PM / sleep: Asynchronous threads for suspend_noirq
[linux/fpc-iii.git] / drivers / char / tpm / xen-tpmfront.c
blob2064b4527040be68920c3ef9e557b090ca587f7a
1 /*
2 * Implementation of the Xen vTPM device frontend
4 * Author: Daniel De Graaf <dgdegra@tycho.nsa.gov>
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License version 2,
8 * as published by the Free Software Foundation.
9 */
10 #include <linux/errno.h>
11 #include <linux/err.h>
12 #include <linux/interrupt.h>
13 #include <xen/xen.h>
14 #include <xen/events.h>
15 #include <xen/interface/io/tpmif.h>
16 #include <xen/grant_table.h>
17 #include <xen/xenbus.h>
18 #include <xen/page.h>
19 #include "tpm.h"
20 #include <xen/platform_pci.h>
22 struct tpm_private {
23 struct tpm_chip *chip;
24 struct xenbus_device *dev;
26 struct vtpm_shared_page *shr;
28 unsigned int evtchn;
29 int ring_ref;
30 domid_t backend_id;
33 enum status_bits {
34 VTPM_STATUS_RUNNING = 0x1,
35 VTPM_STATUS_IDLE = 0x2,
36 VTPM_STATUS_RESULT = 0x4,
37 VTPM_STATUS_CANCELED = 0x8,
40 static u8 vtpm_status(struct tpm_chip *chip)
42 struct tpm_private *priv = TPM_VPRIV(chip);
43 switch (priv->shr->state) {
44 case VTPM_STATE_IDLE:
45 return VTPM_STATUS_IDLE | VTPM_STATUS_CANCELED;
46 case VTPM_STATE_FINISH:
47 return VTPM_STATUS_IDLE | VTPM_STATUS_RESULT;
48 case VTPM_STATE_SUBMIT:
49 case VTPM_STATE_CANCEL: /* cancel requested, not yet canceled */
50 return VTPM_STATUS_RUNNING;
51 default:
52 return 0;
56 static bool vtpm_req_canceled(struct tpm_chip *chip, u8 status)
58 return status & VTPM_STATUS_CANCELED;
61 static void vtpm_cancel(struct tpm_chip *chip)
63 struct tpm_private *priv = TPM_VPRIV(chip);
64 priv->shr->state = VTPM_STATE_CANCEL;
65 wmb();
66 notify_remote_via_evtchn(priv->evtchn);
69 static unsigned int shr_data_offset(struct vtpm_shared_page *shr)
71 return sizeof(*shr) + sizeof(u32) * shr->nr_extra_pages;
74 static int vtpm_send(struct tpm_chip *chip, u8 *buf, size_t count)
76 struct tpm_private *priv = TPM_VPRIV(chip);
77 struct vtpm_shared_page *shr = priv->shr;
78 unsigned int offset = shr_data_offset(shr);
80 u32 ordinal;
81 unsigned long duration;
83 if (offset > PAGE_SIZE)
84 return -EINVAL;
86 if (offset + count > PAGE_SIZE)
87 return -EINVAL;
89 /* Wait for completion of any existing command or cancellation */
90 if (wait_for_tpm_stat(chip, VTPM_STATUS_IDLE, chip->vendor.timeout_c,
91 &chip->vendor.read_queue, true) < 0) {
92 vtpm_cancel(chip);
93 return -ETIME;
96 memcpy(offset + (u8 *)shr, buf, count);
97 shr->length = count;
98 barrier();
99 shr->state = VTPM_STATE_SUBMIT;
100 wmb();
101 notify_remote_via_evtchn(priv->evtchn);
103 ordinal = be32_to_cpu(((struct tpm_input_header*)buf)->ordinal);
104 duration = tpm_calc_ordinal_duration(chip, ordinal);
106 if (wait_for_tpm_stat(chip, VTPM_STATUS_IDLE, duration,
107 &chip->vendor.read_queue, true) < 0) {
108 /* got a signal or timeout, try to cancel */
109 vtpm_cancel(chip);
110 return -ETIME;
113 return count;
116 static int vtpm_recv(struct tpm_chip *chip, u8 *buf, size_t count)
118 struct tpm_private *priv = TPM_VPRIV(chip);
