Changes in 4.9.137 bcache: fix miss key refill->end in writeback hwmon: (pmbus) Fix page count auto-detection. jffs2: free jffs2_sb_info through jffs2_kill_sb() pcmcia: Implement CLKRUN protocol disabling for Ricoh bridges ipmi: Fix timer race with module unload parisc: Fix address in HPMC IVA parisc: Fix map_pages() to not overwrite existing pte entries ALSA: hda - Add quirk for ASUS G751 laptop ALSA: hda - Fix headphone pin config for ASUS G751 ALSA: hda - Add mic quirk for the Lenovo G50-30 (17aa:3905) ALSA: ca0106: Disable IZD on SB0570 DAC to fix audio pops x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigation x86/corruption-check: Fix panic in memory_corruption_check() when boot option without value is provided x86/speculation: Support Enhanced IBRS on future CPUs bpf: do not blindly change rlimit in reuseport net selftest Revert "perf tools: Fix PMU term format max value calculation" xfrm: policy: use hlist rcu variants on insert sparc: Fix single-pcr perf event counter management. sparc64: Make proc_id signed. sched/fair: Fix the min_vruntime update logic in dequeue_entity() perf cpu_map: Align cpu map synthesized events properly. x86/fpu: Remove second definition of fpu in __fpu__restore_sig() net: qla3xxx: Remove overflowing shift statement selftests: ftrace: Add synthetic event syntax testcase i2c: rcar: cleanup DMA for all kinds of failure locking/lockdep: Fix debug_locks off performance problem ataflop: fix error handling during setup swim: fix cleanup on setup error tun: Consistently configure generic netdev params via rtnetlink s390/sthyi: Fix machine name validity indication hwmon: (pwm-fan) Set fan speed to 0 on suspend perf tools: Free temporary 'sys' string in read_event_files() perf tools: Cleanup trace-event-info 'tdata' leak perf strbuf: Match va_{add,copy} with va_end mmc: sdhci-pci-o2micro: Add quirk for O2 Micro dev 0x8620 rev 0x01 iwlwifi: pcie: avoid empty free RB queue x86/olpc: Indicate that legacy PC XO-1 platform should not register RTC cpufreq: dt: Try freeing static OPPs only if we have added them Bluetooth: btbcm: Add entry for BCM4335C0 UART bluetooth x86: boot: Fix EFI stub alignment pinctrl: qcom: spmi-mpp: Fix err handling of pmic_mpp_set_mux brcmfmac: fix for proper support of 160MHz bandwidth kprobes: Return error if we fail to reuse kprobe instead of BUG_ON() ACPI / LPSS: Add alternative ACPI HIDs for Cherry Trail DMA controllers pinctrl: qcom: spmi-mpp: Fix drive strength setting pinctrl: spmi-mpp: Fix pmic_mpp_config_get() to be compliant pinctrl: ssbi-gpio: Fix pm8xxx_pin_config_get() to be compliant ixgbevf: VF2VF TCP RSS ath10k: schedule hardware restart if WMI command times out cgroup, netclassid: add a preemption point to write_classid scsi: esp_scsi: Track residual for PIO transfers scsi: megaraid_sas: fix a missing-check bug RDMA/core: Do not expose unsupported counters IB/ipoib: Clear IPCB before icmp_send tpm: suppress transmit cmd error logs when TPM 1.2 is disabled/deactivated VMCI: Resource wildcard match fixed usb: gadget: udc: atmel: handle at91sam9rl PMC ext4: fix argument checking in EXT4_IOC_MOVE_EXT MD: fix invalid stored role for a disk PCI/MSI: Warn and return error if driver enables MSI/MSI-X twice coresight: etb10: Fix handling of perf mode crypto: caam - fix implicit casts in endianness helpers usb: chipidea: Prevent unbalanced IRQ disable driver/dma/ioat: Call del_timer_sync() without holding prep_lock uio: ensure class is registered before devices scsi: lpfc: Correct soft lockup when running mds diagnostics signal: Always deliver the kernel's SIGKILL and SIGSTOP to a pid namespace init dmaengine: dma-jz4780: Return error if not probed from DT ALSA: hda: Check the non-cached stream buffers more explicitly ARM: dts: exynos: Remove "cooling-{min|max}-level" for CPU nodes arm: dts: exynos: Add missing cooling device properties for CPUs ARM: dts: exynos: Convert exynos5250.dtsi to opp-v2 bindings ARM: dts: exynos: Mark 1 GHz CPU OPP as suspend OPP