]>
Commit | Line | Data |
---|---|---|
27084efe LD |
1 | /* |
2 | * Copyright (C) 2005, 2006 IBM Corporation | |
3 | * | |
4 | * Authors: | |
5 | * Leendert van Doorn <[email protected]> | |
6 | * Kylene Hall <[email protected]> | |
7 | * | |
8 | * Device driver for TCG/TCPA TPM (trusted platform module). | |
9 | * Specifications at www.trustedcomputinggroup.org | |
10 | * | |
11 | * This device driver implements the TPM interface as defined in | |
12 | * the TCG TPM Interface Spec version 1.2, revision 1.0. | |
13 | * | |
14 | * This program is free software; you can redistribute it and/or | |
15 | * modify it under the terms of the GNU General Public License as | |
16 | * published by the Free Software Foundation, version 2 of the | |
17 | * License. | |
18 | */ | |
57135568 KJH |
19 | #include <linux/init.h> |
20 | #include <linux/module.h> | |
21 | #include <linux/moduleparam.h> | |
27084efe LD |
22 | #include <linux/pnp.h> |
23 | #include <linux/interrupt.h> | |
24 | #include <linux/wait.h> | |
25 | #include "tpm.h" | |
26 | ||
27 | #define TPM_HEADER_SIZE 10 | |
28 | ||
29 | enum tis_access { | |
30 | TPM_ACCESS_VALID = 0x80, | |
31 | TPM_ACCESS_ACTIVE_LOCALITY = 0x20, | |
32 | TPM_ACCESS_REQUEST_PENDING = 0x04, | |
33 | TPM_ACCESS_REQUEST_USE = 0x02, | |
34 | }; | |
35 | ||
36 | enum tis_status { | |
37 | TPM_STS_VALID = 0x80, | |
38 | TPM_STS_COMMAND_READY = 0x40, | |
39 | TPM_STS_GO = 0x20, | |
40 | TPM_STS_DATA_AVAIL = 0x10, | |
41 | TPM_STS_DATA_EXPECT = 0x08, | |
42 | }; | |
43 | ||
44 | enum tis_int_flags { | |
45 | TPM_GLOBAL_INT_ENABLE = 0x80000000, | |
46 | TPM_INTF_BURST_COUNT_STATIC = 0x100, | |
47 | TPM_INTF_CMD_READY_INT = 0x080, | |
48 | TPM_INTF_INT_EDGE_FALLING = 0x040, | |
49 | TPM_INTF_INT_EDGE_RISING = 0x020, | |
50 | TPM_INTF_INT_LEVEL_LOW = 0x010, | |
51 | TPM_INTF_INT_LEVEL_HIGH = 0x008, | |
52 | TPM_INTF_LOCALITY_CHANGE_INT = 0x004, | |
53 | TPM_INTF_STS_VALID_INT = 0x002, | |
54 | TPM_INTF_DATA_AVAIL_INT = 0x001, | |
55 | }; | |
56 | ||
36b20020 | 57 | enum tis_defaults { |
2a7362f5 | 58 | TIS_MEM_BASE = 0xFED40000, |
b09d5300 | 59 | TIS_MEM_LEN = 0x5000, |
cb535425 KJH |
60 | TIS_SHORT_TIMEOUT = 750, /* ms */ |
61 | TIS_LONG_TIMEOUT = 2000, /* 2 sec */ | |
36b20020 KJH |
62 | }; |
63 | ||
27084efe LD |
64 | #define TPM_ACCESS(l) (0x0000 | ((l) << 12)) |
65 | #define TPM_INT_ENABLE(l) (0x0008 | ((l) << 12)) | |
66 | #define TPM_INT_VECTOR(l) (0x000C | ((l) << 12)) | |
67 | #define TPM_INT_STATUS(l) (0x0010 | ((l) << 12)) | |
68 | #define TPM_INTF_CAPS(l) (0x0014 | ((l) << 12)) | |
69 | #define TPM_STS(l) (0x0018 | ((l) << 12)) | |
70 | #define TPM_DATA_FIFO(l) (0x0024 | ((l) << 12)) | |
71 | ||
72 | #define TPM_DID_VID(l) (0x0F00 | ((l) << 12)) | |
73 | #define TPM_RID(l) (0x0F04 | ((l) << 12)) | |
74 | ||
75 | static LIST_HEAD(tis_chips); | |
76 | static DEFINE_SPINLOCK(tis_lock); | |
77 | ||
78 | static int check_locality(struct tpm_chip *chip, int l) | |
