summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorGrzegorz Bernacki <bernacki@google.com>2023-06-14 12:01:32 +0000
committerFelix Held <felix-coreboot@felixheld.de>2023-07-06 16:16:43 +0000
commit7758b47e3be128ab8c1c3fecb63b8f0054351ee0 (patch)
tree626cdc57c8c0eb979e336af506da07b4e4ea77e0
parent15d75aa999709ab2006b816f7c0335b52147f945 (diff)
drivers/tpm: Move tis_plat_irq_status to cr50 driver
tis_plat_irq_status() function is used only by Google TPM. It should be moved to drivers/tpm/cr50.c. The name of the function was changed to cr50_plat_irq_status(). BUG=b:277787305 TEST=Build all affected platforms Change-Id: I78dc39f2c7b44232b06947d3dfe6afa52807ced8 Signed-off-by: Grzegorz Bernacki <bernacki@google.com> Reviewed-on: https://review.coreboot.org/c/coreboot/+/75917 Reviewed-by: Yu-Ping Wu <yupingso@google.com> Tested-by: build bot (Jenkins) <no-reply@coreboot.org> Reviewed-by: Eric Lai <eric_lai@quanta.corp-partner.google.com> Reviewed-by: Raul Rangel <rrangel@chromium.org>
-rw-r--r--src/drivers/i2c/tpm/cr50.c19
-rw-r--r--src/drivers/spi/tpm/tpm.c19
-rw-r--r--src/drivers/tpm/cr50.c19
-rw-r--r--src/drivers/tpm/cr50.h3
-rw-r--r--src/mainboard/google/asurada/chromeos.c4
-rw-r--r--src/mainboard/google/cherry/chromeos.c4
-rw-r--r--src/mainboard/google/corsola/chromeos.c4
-rw-r--r--src/mainboard/google/geralt/chromeos.c4
-rw-r--r--src/mainboard/google/gru/chromeos.c4
-rw-r--r--src/mainboard/google/guybrush/variants/baseboard/tpm_tis.c4
-rw-r--r--src/mainboard/google/herobrine/chromeos.c4
-rw-r--r--src/mainboard/google/kahlee/variants/baseboard/tpm_tis.c4
-rw-r--r--src/mainboard/google/kukui/chromeos.c4
-rw-r--r--src/mainboard/google/myst/variants/baseboard/tpm_tis.c4
-rw-r--r--src/mainboard/google/oak/tpm_tis.c4
-rw-r--r--src/mainboard/google/skyrim/variants/baseboard/tpm_tis.c4
-rw-r--r--src/mainboard/google/trogdor/chromeos.c4
-rw-r--r--src/mainboard/google/zork/variants/baseboard/tpm_tis.c4
-rw-r--r--src/security/tpm/tis.h11
-rw-r--r--src/soc/intel/common/tpm_tis.c4
20 files changed, 54 insertions, 77 deletions
diff --git a/src/drivers/i2c/tpm/cr50.c b/src/drivers/i2c/tpm/cr50.c
index d9088233c2..7c0c488658 100644
--- a/src/drivers/i2c/tpm/cr50.c
+++ b/src/drivers/i2c/tpm/cr50.c
@@ -33,7 +33,6 @@
#define CR50_TIMEOUT_INIT_MS 30000 /* Very long timeout for TPM init */
#define CR50_TIMEOUT_LONG_MS 2000 /* Long timeout while waiting for TPM */
#define CR50_TIMEOUT_SHORT_MS 2 /* Short timeout during transactions */
-#define CR50_TIMEOUT_NOIRQ_MS 20 /* Timeout for TPM ready without IRQ */
#define CR50_DID_VID 0x00281ae0L
#define TI50_DID_VID 0x504a6666L
@@ -46,20 +45,6 @@ struct tpm_inf_dev {
static struct tpm_inf_dev tpm_dev;
-__weak int tis_plat_irq_status(void)
-{
- static int warning_displayed;
-
- if (!warning_displayed) {