on Exynos5250 xen-swiotlb: use actually allocated size on check physical continuous tpm: Restore functionality to xen vtpm driver. xen/blkfront: avoid NULL blkfront_info dereference on device removal xen: fix race in xen_qlock_wait() xen: make xen_qlock_wait() nestable libertas: don't set URB_ZERO_PACKET on IN USB transfer usbip:vudc: BUG kmalloc-2048 (Not tainted): Poison overwritten iwlwifi: mvm: check return value of rs_rate_from_ucode_rate() net/ipv4: defensive cipso option parsing libnvdimm: Hold reference on parent while scheduling async init ASoC: intel: skylake: Add missing break in skl_tplg_get_token() jbd2: fix use after free in jbd2_log_do_checkpoint() gfs2_meta: ->mount() can get NULL dev_name ext4: initialize retries variable in ext4_da_write_inline_data_begin() ext4: propagate error from dquot_initialize() in EXT4_IOC_FSSETXATTR HID: hiddev: fix potential Spectre v1 EDAC, {i7core,sb,skx}_edac: Fix uncorrected error counting EDAC, skx_edac: Fix logical channel intermediate decoding PCI: Add Device IDs for Intel GPU "spurious interrupt" quirk signal/GenWQE: Fix sending of SIGKILL crypto: lrw - Fix out-of bounds access on counter overflow crypto: tcrypt - fix ghash-generic speed test ima: fix showing large 'violations' or 'runtime_measurements_count' hugetlbfs: dirty pages as they are added to pagecache kbuild: fix kernel/bounds.c 'W=1' warning iio: ad5064: Fix regulator handling iio: adc: imx25-gcq: Fix leak of device_node in mx25_gcq_setup_cfgs() iio: adc: at91: fix acking DRDY irq on simple conversions iio: adc: at91: fix wrong channel number in triggered buffer mode w1: omap-hdq: fix missing bus unregister at removal smb3: allow stats which track session and share reconnects to be reset smb3: do not attempt cifs operation in smb3 query info error path smb3: on kerberos mount if server doesn't specify auth type use krb5 printk: Fix panic caused by passing log_buf_len to command line genirq: Fix race on spurious interrupt detection NFSv4.1: Fix the r/wsize checking nfsd: Fix an Oops in free_session() lockd: fix access beyond unterminated strings in prints dm ioctl: harden copy_params()'s copy_from_user() from malicious users powerpc/msi: Fix compile error on mpc83xx MIPS: OCTEON: fix out of bounds array access on CN68XX TC: Set DMA masks for devices media: v4l2-tpg: fix kernel oops when enabling HFLIP and OSD kgdboc: Passing ekgdboc to command line causes panic xen: fix xen_qlock_wait() media: em28xx: use a default format if TRY_FMT fails media: tvp5150: avoid going past array on v4l2_querymenu() media: em28xx: fix input name for Terratec AV 350 media: em28xx: make v4l2-compliance happier by starting sequence on zero arm64: lse: remove -fcall-used-x0 flag rpmsg: smd: fix memory leak on channel create Cramfs: fix abad comparison when wrap-arounds occur arm64: dts: stratix10: Correct System Manager register size soc/tegra: pmc: Fix child-node lookup btrfs: Handle owner mismatch gracefully when walking up tree btrfs: locking: Add extra check in btrfs_init_new_buffer() to avoid deadlock btrfs: fix error handling in free_log_tree btrfs: iterate all devices during trim, instead of fs_devices::alloc_list btrfs: don't attempt to trim devices that don't support it btrfs: wait on caching when putting the bg cache btrfs: reset max_extent_size on clear in a bitmap btrfs: make sure we create all new block groups Btrfs: fix wrong dentries after fsync of file that got its parent replaced btrfs: qgroup: Dirty all qgroups before rescan Btrfs: fix null pointer dereference on compressed write path error btrfs: set max_extent_size properly MD: fix invalid stored role for a disk - try2 Linux 4.9.137 Signed-off-by: Greg Kroah-Hartman <gregkh@google.com>
403 lines
8.7 KiB
C
403 lines
8.7 KiB
C
/*
|
|
* Implementation of the Xen vTPM device frontend
|
|
*
|
|
* Author: Daniel De Graaf <dgdegra@tycho.nsa.gov>
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License version 2,
|
|
* as published by the Free Software Foundation.
