xref: /aosp_15_r20/external/coreboot/src/drivers/crb/tis.c (revision b9411a12aaaa7e1e6a6fb7c5e057f44ee179a49c)
1 /* SPDX-License-Identifier: GPL-2.0-only */
2 
3 #include <console/console.h>
4 #include <security/tpm/tis.h>
5 #include <acpi/acpigen.h>
6 #include <device/device.h>
7 #include <drivers/intel/ptt/ptt.h>
8 #include <drivers/tpm/tpm_ppi.h>
9 #include <security/tpm/tss.h>
10 #include <endian.h>
11 #include <smbios.h>
12 #include <string.h>
13 
14 #include "tpm.h"
15 #include "chip.h"
16 
17 static const struct {
18 	uint16_t vid;
19 	uint16_t did;
20 	const char *device_name;
21 } dev_map[] = {
22 	{0x1ae0, 0x0028, "CR50"},
23 	{0xa13a, 0x8086, "Intel iTPM"}
24 };
25 
tis_get_dev_name(struct crb_tpm_info * info)26 static const char *tis_get_dev_name(struct crb_tpm_info *info)
27 {
28 	int i;
29 
30 	for (i = 0; i < ARRAY_SIZE(dev_map); i++)
31 		if ((dev_map[i].vid == info->vendor_id) && (dev_map[i].did == info->device_id))
32 			return dev_map[i].device_name;
33 	return "Unknown";
34 }
35 
crb_tpm_sendrecv(const uint8_t * sendbuf,size_t sbuf_size,uint8_t * recvbuf,size_t * rbuf_len)36 static tpm_result_t crb_tpm_sendrecv(const uint8_t *sendbuf, size_t sbuf_size, uint8_t *recvbuf,
37 				     size_t *rbuf_len)
38 {
39 	int len = crb_tpm_process_command(sendbuf, sbuf_size, recvbuf, *rbuf_len);
40 
41 	if (len == 0)
42 		return TPM_CB_FAIL;
43 
44 	*rbuf_len = len;
45 
46 	return TPM_SUCCESS;
47 }
48 
crb_tis_probe(enum tpm_family * family)49 tis_sendrecv_fn crb_tis_probe(enum tpm_family *family)
50 {
51 	struct crb_tpm_info info;
52 
53 	if (CONFIG(HAVE_INTEL_PTT)) {
54 		if (!ptt_active()) {
55 			printk(BIOS_ERR, "%s: Intel PTT is not active.\n", __func__);
56 			return NULL;
57 		}
58 		printk(BIOS_DEBUG, "%s: Intel PTT is active.\n", __func__);
59 	}
60 
61 	/* Wake TPM up (if necessary) */
62 	if (crb_tpm_init())
63 		return NULL;
64 
65 	/* CRB interface exists only in TPM2 */
66 	if (family != NULL)
67 		*family = TPM_2;
68 
69 	crb_tpm_get_info(&info);
70 
71 	printk(BIOS_INFO, "Initialized TPM device %s revision %d\n", tis_get_dev_name(&info),
72 	       info.revision);
73 
74 	return &crb_tpm_sendrecv;
75 }
76 
crb_tpm_fill_ssdt(const struct device * dev)77 static void crb_tpm_fill_ssdt(const struct device *dev)
78 {
79 	const char *path = acpi_device_path(dev);
80 	if (!path) {
81 		path = "\\_SB_.TPM";
82 		printk(BIOS_DEBUG, "Using default TPM2 ACPI path: '%s'\n", path);
83 	}
84 
85 	/* Device */
86 	acpigen_write_device(path);
87 
88 	acpigen_write_name_string("_HID", "MSFT0101");
89 	acpigen_write_name_string("_CID", "MSFT0101");
90 
91 	acpi_device_write_uid(dev);
92 
93 	acpigen_write_STA(ACPI_STATUS_DEVICE_ALL_ON);
94 
95 	/* Resources */
96 	acpigen_write_name("_CRS");
97 	acpigen_write_resourcetemplate_header();
98 	acpigen_write_mem32fixed(1, TPM_CRB_BASE_ADDRESS, 0x5000);
99 
100 	acpigen_write_resourcetemplate_footer();
101 
102 	if (!CONFIG(CHROMEOS) && CONFIG(TPM_PPI))
103 		tpm_ppi_acpi_fill_ssdt(dev);
104 
105 	acpigen_pop_len(); /* Device */
106 }
107 
crb_tpm_acpi_name(const struct device * dev)108 static const char *crb_tpm_acpi_name(const struct device *dev)
109 {
110 	return "TPM";
111 }
112 
113 #if CONFIG(GENERATE_SMBIOS_TABLES) && CONFIG(TPM2)
tpm_get_cap(uint32_t property,uint32_t * value)114 static tpm_result_t tpm_get_cap(uint32_t property, uint32_t *value)