79 | { | |
80 | if ((ioread8(chip->vendor.iobase + TPM_ACCESS(l)) & | |
81 | (TPM_ACCESS_ACTIVE_LOCALITY | TPM_ACCESS_VALID)) == | |
82 | (TPM_ACCESS_ACTIVE_LOCALITY | TPM_ACCESS_VALID)) | |
83 | return chip->vendor.locality = l; | |
84 | ||
85 | return -1; | |
86 | } | |
87 | ||
88 | static void release_locality(struct tpm_chip *chip, int l, int force) | |
89 | { | |
90 | if (force || (ioread8(chip->vendor.iobase + TPM_ACCESS(l)) & | |
91 | (TPM_ACCESS_REQUEST_PENDING | TPM_ACCESS_VALID)) == | |
92 | (TPM_ACCESS_REQUEST_PENDING | TPM_ACCESS_VALID)) | |
93 | iowrite8(TPM_ACCESS_ACTIVE_LOCALITY, | |
94 | chip->vendor.iobase + TPM_ACCESS(l)); | |
95 | } | |
96 | ||
97 | static int request_locality(struct tpm_chip *chip, int l) | |
98 | { | |
99 | unsigned long stop; | |
100 | long rc; | |
101 | ||
102 | if (check_locality(chip, l) >= 0) | |
103 | return l; | |
104 | ||
105 | iowrite8(TPM_ACCESS_REQUEST_USE, | |
106 | chip->vendor.iobase + TPM_ACCESS(l)); | |
107 | ||
108 | if (chip->vendor.irq) { | |
36b20020 | 109 | rc = wait_event_interruptible_timeout(chip->vendor.int_queue, |
27084efe LD |
110 | (check_locality |
111 | (chip, l) >= 0), | |
36b20020 | 112 | chip->vendor.timeout_a); |
27084efe LD |
113 | if (rc > 0) |
114 | return l; | |
115 | ||
116 | } else { | |
117 | /* wait for burstcount */ | |
36b20020 | 118 | stop = jiffies + chip->vendor.timeout_a; |
27084efe LD |
119 | do { |
120 | if (check_locality(chip, l) >= 0) | |
121 | return l; | |
122 | msleep(TPM_TIMEOUT); | |
123 | } | |
124 | while (time_before(jiffies, stop)); | |
125 | } | |
126 | return -1; | |
127 | } | |
128 | ||
129 | static u8 tpm_tis_status(struct tpm_chip *chip) | |
130 | { | |
131 | return ioread8(chip->vendor.iobase + | |
132 | TPM_STS(chip->vendor.locality)); | |
133 | } | |
134 | ||
135 | static void tpm_tis_ready(struct tpm_chip *chip) | |
136 | { | |
137 | /* this causes the current command to be aborted */ | |
138 | iowrite8(TPM_STS_COMMAND_READY, | |
139 | chip->vendor.iobase + TPM_STS(chip->vendor.locality)); | |
140 | } | |
141 | ||
142 | static int get_burstcount(struct tpm_chip *chip) | |
143 | { | |
144 | unsigned long stop; | |
145 | int burstcnt; | |
146 | ||
147 | /* wait for burstcount */ | |
148 | /* which timeout value, spec has 2 answers (c & d) */ | |
36b20020 | 149 | stop = jiffies + chip->vendor.timeout_d; |
27084efe LD |
150 | do { |
151 | burstcnt = ioread8(chip->vendor.iobase + | |
152 | TPM_STS(chip->vendor.locality) + 1); | |
153 | burstcnt += ioread8(chip->vendor.iobase + | |
154 | TPM_STS(chip->vendor.locality) + | |
155 | 2) << 8; | |
156 | if (burstcnt) | |
157 | return burstcnt; | |
158 | msleep(TPM_TIMEOUT); | |
159 | } while (time_before(jiffies, stop)); | |
160 | return -EBUSY; | |
161 | } | |
162 | ||
36b20020 | 163 | static int wait_for_stat(struct tpm_chip *chip, u8 mask, unsigned long timeout, |
27084efe LD |
164 | wait_queue_head_t *queue) |