|
|
*/
|
|
#include <linux/errno.h>
|
|
#include <linux/err.h>
|
|
#include <linux/interrupt.h>
|
|
#include <xen/xen.h>
|
|
#include <xen/events.h>
|
|
#include <xen/interface/io/tpmif.h>
|
|
#include <xen/grant_table.h>
|
|
#include <xen/xenbus.h>
|
|
#include <xen/page.h>
|
|
#include "tpm.h"
|
|
#include <xen/platform_pci.h>
|
|
|
|
struct tpm_private {
|
|
struct tpm_chip *chip;
|
|
struct xenbus_device *dev;
|
|
|
|
struct vtpm_shared_page *shr;
|
|
|
|
unsigned int evtchn;
|
|
int ring_ref;
|
|
domid_t backend_id;
|
|
int irq;
|
|
wait_queue_head_t read_queue;
|
|
};
|
|
|
|
enum status_bits {
|
|
VTPM_STATUS_RUNNING = 0x1,
|
|
VTPM_STATUS_IDLE = 0x2,
|
|
VTPM_STATUS_RESULT = 0x4,
|
|
VTPM_STATUS_CANCELED = 0x8,
|
|
};
|
|
|
|
static u8 vtpm_status(struct tpm_chip *chip)
|
|
{
|
|
struct tpm_private *priv = dev_get_drvdata(&chip->dev);
|
|
switch (priv->shr->state) {
|
|
case VTPM_STATE_IDLE:
|
|
return VTPM_STATUS_IDLE | VTPM_STATUS_CANCELED;
|
|
case VTPM_STATE_FINISH:
|
|
return VTPM_STATUS_IDLE | VTPM_STATUS_RESULT;
|
|
case VTPM_STATE_SUBMIT:
|
|
case VTPM_STATE_CANCEL: /* cancel requested, not yet canceled */
|
|
return VTPM_STATUS_RUNNING;
|
|
default:
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
static bool vtpm_req_canceled(struct tpm_chip *chip, u8 status)
|
|
{
|
|
return status & VTPM_STATUS_CANCELED;
|
|
}
|
|
|
|
static void vtpm_cancel(struct tpm_chip *chip)
|
|
{
|
|
struct tpm_private *priv = dev_get_drvdata(&chip->dev);
|
|
priv->shr->state = VTPM_STATE_CANCEL;
|
|
wmb();
|
|
notify_remote_via_evtchn(priv->evtchn);
|
|
}
|
|
|
|
static unsigned int shr_data_offset(struct vtpm_shared_page *shr)
|
|
{
|
|
return sizeof(*shr) + sizeof(u32) * shr->nr_extra_pages;
|
|
}
|
|
|
|
static int vtpm_send(struct tpm_chip *chip, u8 *buf, size_t count)
|
|
{
|
|
struct tpm_private *priv = dev_get_drvdata(&chip->dev);
|
|
struct vtpm_shared_page *shr = priv->shr;
|
|
unsigned int offset = shr_data_offset(shr);
|
|
|
|
u32 ordinal;
|
|
unsigned long duration;
|
|
|
|
if (offset > PAGE_SIZE)
|
|
return -EINVAL;
|
|
|
|
if (offset + count > PAGE_SIZE)
|
|
return -EINVAL;
|
|
|
|
/* Wait for completion of any existing command or cancellation */
|
|
if (wait_for_tpm_stat(chip, VTPM_STATUS_IDLE, chip->timeout_c,
|
|
&priv->read_queue, true) < 0) {
|
|
vtpm_cancel(chip);
|
|
return -ETIME;
|
|
}
|
|
|
|
memcpy(offset + (u8 *)shr, buf, count);
|
|
shr->length = count;
|
|
barrier();