115 {
116 	TPMS_CAPABILITY_DATA cap_data;
117 	int i;
118 	tpm_result_t rc;
119 
120 	if (!value)
121 		return TPM_CB_INVALID_ARG;
122 
123 	rc = tlcl2_get_capability(TPM_CAP_TPM_PROPERTIES, property, 1, &cap_data);
124 
125 	if (rc)
126 		return rc;
127 
128 	for (i = 0 ; i < cap_data.data.tpmProperties.count; i++) {
129 		if (cap_data.data.tpmProperties.tpmProperty[i].property == property) {
130 			*value = cap_data.data.tpmProperties.tpmProperty[i].value;
131 			return TPM_SUCCESS;
132 		}
133 	}
134 
135 	return TPM_CB_FAIL;
136 }
137 
smbios_write_type43_tpm(struct device * dev,int * handle,unsigned long * current)138 static int smbios_write_type43_tpm(struct device *dev, int *handle, unsigned long *current)
139 {
140 	struct crb_tpm_info info;
141 	uint32_t tpm_manuf, tpm_family;
142 	uint32_t fw_ver1, fw_ver2;
143 	uint8_t major_spec_ver, minor_spec_ver;
144 
145 	if (tlcl_get_family() == TPM_1)
146 		return 0;
147 
148 	crb_tpm_get_info(&info);
149 
150 	/* If any of these have invalid values, assume TPM not present or disabled */
151 	if (info.vendor_id == 0 || info.vendor_id == 0xFFFF ||
152 	    info.device_id == 0 || info.device_id == 0xFFFF) {
153 		printk(BIOS_DEBUG, "%s: Invalid Vendor ID/Device ID\n", __func__);
154 		return 0;
155 	}
156 
157 	/* Vendor ID is the value returned by TPM2_GetCapabiltiy TPM_PT_MANUFACTURER */
158 	if (tpm_get_cap(TPM_PT_MANUFACTURER, &tpm_manuf)) {
159 		printk(BIOS_DEBUG, "TPM2_GetCap TPM_PT_MANUFACTURER failed\n");
160 		return 0;
161 	}
162 
163 	tpm_manuf = be32toh(tpm_manuf);
164 
165 	if (tpm_get_cap(TPM_PT_FIRMWARE_VERSION_1, &fw_ver1)) {
166 		printk(BIOS_DEBUG, "TPM2_GetCap TPM_PT_FIRMWARE_VERSION_1 failed\n");
167 		return 0;
168 	}
169 
170 	if (tpm_get_cap(TPM_PT_FIRMWARE_VERSION_2, &fw_ver2)) {
171 		printk(BIOS_DEBUG, "TPM2_GetCap TPM_PT_FIRMWARE_VERSION_2 failed\n");
172 		return 0;
173 	}
174 
175 	if (tpm_get_cap(TPM_PT_FAMILY_INDICATOR, &tpm_family)) {
176 		printk(BIOS_DEBUG, "TPM2_GetCap TPM_PT_FAMILY_INDICATOR failed\n");
177 		return 0;
178 	}
179 
180 	tpm_family = be32toh(tpm_family);
181 
182 	if (!strncmp((char *)&tpm_family, "2.0", 4)) {
183 		major_spec_ver = 2;
184 		minor_spec_ver = 0;
185 	} else {
186 		printk(BIOS_ERR, "%s: Invalid TPM family\n", __func__);
187 		return 0;
188 	}
189 
190 	return smbios_write_type43(current, handle, tpm_manuf, major_spec_ver, minor_spec_ver,
191 				   fw_ver1, fw_ver2, tis_get_dev_name(&info),
192 				   SMBIOS_TPM_DEVICE_CHARACTERISTICS_NOT_SUPPORTED, 0);
193 }
194 #endif
195 
196 static struct device_operations __maybe_unused crb_ops = {
197 	.read_resources = noop_read_resources,
198 	.set_resources = noop_set_resources,
199 #if CONFIG(HAVE_ACPI_TABLES)
200 	.acpi_name = crb_tpm_acpi_name,
201 	.acpi_fill_ssdt = crb_tpm_fill_ssdt,
202 #endif
203 #if CONFIG(GENERATE_SMBIOS_TABLES) && CONFIG(TPM2)
204 	.get_smbios_data	= smbios_write_type43_tpm,
205 #endif
206 };
207 
enable_dev(struct device * dev)208 static void enable_dev(struct device *dev)
209 {
210 	if (crb_tis_probe(NULL) == NULL) {
211 		dev->enabled = 0;
212 		return;
213 	}
214 
215 #if !DEVTREE_EARLY
216 	dev->ops = &crb_ops;
217 #endif
218 }
219 
220 struct chip_operations drivers_crb_ops = {
221 	.name = "CRB TPM",
222 	.enable_dev = enable_dev
223 };
224