165 | { | |
166 | unsigned long stop; | |
167 | long rc; | |
168 | u8 status; | |
169 | ||
170 | /* check current status */ | |
171 | status = tpm_tis_status(chip); | |
172 | if ((status & mask) == mask) | |
173 | return 0; | |
174 | ||
175 | if (chip->vendor.irq) { | |
176 | rc = wait_event_interruptible_timeout(*queue, | |
177 | ((tpm_tis_status | |
178 | (chip) & mask) == | |
36b20020 | 179 | mask), timeout); |
27084efe LD |
180 | if (rc > 0) |
181 | return 0; | |
182 | } else { | |
36b20020 | 183 | stop = jiffies + timeout; |
27084efe LD |
184 | do { |
185 | msleep(TPM_TIMEOUT); | |
186 | status = tpm_tis_status(chip); | |
187 | if ((status & mask) == mask) | |
188 | return 0; | |
189 | } while (time_before(jiffies, stop)); | |
190 | } | |
191 | return -ETIME; | |
192 | } | |
193 | ||
cb535425 | 194 | static int recv_data(struct tpm_chip *chip, u8 *buf, size_t count) |
27084efe LD |
195 | { |
196 | int size = 0, burstcnt; | |
197 | while (size < count && | |
198 | wait_for_stat(chip, | |
199 | TPM_STS_DATA_AVAIL | TPM_STS_VALID, | |
200 | chip->vendor.timeout_c, | |
201 | &chip->vendor.read_queue) | |
202 | == 0) { | |
203 | burstcnt = get_burstcount(chip); | |
204 | for (; burstcnt > 0 && size < count; burstcnt--) | |
205 | buf[size++] = ioread8(chip->vendor.iobase + | |
206 | TPM_DATA_FIFO(chip->vendor. | |
207 | locality)); | |
208 | } | |
209 | return size; | |
210 | } | |
211 | ||
cb535425 | 212 | static int tpm_tis_recv(struct tpm_chip *chip, u8 *buf, size_t count) |
27084efe LD |
213 | { |
214 | int size = 0; | |
215 | int expected, status; | |
216 | ||
217 | if (count < TPM_HEADER_SIZE) { | |
218 | size = -EIO; | |
219 | goto out; | |
220 | } | |
221 | ||
222 | /* read first 10 bytes, including tag, paramsize, and result */ | |
223 | if ((size = | |
224 | recv_data(chip, buf, TPM_HEADER_SIZE)) < TPM_HEADER_SIZE) { | |
225 | dev_err(chip->dev, "Unable to read header\n"); | |
226 | goto out; | |
227 | } | |
228 | ||
229 | expected = be32_to_cpu(*(__be32 *) (buf + 2)); | |
230 | if (expected > count) { | |
231 | size = -EIO; | |
232 | goto out; | |
233 | } | |
234 | ||
235 | if ((size += | |
236 | recv_data(chip, &buf[TPM_HEADER_SIZE], | |
237 | expected - TPM_HEADER_SIZE)) < expected) { | |
238 | dev_err(chip->dev, "Unable to read remainder of result\n"); | |
239 | size = -ETIME; | |
240 | goto out; | |
241 | } | |
242 | ||
243 | wait_for_stat(chip, TPM_STS_VALID, chip->vendor.timeout_c, | |
244 | &chip->vendor.int_queue); | |
245 | status = tpm_tis_status(chip); | |
246 | if (status & TPM_STS_DATA_AVAIL) { /* retry? */ | |
247 | dev_err(chip->dev, "Error left over data\n"); | |
248 | size = -EIO; | |
249 | goto out; | |
250 | } | |
251 | ||
252 | out: | |
253 | tpm_tis_ready(chip); | |
254 | release_locality(chip, chip->vendor.locality, 0); | |
255 | return size; | |
256 | } | |
257 | ||
258 | /* | |
259 | * If interrupts are used (signaled by an irq set in the vendor structure) | |