|
|
shr->state = VTPM_STATE_SUBMIT;
|
|
wmb();
|
|
notify_remote_via_evtchn(priv->evtchn);
|
|
|
|
ordinal = be32_to_cpu(((struct tpm_input_header*)buf)->ordinal);
|
|
duration = tpm_calc_ordinal_duration(chip, ordinal);
|
|
|
|
if (wait_for_tpm_stat(chip, VTPM_STATUS_IDLE, duration,
|
|
&priv->read_queue, true) < 0) {
|
|
/* got a signal or timeout, try to cancel */
|
|
vtpm_cancel(chip);
|
|
return -ETIME;
|
|
}
|
|
|
|
return count;
|
|
}
|
|
|
|
static int vtpm_recv(struct tpm_chip *chip, u8 *buf, size_t count)
|
|
{
|
|
struct tpm_private *priv = dev_get_drvdata(&chip->dev);
|
|
struct vtpm_shared_page *shr = priv->shr;
|
|
unsigned int offset = shr_data_offset(shr);
|
|
size_t length = shr->length;
|
|
|
|
if (shr->state == VTPM_STATE_IDLE)
|
|
return -ECANCELED;
|
|
|
|
/* In theory the wait at the end of _send makes this one unnecessary */
|
|
if (wait_for_tpm_stat(chip, VTPM_STATUS_RESULT, chip->timeout_c,
|
|
&priv->read_queue, true) < 0) {
|
|
vtpm_cancel(chip);
|
|
return -ETIME;
|
|
}
|
|
|
|
if (offset > PAGE_SIZE)
|
|
return -EIO;
|
|
|
|
if (offset + length > PAGE_SIZE)
|
|
length = PAGE_SIZE - offset;
|
|
|
|
if (length > count)
|
|
length = count;
|
|
|
|
memcpy(buf, offset + (u8 *)shr, length);
|
|
|
|
return length;
|
|
}
|
|
|
|
static const struct tpm_class_ops tpm_vtpm = {
|
|
.status = vtpm_status,
|
|
.recv = vtpm_recv,
|
|
.send = vtpm_send,
|
|
.cancel = vtpm_cancel,
|
|
.req_complete_mask = VTPM_STATUS_IDLE | VTPM_STATUS_RESULT,
|
|
.req_complete_val = VTPM_STATUS_IDLE | VTPM_STATUS_RESULT,
|
|
.req_canceled = vtpm_req_canceled,
|
|
};
|
|
|
|
static irqreturn_t tpmif_interrupt(int dummy, void *dev_id)
|
|
{
|
|
struct tpm_private *priv = dev_id;
|
|
|
|
switch (priv->shr->state) {
|
|
case VTPM_STATE_IDLE:
|
|
case VTPM_STATE_FINISH:
|
|
wake_up_interruptible(&priv->read_queue);
|
|
break;
|
|
case VTPM_STATE_SUBMIT:
|
|
case VTPM_STATE_CANCEL:
|
|
default:
|
|
break;
|
|
}
|
|
return IRQ_HANDLED;
|
|
}
|
|
|
|
static int setup_chip(struct device *dev, struct tpm_private *priv)
|
|
{
|
|
struct tpm_chip *chip;
|
|
|
|
chip = tpmm_chip_alloc(dev, &tpm_vtpm);
|
|
if (IS_ERR(chip))
|
|
return PTR_ERR(chip);
|
|
|
|
init_waitqueue_head(&priv->read_queue);
|
|
|
|
priv->chip = chip;
|
|
dev_set_drvdata(&chip->dev, priv);
|
|
|
|
return 0;
|
|
}
|
|
|
|
/* caller must clean up in case of errors */
|
|
static int setup_ring(struct xenbus_device *dev, struct tpm_private *priv)