- printk(BIOS_WARNING, "%s() not implemented, wasting 20ms to wait on"
- " Cr50!\n", __func__);
- warning_displayed = 1;
- }
- mdelay(CR50_TIMEOUT_NOIRQ_MS);
-
- return 1;
-}
-
/*
* cr50_i2c_read() - read from TPM register
*
@@ -79,7 +64,7 @@ static int cr50_i2c_read(uint8_t addr, uint8_t *buffer, size_t len)
return -1;
/* Clear interrupt before starting transaction */
- tis_plat_irq_status();
+ cr50_plat_irq_status();
/* Send the register address byte to the TPM */
if (i2c_write_raw(tpm_dev.bus, tpm_dev.addr, &addr, 1)) {
@@ -125,7 +110,7 @@ static int cr50_i2c_write(uint8_t addr, const uint8_t *buffer, size_t len)
memcpy(tpm_dev.buf + 1, buffer, len);
/* Clear interrupt before starting transaction */
- tis_plat_irq_status();
+ cr50_plat_irq_status();
/* Send write request buffer with address */
if (i2c_write_raw(tpm_dev.bus, tpm_dev.addr, tpm_dev.buf, len + 1)) {
diff --git a/src/drivers/spi/tpm/tpm.c b/src/drivers/spi/tpm/tpm.c
index 976a8d894e..5bb56db867 100644
--- a/src/drivers/spi/tpm/tpm.c
+++ b/src/drivers/spi/tpm/tpm.c
@@ -61,23 +61,6 @@ void tpm2_get_info(struct tpm2_info *info)
*info = tpm_info;
}
-__weak int tis_plat_irq_status(void)
-{
- static int warning_displayed;
-
- if (!CONFIG(TPM_GOOGLE))
- dead_code();
-
- if (!warning_displayed) {
- printk(BIOS_WARNING, "%s() not implemented, wasting 10ms to wait on"
- " Cr50!\n", __func__);
- warning_displayed = 1;
- }
- mdelay(10);
-
- return 1;
-}
-
/*
* Each TPM2 SPI transaction starts the same: CS is asserted, the 4 byte
* header is sent to the TPM, the master waits til TPM is ready to continue.
@@ -421,7 +404,7 @@ int tpm2_init(struct spi_slave *spi_if)
/* Clear any pending IRQs. */
if (CONFIG(TPM_GOOGLE))
- tis_plat_irq_status();
+ cr50_plat_irq_status();
/*
* 150 ms should be enough to synchronize with the TPM even under the
diff --git a/src/drivers/tpm/cr50.c b/src/drivers/tpm/cr50.c
index 25ce881d8a..5618b9db5d 100644
--- a/src/drivers/tpm/cr50.c
+++ b/src/drivers/tpm/cr50.c
@@ -1,5 +1,6 @@
/* SPDX-License-Identifier: BSD-3-Clause */
+#include <delay.h>
#include <drivers/spi/tpm/tpm.h>
#include <security/tpm/tis.h>
#include <string.h>
@@ -17,6 +18,8 @@
(CONFIG(CR50_USE_LONG_INTERRUPT_PULSES) \
? CR50_BOARD_CFG_100US_READY_PULSE : 0)
+#define CR50_TIMEOUT_NOIRQ_MS 20 /* Timeout for TPM ready without IRQ */
+
enum cr50_register {
CR50_FW_VER_REG,
CR50_BOARD_CFG_REG,
@@ -95,6 +98,20 @@ static uint32_t cr50_get_board_cfg(void)
return value & CR50_BOARD_CFG_FEATUREBITS_MASK;
}
+__weak int cr50_plat_irq_status(void)
+{
+ static int warning_displayed;
+
+ if (!warning_displayed) {
+ printk(BIOS_WARNING, "%s() not implemented, wasting 20ms to wait on Cr50!\n",
+ __func__);
+ warning_displayed = 1;
+ }
+ mdelay(CR50_TIMEOUT_NOIRQ_MS);
+
+ return 1;
+}
+
/**
* Set the BOARD_CFG register on the TPM chip to a particular compile-time constant value.