260 | * tpm.c can skip polling for the data to be available as the interrupt is | |
261 | * waited for here | |
262 | */ | |
cb535425 | 263 | static int tpm_tis_send(struct tpm_chip *chip, u8 *buf, size_t len) |
27084efe LD |
264 | { |
265 | int rc, status, burstcnt; | |
266 | size_t count = 0; | |
267 | u32 ordinal; | |
268 | ||
269 | if (request_locality(chip, 0) < 0) | |
270 | return -EBUSY; | |
271 | ||
272 | status = tpm_tis_status(chip); | |
273 | if ((status & TPM_STS_COMMAND_READY) == 0) { | |
274 | tpm_tis_ready(chip); | |
275 | if (wait_for_stat | |
276 | (chip, TPM_STS_COMMAND_READY, chip->vendor.timeout_b, | |
277 | &chip->vendor.int_queue) < 0) { | |
278 | rc = -ETIME; | |
279 | goto out_err; | |
280 | } | |
281 | } | |
282 | ||
283 | while (count < len - 1) { | |
284 | burstcnt = get_burstcount(chip); | |
285 | for (; burstcnt > 0 && count < len - 1; burstcnt--) { | |
286 | iowrite8(buf[count], chip->vendor.iobase + | |
287 | TPM_DATA_FIFO(chip->vendor.locality)); | |
288 | count++; | |
289 | } | |
290 | ||
291 | wait_for_stat(chip, TPM_STS_VALID, chip->vendor.timeout_c, | |
292 | &chip->vendor.int_queue); | |
293 | status = tpm_tis_status(chip); | |
294 | if ((status & TPM_STS_DATA_EXPECT) == 0) { | |
295 | rc = -EIO; | |
296 | goto out_err; | |
297 | } | |
298 | } | |
299 | ||
300 | /* write last byte */ | |
301 | iowrite8(buf[count], | |
302 | chip->vendor.iobase + | |
303 | TPM_DATA_FIFO(chip->vendor.locality)); | |
304 | wait_for_stat(chip, TPM_STS_VALID, chip->vendor.timeout_c, | |
305 | &chip->vendor.int_queue); | |
306 | status = tpm_tis_status(chip); | |
307 | if ((status & TPM_STS_DATA_EXPECT) != 0) { | |
308 | rc = -EIO; | |
309 | goto out_err; | |
310 | } | |
311 | ||
312 | /* go and do it */ | |
313 | iowrite8(TPM_STS_GO, | |
314 | chip->vendor.iobase + TPM_STS(chip->vendor.locality)); | |
315 | ||
316 | if (chip->vendor.irq) { | |
317 | ordinal = be32_to_cpu(*((__be32 *) (buf + 6))); | |
318 | if (wait_for_stat | |
319 | (chip, TPM_STS_DATA_AVAIL | TPM_STS_VALID, | |
320 | tpm_calc_ordinal_duration(chip, ordinal), | |
321 | &chip->vendor.read_queue) < 0) { | |
322 | rc = -ETIME; | |
323 | goto out_err; | |
324 | } | |
325 | } | |
326 | return len; | |
327 | out_err: | |
328 | tpm_tis_ready(chip); | |
329 | release_locality(chip, chip->vendor.locality, 0); | |
330 | return rc; | |
331 | } | |
332 | ||
333 | static struct file_operations tis_ops = { | |
334 | .owner = THIS_MODULE, | |
335 | .llseek = no_llseek, | |
336 | .open = tpm_open, | |
337 | .read = tpm_read, | |
338 | .write = tpm_write, | |
339 | .release = tpm_release, | |
340 | }; | |
341 | ||
342 | static DEVICE_ATTR(pubek, S_IRUGO, tpm_show_pubek, NULL); | |
343 | static DEVICE_ATTR(pcrs, S_IRUGO, tpm_show_pcrs, NULL); | |
344 | static DEVICE_ATTR(enabled, S_IRUGO, tpm_show_enabled, NULL); | |
345 | static DEVICE_ATTR(active, S_IRUGO, tpm_show_active, NULL); | |