|
|
{
|
|
struct xenbus_transaction xbt;
|
|
const char *message = NULL;
|
|
int rv;
|
|
grant_ref_t gref;
|
|
|
|
priv->shr = (void *)__get_free_page(GFP_KERNEL|__GFP_ZERO);
|
|
if (!priv->shr) {
|
|
xenbus_dev_fatal(dev, -ENOMEM, "allocating shared ring");
|
|
return -ENOMEM;
|
|
}
|
|
|
|
rv = xenbus_grant_ring(dev, priv->shr, 1, &gref);
|
|
if (rv < 0)
|
|
return rv;
|
|
|
|
priv->ring_ref = gref;
|
|
|
|
rv = xenbus_alloc_evtchn(dev, &priv->evtchn);
|
|
if (rv)
|
|
return rv;
|
|
|
|
rv = bind_evtchn_to_irqhandler(priv->evtchn, tpmif_interrupt, 0,
|
|
"tpmif", priv);
|
|
if (rv <= 0) {
|
|
xenbus_dev_fatal(dev, rv, "allocating TPM irq");
|
|
return rv;
|
|
}
|
|
priv->irq = rv;
|
|
|
|
again:
|
|
rv = xenbus_transaction_start(&xbt);
|
|
if (rv) {
|
|
xenbus_dev_fatal(dev, rv, "starting transaction");
|
|
return rv;
|
|
}
|
|
|
|
rv = xenbus_printf(xbt, dev->nodename,
|
|
"ring-ref", "%u", priv->ring_ref);
|
|
if (rv) {
|
|
message = "writing ring-ref";
|
|
goto abort_transaction;
|
|
}
|
|
|
|
rv = xenbus_printf(xbt, dev->nodename, "event-channel", "%u",
|
|
priv->evtchn);
|
|
if (rv) {
|
|
message = "writing event-channel";
|
|
goto abort_transaction;
|
|
}
|
|
|
|
rv = xenbus_printf(xbt, dev->nodename, "feature-protocol-v2", "1");
|
|
if (rv) {
|
|
message = "writing feature-protocol-v2";
|
|
goto abort_transaction;
|
|
}
|
|
|
|
rv = xenbus_transaction_end(xbt, 0);
|
|
if (rv == -EAGAIN)
|
|
goto again;
|
|
if (rv) {
|
|
xenbus_dev_fatal(dev, rv, "completing transaction");
|
|
return rv;
|
|
}
|
|
|
|
xenbus_switch_state(dev, XenbusStateInitialised);
|
|
|
|
return 0;
|
|
|
|
abort_transaction:
|
|
xenbus_transaction_end(xbt, 1);
|
|
if (message)
|
|
xenbus_dev_error(dev, rv, "%s", message);
|
|
|
|
return rv;
|
|
}
|
|
|
|
static void ring_free(struct tpm_private *priv)
|
|
{
|
|
if (!priv)
|
|
return;
|
|
|
|
if (priv->ring_ref)
|
|
gnttab_end_foreign_access(priv->ring_ref, 0,
|
|
(unsigned long)priv->shr);
|
|
else
|
|
free_page((unsigned long)priv->shr);
|
|
|
|
if (priv->irq)
|
|
unbind_from_irqhandler(priv->irq, priv);
|
|
|
|
kfree(priv);
|
|
}
|
|
|
|
static int tpmfront_probe(struct xenbus_device *dev,
|
|
const struct xenbus_device_id *id)
|
|
{
|
|
struct tpm_private *priv;
|
|
struct tpm_chip *chip;
|
|
int rv;
|
|
|
|
priv = kzalloc(sizeof(*priv), GFP_KERNEL);
|
|
if (!priv) {
|
|
xenbus_dev_fatal(dev, -ENOMEM, "allocating priv structure");
|
|
return -ENOMEM;
