 size_t *rbuf_len)
Christian Walter7706a042019-07-05 19:46:30 +020038{
Sergii Dmytruk1a903142024-04-12 15:47:04 +030039 int len = crb_tpm_process_command(sendbuf, sbuf_size, recvbuf, *rbuf_len);
Christian Walter7706a042019-07-05 19:46:30 +020040
41 if (len == 0)
Jon Murphyd7b8dc92023-09-05 11:36:43 -060042 return TPM_CB_FAIL;
Christian Walter7706a042019-07-05 19:46:30 +020043
44 *rbuf_len = len;
45
Jon Murphyd7b8dc92023-09-05 11:36:43 -060046 return TPM_SUCCESS;
Christian Walter7706a042019-07-05 19:46:30 +020047}
48
Sergii Dmytruk3e5cefc2022-11-01 00:48:43 +020049tis_sendrecv_fn crb_tis_probe(enum tpm_family *family)
Sergii Dmytruk963f7b92022-10-29 20:42:28 +030050{
Sergii Dmytruk1a903142024-04-12 15:47:04 +030051 struct crb_tpm_info info;
Sergii Dmytruk963f7b92022-10-29 20:42:28 +030052
53 /* Wake TPM up (if necessary) */
Sergii Dmytruk1a903142024-04-12 15:47:04 +030054 if (crb_tpm_init())
Sergii Dmytruk963f7b92022-10-29 20:42:28 +030055 return NULL;
56
Sergii Dmytrukfebf9b92022-10-31 15:30:15 +020057 /* CRB interface exists only in TPM2 */
58 if (family != NULL)
59 *family = TPM_2;
60
Sergii Dmytruk1a903142024-04-12 15:47:04 +030061 crb_tpm_get_info(&info);
Sergii Dmytruk963f7b92022-10-29 20:42:28 +030062
63 printk(BIOS_INFO, "Initialized TPM device %s revision %d\n", tis_get_dev_name(&info),
64 info.revision);
65
66 if (CONFIG(HAVE_INTEL_PTT)) {
67 if (!ptt_active()) {
68 printk(BIOS_ERR, "%s: Intel PTT is not active.\n", __func__);
69 return NULL;
70 }
71 printk(BIOS_DEBUG, "%s: Intel PTT is active.\n", __func__);
72 }
73
74 return &crb_tpm_sendrecv;
75}
76
Furquan Shaikh7536a392020-04-24 21:59:21 -070077static void crb_tpm_fill_ssdt(const struct device *dev)
Christian Walter7706a042019-07-05 19:46:30 +020078{
79 const char *path = acpi_device_path(dev);
80 if (!path) {
81 path = "\\_SB_.TPM";
82 printk(BIOS_DEBUG, "Using default TPM2 ACPI path: '%s'\n", path);
83 }
84
85 /* Device */
86 acpigen_write_device(path);
87
88 acpigen_write_name_string("_HID", "MSFT0101");
89 acpigen_write_name_string("_CID", "MSFT0101");
90
Patrick Rudolphc83bab62019-12-13 12:16:06 +010091 acpi_device_write_uid(dev);
Christian Walter7706a042019-07-05 19:46:30 +020092
93 acpigen_write_STA(ACPI_STATUS_DEVICE_ALL_ON);
94
95 /* Resources */
96 acpigen_write_name("_CRS");
97 acpigen_write_resourcetemplate_header();
98 acpigen_write_mem32fixed(1, TPM_CRB_BASE_ADDRESS, 0x5000);
99
100 acpigen_write_resourcetemplate_footer();
101
Michał Żygowskiea66f822022-05-17 11:02:06 +0200102 if (!CONFIG(CHROMEOS) && CONFIG(TPM_PPI))
103 tpm_ppi_acpi_fill_ssdt(dev);
104
Christian Walter7706a042019-07-05 19:46:30 +0200105 acpigen_pop_len(); /* Device */
106}
107
108static const char *crb_tpm_acpi_name(const struct device *dev)
109{
110 return "TPM";
111}
112
Michał Żygowski283e5872022-05-04 14:12:17 +0200113#if CONFIG(GENERATE_SMBIOS_TABLES) && CONFIG(TPM2)
Jon Murphyd7b8dc92023-09-05 11:36:43 -0600114static tpm_result_t tpm_get_cap(uint32_t property, uint32_t *value)
Michał Żygowski283e5872022-05-04 14:12:17 +0200115{
116 TPMS_CAPABILITY_DATA cap_data;
117 int i;
Jon Murphyd7b8dc92023-09-05 11:36:43 -0600118 tpm_result_t rc;
Michał Żygowski283e5872022-05-04 14:12:17 +0200119
120 if (!value)
Jon Murphyd7b8dc92023-09-05 11:36:43 -0600121 return TPM_CB_INVALID_ARG;
Michał Żygowski283e5872022-05-04 14:12:17 +0200122
Sergii Dmytruk094a0512022-10-31 18:41:52 +0200123 rc = tlcl2_get_capability(TPM_CAP_TPM_PROPERTIES, property, 1, &cap_data);
Michał Żygowski283e5872022-05-04 14:12:17 +0200124
Jon Murphy24604812023-09-05 10:37:05 -0600125 if (rc)
Jon Murphyd7b8dc92023-09-05 11:36:43 -0600126 return rc;
Michał Żygowski283e5872022-05-04 14:12:17 +0200127
128 for (i = 0 ; i < cap_data.data.tpmProperties.count; i++) {