346 | static DEVICE_ATTR(owned, S_IRUGO, tpm_show_owned, NULL); | |
347 | static DEVICE_ATTR(temp_deactivated, S_IRUGO, tpm_show_temp_deactivated, | |
348 | NULL); | |
349 | static DEVICE_ATTR(caps, S_IRUGO, tpm_show_caps_1_2, NULL); | |
350 | static DEVICE_ATTR(cancel, S_IWUSR | S_IWGRP, NULL, tpm_store_cancel); | |
351 | ||
352 | static struct attribute *tis_attrs[] = { | |
353 | &dev_attr_pubek.attr, | |
354 | &dev_attr_pcrs.attr, | |
355 | &dev_attr_enabled.attr, | |
356 | &dev_attr_active.attr, | |
357 | &dev_attr_owned.attr, | |
358 | &dev_attr_temp_deactivated.attr, | |
359 | &dev_attr_caps.attr, | |
360 | &dev_attr_cancel.attr, NULL, | |
361 | }; | |
362 | ||
363 | static struct attribute_group tis_attr_grp = { | |
364 | .attrs = tis_attrs | |
365 | }; | |
366 | ||
367 | static struct tpm_vendor_specific tpm_tis = { | |
368 | .status = tpm_tis_status, | |
369 | .recv = tpm_tis_recv, | |
370 | .send = tpm_tis_send, | |
371 | .cancel = tpm_tis_ready, | |
372 | .req_complete_mask = TPM_STS_DATA_AVAIL | TPM_STS_VALID, | |
373 | .req_complete_val = TPM_STS_DATA_AVAIL | TPM_STS_VALID, | |
374 | .req_canceled = TPM_STS_COMMAND_READY, | |
375 | .attr_group = &tis_attr_grp, | |
376 | .miscdev = { | |
377 | .fops = &tis_ops,}, | |
378 | }; | |
379 | ||
cb535425 | 380 | static irqreturn_t tis_int_probe(int irq, void *dev_id, struct pt_regs *regs) |
27084efe LD |
381 | { |
382 | struct tpm_chip *chip = (struct tpm_chip *) dev_id; | |
383 | u32 interrupt; | |
384 | ||
385 | interrupt = ioread32(chip->vendor.iobase + | |
386 | TPM_INT_STATUS(chip->vendor.locality)); | |
387 | ||
388 | if (interrupt == 0) | |
389 | return IRQ_NONE; | |
390 | ||
391 | chip->vendor.irq = irq; | |
392 | ||
393 | /* Clear interrupts handled with TPM_EOI */ | |
394 | iowrite32(interrupt, | |
395 | chip->vendor.iobase + | |
396 | TPM_INT_STATUS(chip->vendor.locality)); | |
397 | return IRQ_HANDLED; | |
398 | } | |
399 | ||
cb535425 | 400 | static irqreturn_t tis_int_handler(int irq, void *dev_id, struct pt_regs *regs) |
27084efe LD |
401 | { |
402 | struct tpm_chip *chip = (struct tpm_chip *) dev_id; | |
403 | u32 interrupt; | |
404 | int i; | |
405 | ||
406 | interrupt = ioread32(chip->vendor.iobase + | |
407 | TPM_INT_STATUS(chip->vendor.locality)); | |
408 | ||
409 | if (interrupt == 0) | |
410 | return IRQ_NONE; | |
411 | ||
412 | if (interrupt & TPM_INTF_DATA_AVAIL_INT) | |
413 | wake_up_interruptible(&chip->vendor.read_queue); | |
414 | if (interrupt & TPM_INTF_LOCALITY_CHANGE_INT) | |
415 | for (i = 0; i < 5; i++) | |
416 | if (check_locality(chip, i) >= 0) | |
417 | break; | |
418 | if (interrupt & | |
419 | (TPM_INTF_LOCALITY_CHANGE_INT | TPM_INTF_STS_VALID_INT | | |
420 | TPM_INTF_CMD_READY_INT)) | |
421 | wake_up_interruptible(&chip->vendor.int_queue); | |
422 | ||
423 | /* Clear interrupts handled with TPM_EOI */ | |
424 | iowrite32(interrupt, | |
425 | chip->vendor.iobase + | |