*/
@@ -235,7 +252,7 @@ enum cb_err cr50_wait_tpm_ready(void)
stopwatch_init_msecs_expire(&sw, CONFIG_GOOGLE_TPM_IRQ_TIMEOUT_MS);
- while (!tis_plat_irq_status())
+ while (!cr50_plat_irq_status())
if (stopwatch_expired(&sw)) {
printk(BIOS_ERR, "Cr50 TPM IRQ timeout!\n");
return CB_ERR;
diff --git a/src/drivers/tpm/cr50.h b/src/drivers/tpm/cr50.h
index 7ff63fa3c7..35e70a4320 100644
--- a/src/drivers/tpm/cr50.h
+++ b/src/drivers/tpm/cr50.h
@@ -24,4 +24,7 @@ enum cb_err cr50_set_board_cfg(void);
/* Wait for IRQ to indicate the TPM is ready */
enum cb_err cr50_wait_tpm_ready(void);
+/* Check TPM IRQ and clear it, returns 1 when IRQ pending or 0 when not */
+int cr50_plat_irq_status(void);
+
#endif /* __DRIVERS_TPM_CR50_H__ */
diff --git a/src/mainboard/google/asurada/chromeos.c b/src/mainboard/google/asurada/chromeos.c
index 1aa8876ca4..d8787f63a2 100644
--- a/src/mainboard/google/asurada/chromeos.c
+++ b/src/mainboard/google/asurada/chromeos.c
@@ -2,8 +2,8 @@
#include <bootmode.h>
#include <boot/coreboot_tables.h>
+#include <drivers/tpm/cr50.h>
#include <gpio.h>
-#include <security/tpm/tis.h>
#include "gpio.h"
@@ -36,7 +36,7 @@ int get_write_protect_state(void)
return !gpio_get(GPIO_WP);
}
-int tis_plat_irq_status(void)
+int cr50_plat_irq_status(void)
{
return gpio_eint_poll(GPIO_H1_AP_INT);
}
diff --git a/src/mainboard/google/cherry/chromeos.c b/src/mainboard/google/cherry/chromeos.c
index 301a0bc1c7..4a93ae2c73 100644
--- a/src/mainboard/google/cherry/chromeos.c
+++ b/src/mainboard/google/cherry/chromeos.c
@@ -2,8 +2,8 @@
#include <bootmode.h>
#include <boot/coreboot_tables.h>
+#include <drivers/tpm/cr50.h>
#include <gpio.h>
-#include <security/tpm/tis.h>
#include "gpio.h"
@@ -61,7 +61,7 @@ void fill_lb_gpios(struct lb_gpios *gpios)
lb_add_gpios(gpios, spk_gpios, ARRAY_SIZE(spk_gpios));
}
-int tis_plat_irq_status(void)
+int cr50_plat_irq_status(void)
{
return gpio_eint_poll(GPIO_GSC_AP_INT);
}
diff --git a/src/mainboard/google/corsola/chromeos.c b/src/mainboard/google/corsola/chromeos.c
index 9717f9c2e1..a1674d3c13 100644
--- a/src/mainboard/google/corsola/chromeos.c
+++ b/src/mainboard/google/corsola/chromeos.c
@@ -2,9 +2,9 @@
#include <bootmode.h>
#include <boot/coreboot_tables.h>
+#include <drivers/tpm/cr50.h>
#include <ec/google/chromeec/ec.h>
#include <gpio.h>
-#include <security/tpm/tis.h>
#include <stdbool.h>
#include "gpio.h"
@@ -68,7 +68,7 @@ int get_ec_is_trusted(void)
return !!gpio_get(GPIO_EC_IN_RW_ODL);
}
-int tis_plat_irq_status(void)
+int cr50_plat_irq_status(void)
{
return gpio_eint_poll(GPIO_GSC_AP_INT_ODL);
}
diff --git a/src/mainboard/google/geralt/chromeos.c b/src/mainboard/google/geralt/chromeos.c
index a6e891703a..1144701ea3 100644
--- a/src/mainboard/google/geralt/chromeos.c