129 if (cap_data.data.tpmProperties.tpmProperty[i].property == property) {
130 *value = cap_data.data.tpmProperties.tpmProperty[i].value;
Jon Murphyd7b8dc92023-09-05 11:36:43 -0600131 return TPM_SUCCESS;
Michał Żygowski283e5872022-05-04 14:12:17 +0200132 }
133 }
134
Jon Murphyd7b8dc92023-09-05 11:36:43 -0600135 return TPM_CB_FAIL;
Michał Żygowski283e5872022-05-04 14:12:17 +0200136}
137
138static int smbios_write_type43_tpm(struct device *dev, int *handle, unsigned long *current)
139{
Sergii Dmytruk1a903142024-04-12 15:47:04 +0300140 struct crb_tpm_info info;
Michał Żygowski283e5872022-05-04 14:12:17 +0200141 uint32_t tpm_manuf, tpm_family;
142 uint32_t fw_ver1, fw_ver2;
143 uint8_t major_spec_ver, minor_spec_ver;
144
Sergii Dmytruk47e9e8c2022-11-02 00:50:03 +0200145 if (tlcl_get_family() == TPM_1)
146 return 0;
147
Sergii Dmytruk1a903142024-04-12 15:47:04 +0300148 crb_tpm_get_info(&info);
Michał Żygowski283e5872022-05-04 14:12:17 +0200149
150 /* If any of these have invalid values, assume TPM not present or disabled */
151 if (info.vendor_id == 0 || info.vendor_id == 0xFFFF ||
152 info.device_id == 0 || info.device_id == 0xFFFF) {
153 printk(BIOS_DEBUG, "%s: Invalid Vendor ID/Device ID\n", __func__);
154 return 0;
155 }
156
157 /* Vendor ID is the value returned by TPM2_GetCapabiltiy TPM_PT_MANUFACTURER */
158 if (tpm_get_cap(TPM_PT_MANUFACTURER, &tpm_manuf)) {
159 printk(BIOS_DEBUG, "TPM2_GetCap TPM_PT_MANUFACTURER failed\n");
160 return 0;
161 }
162
163 tpm_manuf = be32toh(tpm_manuf);
164
165 if (tpm_get_cap(TPM_PT_FIRMWARE_VERSION_1, &fw_ver1)) {
166 printk(BIOS_DEBUG, "TPM2_GetCap TPM_PT_FIRMWARE_VERSION_1 failed\n");
167 return 0;
168 }
169
170 if (tpm_get_cap(TPM_PT_FIRMWARE_VERSION_2, &fw_ver2)) {
171 printk(BIOS_DEBUG, "TPM2_GetCap TPM_PT_FIRMWARE_VERSION_2 failed\n");
172 return 0;
173 }
174
175 if (tpm_get_cap(TPM_PT_FAMILY_INDICATOR, &tpm_family)) {
176 printk(BIOS_DEBUG, "TPM2_GetCap TPM_PT_FAMILY_INDICATOR failed\n");
177 return 0;
178 }
179
180 tpm_family = be32toh(tpm_family);
181
182 if (!strncmp((char *)&tpm_family, "2.0", 4)) {
183 major_spec_ver = 2;
184 minor_spec_ver = 0;
185 } else {
186 printk(BIOS_ERR, "%s: Invalid TPM family\n", __func__);
187 return 0;
188 }
189
190 return smbios_write_type43(current, handle, tpm_manuf, major_spec_ver, minor_spec_ver,
191 fw_ver1, fw_ver2, tis_get_dev_name(&info),
192 SMBIOS_TPM_DEVICE_CHARACTERISTICS_NOT_SUPPORTED, 0);
193}
194#endif
195
Bill XIEac1362502022-07-08 16:53:21 +0800196static struct device_operations __maybe_unused crb_ops = {
Nico Huber2f8ba692020-04-05 14:05:24 +0200197 .read_resources = noop_read_resources,
198 .set_resources = noop_set_resources,
Christian Walter7706a042019-07-05 19:46:30 +0200199#if CONFIG(HAVE_ACPI_TABLES)
200 .acpi_name = crb_tpm_acpi_name,
Nico Huber68680dd2020-03-31 17:34:52 +0200201 .acpi_fill_ssdt = crb_tpm_fill_ssdt,
Christian Walter7706a042019-07-05 19:46:30 +0200202#endif
Michał Żygowski283e5872022-05-04 14:12:17 +0200203#if CONFIG(GENERATE_SMBIOS_TABLES) && CONFIG(TPM2)
204 .get_smbios_data = smbios_write_type43_tpm,
205#endif
Christian Walter7706a042019-07-05 19:46:30 +0200206};
207
208static void enable_dev(struct device *dev)
209{
Kyösti Mälkki35a047c2019-11-05 18:38:00 +0200210#if !DEVTREE_EARLY
Christian Walter7706a042019-07-05 19:46:30 +0200211 dev->ops = &crb_ops;
Kyösti Mälkki35a047c2019-11-05 18:38:00 +0200212#endif
Christian Walter7706a042019-07-05 19:46:30 +0200213}
214
Kyösti Mälkki35a047c2019-11-05 18:38:00 +0200215struct chip_operations drivers_crb_ops = {
Nicholas Sudsgaardbfb11be2024-01-30 09:53:46 +0900216 .name = "CRB TPM",
Kyösti Mälkki35a047c2019-11-05 18:38:00 +0200217 .enable_dev = enable_dev
218};