426 | TPM_INT_STATUS(chip->vendor.locality)); | |
427 | return IRQ_HANDLED; | |
428 | } | |
429 | ||
57135568 KJH |
430 | static int interrupts = 1; |
431 | module_param(interrupts, bool, 0444); | |
432 | MODULE_PARM_DESC(interrupts, "Enable interrupts"); | |
433 | ||
cb535425 KJH |
434 | static int __devinit tpm_tis_pnp_init(struct pnp_dev *pnp_dev, |
435 | const struct pnp_device_id *pnp_id) | |
27084efe LD |
436 | { |
437 | u32 vendor, intfcaps, intmask; | |
438 | int rc, i; | |
439 | unsigned long start, len; | |
440 | struct tpm_chip *chip; | |
441 | ||
442 | start = pnp_mem_start(pnp_dev, 0); | |
443 | len = pnp_mem_len(pnp_dev, 0); | |
444 | ||
b09d5300 KJH |
445 | if (!start) |
446 | start = TIS_MEM_BASE; | |
447 | if (!len) | |
448 | len = TIS_MEM_LEN; | |
449 | ||
27084efe LD |
450 | if (!(chip = tpm_register_hardware(&pnp_dev->dev, &tpm_tis))) |
451 | return -ENODEV; | |
452 | ||
453 | chip->vendor.iobase = ioremap(start, len); | |
454 | if (!chip->vendor.iobase) { | |
455 | rc = -EIO; | |
456 | goto out_err; | |
457 | } | |
458 | ||
459 | vendor = ioread32(chip->vendor.iobase + TPM_DID_VID(0)); | |
27084efe LD |
460 | |
461 | /* Default timeouts */ | |
36b20020 KJH |
462 | chip->vendor.timeout_a = msecs_to_jiffies(TIS_SHORT_TIMEOUT); |
463 | chip->vendor.timeout_b = msecs_to_jiffies(TIS_LONG_TIMEOUT); | |
464 | chip->vendor.timeout_c = msecs_to_jiffies(TIS_SHORT_TIMEOUT); | |
465 | chip->vendor.timeout_d = msecs_to_jiffies(TIS_SHORT_TIMEOUT); | |
27084efe LD |
466 | |
467 | dev_info(&pnp_dev->dev, | |
468 | "1.2 TPM (device-id 0x%X, rev-id %d)\n", | |
469 | vendor >> 16, ioread8(chip->vendor.iobase + TPM_RID(0))); | |
470 | ||
471 | /* Figure out the capabilities */ | |
472 | intfcaps = | |
473 | ioread32(chip->vendor.iobase + | |
474 | TPM_INTF_CAPS(chip->vendor.locality)); | |
475 | dev_dbg(&pnp_dev->dev, "TPM interface capabilities (0x%x):\n", | |
476 | intfcaps); | |
477 | if (intfcaps & TPM_INTF_BURST_COUNT_STATIC) | |
478 | dev_dbg(&pnp_dev->dev, "\tBurst Count Static\n"); | |
479 | if (intfcaps & TPM_INTF_CMD_READY_INT) | |
480 | dev_dbg(&pnp_dev->dev, "\tCommand Ready Int Support\n"); | |
481 | if (intfcaps & TPM_INTF_INT_EDGE_FALLING) | |
482 | dev_dbg(&pnp_dev->dev, "\tInterrupt Edge Falling\n"); | |
483 | if (intfcaps & TPM_INTF_INT_EDGE_RISING) | |
484 | dev_dbg(&pnp_dev->dev, "\tInterrupt Edge Rising\n"); | |
485 | if (intfcaps & TPM_INTF_INT_LEVEL_LOW) | |
486 | dev_dbg(&pnp_dev->dev, "\tInterrupt Level Low\n"); | |
487 | if (intfcaps & TPM_INTF_INT_LEVEL_HIGH) | |
488 | dev_dbg(&pnp_dev->dev, "\tInterrupt Level High\n"); | |
489 | if (intfcaps & TPM_INTF_LOCALITY_CHANGE_INT) | |
490 | dev_dbg(&pnp_dev->dev, "\tLocality Change Int Support\n"); | |
491 | if (intfcaps & TPM_INTF_STS_VALID_INT) | |
492 | dev_dbg(&pnp_dev->dev, "\tSts Valid Int Support\n"); | |
493 | if (intfcaps & TPM_INTF_DATA_AVAIL_INT) | |
494 | dev_dbg(&pnp_dev->dev, "\tData Avail Int Support\n"); | |