119 struct vtpm_shared_page *shr = priv->shr;
120 unsigned int offset = shr_data_offset(shr);
121 size_t length = shr->length;
123 if (shr->state == VTPM_STATE_IDLE)
124 return -ECANCELED;
126 /* In theory the wait at the end of _send makes this one unnecessary */
127 if (wait_for_tpm_stat(chip, VTPM_STATUS_RESULT, chip->vendor.timeout_c,
128 &chip->vendor.read_queue, true) < 0) {
129 vtpm_cancel(chip);
130 return -ETIME;
133 if (offset > PAGE_SIZE)
134 return -EIO;
136 if (offset + length > PAGE_SIZE)
137 length = PAGE_SIZE - offset;
139 if (length > count)
140 length = count;
142 memcpy(buf, offset + (u8 *)shr, length);
144 return length;
147 static const struct tpm_class_ops tpm_vtpm = {
148 .status = vtpm_status,
149 .recv = vtpm_recv,
150 .send = vtpm_send,
151 .cancel = vtpm_cancel,
152 .req_complete_mask = VTPM_STATUS_IDLE | VTPM_STATUS_RESULT,
153 .req_complete_val = VTPM_STATUS_IDLE | VTPM_STATUS_RESULT,
154 .req_canceled = vtpm_req_canceled,
157 static irqreturn_t tpmif_interrupt(int dummy, void *dev_id)
159 struct tpm_private *priv = dev_id;
161 switch (priv->shr->state) {
162 case VTPM_STATE_IDLE:
163 case VTPM_STATE_FINISH:
164 wake_up_interruptible(&priv->chip->vendor.read_queue);
165 break;
166 case VTPM_STATE_SUBMIT:
167 case VTPM_STATE_CANCEL:
168 default:
169 break;
171 return IRQ_HANDLED;
174 static int setup_chip(struct device *dev, struct tpm_private *priv)
176 struct tpm_chip *chip;
178 chip = tpm_register_hardware(dev, &tpm_vtpm);
179 if (!chip)
180 return -ENODEV;
182 init_waitqueue_head(&chip->vendor.read_queue);
184 priv->chip = chip;
185 TPM_VPRIV(chip) = priv;
187 return 0;
190 /* caller must clean up in case of errors */
191 static int setup_ring(struct xenbus_device *dev, struct tpm_private *priv)
193 struct xenbus_transaction xbt;
194 const char *message = NULL;
195 int rv;
197 priv->shr = (void *)__get_free_page(GFP_KERNEL|__GFP_ZERO);
198 if (!priv->shr) {
199 xenbus_dev_fatal(dev, -ENOMEM, "allocating shared ring");
200 return -ENOMEM;
203 rv = xenbus_grant_ring(dev, virt_to_mfn(priv->shr));
204 if (rv < 0)
205 return rv;
207 priv->ring_ref = rv;
209 rv = xenbus_alloc_evtchn(dev, &priv->evtchn);
210 if (rv)
211 return rv;
213 rv = bind_evtchn_to_irqhandler(priv->evtchn, tpmif_interrupt, 0,
214 "tpmif", priv);
215 if (rv <= 0) {
216 xenbus_dev_fatal(dev, rv, "allocating TPM irq");
217 return rv;
219 priv->chip->vendor.irq = rv;
221 again:
222 rv = xenbus_transaction_start(&xbt);
223 if (rv) {
224 xenbus_dev_fatal(dev, rv, "starting transaction");
225 return rv;
228 rv = xenbus_printf(xbt, dev->nodename,
229 "ring-ref", "%u", priv->ring_ref);
230 if (rv) {
231 message = "writing ring-ref";
232 goto abort_transaction;
235 rv = xenbus_printf(xbt, dev->nodename, "event-channel", "%u",
236 priv->evtchn);
237 if (rv) {
238 message = "writing event-channel";
239 goto abort_transaction;
242 rv = xenbus_printf(xbt, dev->nodename, "feature-protocol-v2", "1");
243 if (rv) {
244 message = "writing feature-protocol-v2";
245 goto abort_transaction;
248 rv = xenbus_transaction_end(xbt, 0);
249 if (rv == -EAGAIN)
250 goto again;