|
|
}
|
|
|
|
rv = setup_chip(&dev->dev, priv);
|
|
if (rv) {
|
|
kfree(priv);
|
|
return rv;
|
|
}
|
|
|
|
rv = setup_ring(dev, priv);
|
|
if (rv) {
|
|
chip = dev_get_drvdata(&dev->dev);
|
|
ring_free(priv);
|
|
return rv;
|
|
}
|
|
|
|
tpm_get_timeouts(priv->chip);
|
|
|
|
return tpm_chip_register(priv->chip);
|
|
}
|
|
|
|
static int tpmfront_remove(struct xenbus_device *dev)
|
|
{
|
|
struct tpm_chip *chip = dev_get_drvdata(&dev->dev);
|
|
struct tpm_private *priv = dev_get_drvdata(&chip->dev);
|
|
tpm_chip_unregister(chip);
|
|
ring_free(priv);
|
|
dev_set_drvdata(&chip->dev, NULL);
|
|
return 0;
|
|
}
|
|
|
|
static int tpmfront_resume(struct xenbus_device *dev)
|
|
{
|
|
/* A suspend/resume/migrate will interrupt a vTPM anyway */
|
|
tpmfront_remove(dev);
|
|
return tpmfront_probe(dev, NULL);
|
|
}
|
|
|
|
static void backend_changed(struct xenbus_device *dev,
|
|
enum xenbus_state backend_state)
|
|
{
|
|
int val;
|
|
|
|
switch (backend_state) {
|
|
case XenbusStateInitialised:
|
|
case XenbusStateConnected:
|
|
if (dev->state == XenbusStateConnected)
|
|
break;
|
|
|
|
if (xenbus_scanf(XBT_NIL, dev->otherend,
|
|
"feature-protocol-v2", "%d", &val) < 0)
|
|
val = 0;
|
|
if (!val) {
|
|
xenbus_dev_fatal(dev, -EINVAL,
|
|
"vTPM protocol 2 required");
|
|
return;
|
|
}
|
|
xenbus_switch_state(dev, XenbusStateConnected);
|
|
break;
|
|
|
|
case XenbusStateClosing:
|
|
case XenbusStateClosed:
|
|
device_unregister(&dev->dev);
|
|
xenbus_frontend_closed(dev);
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
}
|
|
|
|
static const struct xenbus_device_id tpmfront_ids[] = {
|
|
{ "vtpm" },
|
|
{ "" }
|
|
};
|
|
MODULE_ALIAS("xen:vtpm");
|
|
|
|
static struct xenbus_driver tpmfront_driver = {
|
|
.ids = tpmfront_ids,
|
|
.probe = tpmfront_probe,
|
|
.remove = tpmfront_remove,
|
|
.resume = tpmfront_resume,
|
|
.otherend_changed = backend_changed,
|
|
};
|
|
|
|
static int __init xen_tpmfront_init(void)
|
|
{
|
|
if (!xen_domain())
|
|
return -ENODEV;
|
|
|
|
if (!xen_has_pv_devices())
|
|
return -ENODEV;
|
|
|
|
return xenbus_register_frontend(&tpmfront_driver);
|
|
}
|
|
module_init(xen_tpmfront_init);
|
|
|
|
static void __exit xen_tpmfront_exit(void)
|
|
{
|
|
xenbus_unregister_driver(&tpmfront_driver);
|
|
}
|
|
module_exit(xen_tpmfront_exit);
|
|
|
|
MODULE_AUTHOR("Daniel De Graaf <dgdegra@tycho.nsa.gov>");
|
|
MODULE_DESCRIPTION("Xen vTPM Driver");
|
|
MODULE_LICENSE("GPL");
|