495 | ||
496 | if (request_locality(chip, 0) != 0) { | |
497 | rc = -ENODEV; | |
498 | goto out_err; | |
499 | } | |
500 | ||
501 | /* INTERRUPT Setup */ | |
502 | init_waitqueue_head(&chip->vendor.read_queue); | |
503 | init_waitqueue_head(&chip->vendor.int_queue); | |
504 | ||
505 | intmask = | |
506 | ioread32(chip->vendor.iobase + | |
507 | TPM_INT_ENABLE(chip->vendor.locality)); | |
508 | ||
509 | intmask |= TPM_INTF_CMD_READY_INT | |
510 | | TPM_INTF_LOCALITY_CHANGE_INT | TPM_INTF_DATA_AVAIL_INT | |
511 | | TPM_INTF_STS_VALID_INT; | |
512 | ||
513 | iowrite32(intmask, | |
514 | chip->vendor.iobase + | |
515 | TPM_INT_ENABLE(chip->vendor.locality)); | |
57135568 KJH |
516 | if (interrupts) { |
517 | chip->vendor.irq = | |
518 | ioread8(chip->vendor.iobase + | |
519 | TPM_INT_VECTOR(chip->vendor.locality)); | |
520 | ||
521 | for (i = 3; i < 16 && chip->vendor.irq == 0; i++) { | |
522 | iowrite8(i, chip->vendor.iobase + | |
523 | TPM_INT_VECTOR(chip->vendor.locality)); | |
524 | if (request_irq | |
525 | (i, tis_int_probe, SA_SHIRQ, | |
526 | chip->vendor.miscdev.name, chip) != 0) { | |
527 | dev_info(chip->dev, | |
528 | "Unable to request irq: %d for probe\n", | |
529 | i); | |
530 | continue; | |
531 | } | |
27084efe | 532 | |
57135568 KJH |
533 | /* Clear all existing */ |
534 | iowrite32(ioread32 | |
535 | (chip->vendor.iobase + | |
536 | TPM_INT_STATUS(chip->vendor.locality)), | |
537 | chip->vendor.iobase + | |
538 | TPM_INT_STATUS(chip->vendor.locality)); | |
539 | ||
540 | /* Turn on */ | |
541 | iowrite32(intmask | TPM_GLOBAL_INT_ENABLE, | |
542 | chip->vendor.iobase + | |
543 | TPM_INT_ENABLE(chip->vendor.locality)); | |
544 | ||
545 | /* Generate Interrupts */ | |
546 | tpm_gen_interrupt(chip); | |
547 | ||
548 | /* Turn off */ | |
549 | iowrite32(intmask, | |
550 | chip->vendor.iobase + | |
551 | TPM_INT_ENABLE(chip->vendor.locality)); | |
552 | free_irq(i, chip); | |
27084efe | 553 | } |
27084efe LD |
554 | } |
555 | if (chip->vendor.irq) { | |
556 | iowrite8(chip->vendor.irq, | |
557 | chip->vendor.iobase + | |
558 | TPM_INT_VECTOR(chip->vendor.locality)); | |
559 | if (request_irq | |
560 | (chip->vendor.irq, tis_int_handler, SA_SHIRQ, | |
561 | chip->vendor.miscdev.name, chip) != 0) { | |
562 | dev_info(chip->dev, | |
57135568 KJH |
563 | "Unable to request irq: %d for use\n", |
564 | chip->vendor.irq); | |
27084efe LD |
565 | chip->vendor.irq = 0; |
566 | } else { | |
567 | /* Clear all existing */ | |
568 | iowrite32(ioread32 | |
569 | (chip->vendor.iobase + | |
570 | TPM_INT_STATUS(chip->vendor.locality)), | |
571 | chip->vendor.iobase + | |
572 | TPM_INT_STATUS(chip->vendor.locality)); | |
573 | ||
574 | /* Turn on */ | |
575 | iowrite32(intmask | TPM_GLOBAL_INT_ENABLE, | |
576 | chip->vendor.iobase + | |
577 | TPM_INT_ENABLE(chip->vendor.locality)); | |
578 | } | |
579 | } | |
580 | ||
581 | INIT_LIST_HEAD(&chip->vendor.list); | |