251 if (rv) {
252 xenbus_dev_fatal(dev, rv, "completing transaction");
253 return rv;
256 xenbus_switch_state(dev, XenbusStateInitialised);
258 return 0;
260 abort_transaction:
261 xenbus_transaction_end(xbt, 1);
262 if (message)
263 xenbus_dev_error(dev, rv, "%s", message);
265 return rv;
268 static void ring_free(struct tpm_private *priv)
270 if (!priv)
271 return;
273 if (priv->ring_ref)
274 gnttab_end_foreign_access(priv->ring_ref, 0,
275 (unsigned long)priv->shr);
276 else
277 free_page((unsigned long)priv->shr);
279 if (priv->chip && priv->chip->vendor.irq)
280 unbind_from_irqhandler(priv->chip->vendor.irq, priv);
282 kfree(priv);
285 static int tpmfront_probe(struct xenbus_device *dev,
286 const struct xenbus_device_id *id)
288 struct tpm_private *priv;
289 int rv;
291 priv = kzalloc(sizeof(*priv), GFP_KERNEL);
292 if (!priv) {
293 xenbus_dev_fatal(dev, -ENOMEM, "allocating priv structure");
294 return -ENOMEM;
297 rv = setup_chip(&dev->dev, priv);
298 if (rv) {
299 kfree(priv);
300 return rv;
303 rv = setup_ring(dev, priv);
304 if (rv) {
305 tpm_remove_hardware(&dev->dev);
306 ring_free(priv);
307 return rv;
310 tpm_get_timeouts(priv->chip);
312 return rv;
315 static int tpmfront_remove(struct xenbus_device *dev)
317 struct tpm_chip *chip = dev_get_drvdata(&dev->dev);
318 struct tpm_private *priv = TPM_VPRIV(chip);
319 tpm_remove_hardware(&dev->dev);
320 ring_free(priv);
321 TPM_VPRIV(chip) = NULL;
322 return 0;
325 static int tpmfront_resume(struct xenbus_device *dev)
327 /* A suspend/resume/migrate will interrupt a vTPM anyway */
328 tpmfront_remove(dev);
329 return tpmfront_probe(dev, NULL);
332 static void backend_changed(struct xenbus_device *dev,
333 enum xenbus_state backend_state)
335 int val;
337 switch (backend_state) {
338 case XenbusStateInitialised:
339 case XenbusStateConnected:
340 if (dev->state == XenbusStateConnected)
341 break;
343 if (xenbus_scanf(XBT_NIL, dev->otherend,
344 "feature-protocol-v2", "%d", &val) < 0)
345 val = 0;
346 if (!val) {
347 xenbus_dev_fatal(dev, -EINVAL,
348 "vTPM protocol 2 required");
349 return;
351 xenbus_switch_state(dev, XenbusStateConnected);
352 break;
354 case XenbusStateClosing:
355 case XenbusStateClosed:
356 device_unregister(&dev->dev);
357 xenbus_frontend_closed(dev);
358 break;
359 default:
360 break;
364 static const struct xenbus_device_id tpmfront_ids[] = {
365 { "vtpm" },
366 { "" }
368 MODULE_ALIAS("xen:vtpm");
370 static DEFINE_XENBUS_DRIVER(tpmfront, ,
371 .probe = tpmfront_probe,
372 .remove = tpmfront_remove,
373 .resume = tpmfront_resume,
374 .otherend_changed = backend_changed,
377 static int __init xen_tpmfront_init(void)
379 if (!xen_domain())
380 return -ENODEV;
382 if (!xen_has_pv_devices())
383 return -ENODEV;
385 return xenbus_register_frontend(&tpmfront_driver);
387 module_init(xen_tpmfront_init);
389 static void __exit xen_tpmfront_exit(void)
391 xenbus_unregister_driver(&tpmfront_driver);
393 module_exit(xen_tpmfront_exit);
395 MODULE_AUTHOR("Daniel De Graaf <dgdegra@tycho.nsa.gov>");
396 MODULE_DESCRIPTION("Xen vTPM Driver");
397 MODULE_LICENSE("GPL");