582 | spin_lock(&tis_lock); | |
583 | list_add(&chip->vendor.list, &tis_chips); | |
584 | spin_unlock(&tis_lock); | |
585 | ||
586 | tpm_get_timeouts(chip); | |
587 | tpm_continue_selftest(chip); | |
588 | ||
589 | return 0; | |
590 | out_err: | |
591 | if (chip->vendor.iobase) | |
592 | iounmap(chip->vendor.iobase); | |
593 | tpm_remove_hardware(chip->dev); | |
594 | return rc; | |
595 | } | |
596 | ||
597 | static int tpm_tis_pnp_suspend(struct pnp_dev *dev, pm_message_t msg) | |
598 | { | |
599 | return tpm_pm_suspend(&dev->dev, msg); | |
600 | } | |
601 | ||
602 | static int tpm_tis_pnp_resume(struct pnp_dev *dev) | |
603 | { | |
604 | return tpm_pm_resume(&dev->dev); | |
605 | } | |
606 | ||
607 | static struct pnp_device_id tpm_pnp_tbl[] __devinitdata = { | |
608 | {"PNP0C31", 0}, /* TPM */ | |
93e1b7d4 KJH |
609 | {"ATM1200", 0}, /* Atmel */ |
610 | {"IFX0102", 0}, /* Infineon */ | |
611 | {"BCM0101", 0}, /* Broadcom */ | |
612 | {"NSC1200", 0}, /* National */ | |
613 | /* Add new here */ | |
614 | {"", 0}, /* User Specified */ | |
615 | {"", 0} /* Terminator */ | |
27084efe LD |
616 | }; |
617 | ||
618 | static struct pnp_driver tis_pnp_driver = { | |
619 | .name = "tpm_tis", | |
620 | .id_table = tpm_pnp_tbl, | |
621 | .probe = tpm_tis_pnp_init, | |
622 | .suspend = tpm_tis_pnp_suspend, | |
623 | .resume = tpm_tis_pnp_resume, | |
624 | }; | |
625 | ||
93e1b7d4 KJH |
626 | #define TIS_HID_USR_IDX sizeof(tpm_pnp_tbl)/sizeof(struct pnp_device_id) -2 |
627 | module_param_string(hid, tpm_pnp_tbl[TIS_HID_USR_IDX].id, | |
628 | sizeof(tpm_pnp_tbl[TIS_HID_USR_IDX].id), 0444); | |
629 | MODULE_PARM_DESC(hid, "Set additional specific HID for this driver to probe"); | |
630 | ||
27084efe LD |
631 | static int __init init_tis(void) |
632 | { | |
633 | return pnp_register_driver(&tis_pnp_driver); | |
634 | } | |
635 | ||
636 | static void __exit cleanup_tis(void) | |
637 | { | |
638 | struct tpm_vendor_specific *i, *j; | |
639 | struct tpm_chip *chip; | |
640 | spin_lock(&tis_lock); | |
641 | list_for_each_entry_safe(i, j, &tis_chips, list) { | |
642 | chip = to_tpm_chip(i); | |
643 | iowrite32(~TPM_GLOBAL_INT_ENABLE & | |
644 | ioread32(chip->vendor.iobase + | |
645 | TPM_INT_ENABLE(chip->vendor. | |
646 | locality)), | |
647 | chip->vendor.iobase + | |
648 | TPM_INT_ENABLE(chip->vendor.locality)); | |
649 | release_locality(chip, chip->vendor.locality, 1); | |
650 | if (chip->vendor.irq) | |
651 | free_irq(chip->vendor.irq, chip); | |
652 | iounmap(i->iobase); | |
653 | list_del(&i->list); | |
654 | tpm_remove_hardware(chip->dev); | |
655 | } | |
656 | spin_unlock(&tis_lock); | |
657 | pnp_unregister_driver(&tis_pnp_driver); | |
658 | } | |
659 | ||
660 | module_init(init_tis); | |
661 | module_exit(cleanup_tis); | |
662 | MODULE_AUTHOR("Leendert van Doorn ([email protected])"); | |
663 | MODULE_DESCRIPTION("TPM Driver"); | |
664 | MODULE_VERSION("2.0"); | |
665 | MODULE_LICENSE("GPL"); |