+++ b/src/mainboard/google/geralt/chromeos.c
@@ -2,8 +2,8 @@
#include <bootmode.h>
#include <boot/coreboot_tables.h>
+#include <drivers/tpm/cr50.h>
#include <gpio.h>
-#include <security/tpm/tis.h>
#include "gpio.h"
#include "panel.h"
@@ -67,7 +67,7 @@ void fill_lb_gpios(struct lb_gpios *gpios)
}
}
-int tis_plat_irq_status(void)
+int cr50_plat_irq_status(void)
{
return gpio_eint_poll(GPIO_GSC_AP_INT_ODL);
}
diff --git a/src/mainboard/google/gru/chromeos.c b/src/mainboard/google/gru/chromeos.c
index 479ca3d85d..3e57242fa3 100644
--- a/src/mainboard/google/gru/chromeos.c
+++ b/src/mainboard/google/gru/chromeos.c
@@ -2,8 +2,8 @@
#include <bootmode.h>
#include <boot/coreboot_tables.h>
+#include <drivers/tpm/cr50.h>
#include <gpio.h>
-#include <security/tpm/tis.h>
#include "board.h"
@@ -44,7 +44,7 @@ void setup_chromeos_gpios(void)
}
#if CONFIG(GRU_HAS_TPM2)
-int tis_plat_irq_status(void)
+int cr50_plat_irq_status(void)
{
return gpio_irq_status(GPIO_TPM_IRQ);
}
diff --git a/src/mainboard/google/guybrush/variants/baseboard/tpm_tis.c b/src/mainboard/google/guybrush/variants/baseboard/tpm_tis.c
index 2f3e426ef9..bc4091527f 100644
--- a/src/mainboard/google/guybrush/variants/baseboard/tpm_tis.c
+++ b/src/mainboard/google/guybrush/variants/baseboard/tpm_tis.c
@@ -1,10 +1,10 @@
/* SPDX-License-Identifier: GPL-2.0-or-later */
#include <boardid.h>
+#include <drivers/tpm/cr50.h>
#include <gpio.h>
-#include <security/tpm/tis.h>
-int tis_plat_irq_status(void)
+int cr50_plat_irq_status(void)
{
gpio_t irq_gpio = GPIO_85;
uint32_t board_ver = board_id();
diff --git a/src/mainboard/google/herobrine/chromeos.c b/src/mainboard/google/herobrine/chromeos.c
index b5631fc8b2..f17e2782f8 100644
--- a/src/mainboard/google/herobrine/chromeos.c
+++ b/src/mainboard/google/herobrine/chromeos.c
@@ -3,7 +3,7 @@
#include <boot/coreboot_tables.h>
#include <bootmode.h>
#include "board.h"
-#include <security/tpm/tis.h>
+#include <drivers/tpm/cr50.h>
void setup_chromeos_gpios(void)
{
@@ -55,7 +55,7 @@ int get_ec_is_trusted(void)
return 1;
}
-int tis_plat_irq_status(void)
+int cr50_plat_irq_status(void)
{
return gpio_irq_status(GPIO_H1_AP_INT);
}
diff --git a/src/mainboard/google/kahlee/variants/baseboard/tpm_tis.c b/src/mainboard/google/kahlee/variants/baseboard/tpm_tis.c
index 2e3cfb8d15..87b7f45dc9 100644
--- a/src/mainboard/google/kahlee/variants/baseboard/tpm_tis.c
+++ b/src/mainboard/google/kahlee/variants/baseboard/tpm_tis.c
@@ -1,10 +1,10 @@
/* SPDX-License-Identifier: GPL-2.0-only */
+#include <drivers/tpm/cr50.h>
#include <gpio.h>
-#include <security/tpm/tis.h>
#include <variant/gpio.h>
-int tis_plat_irq_status(void)
+int cr50_plat_irq_status(void)
{
return gpio_interrupt_status(GPIO_9);
}
diff --git a/src/mainboard/google/kukui/chromeos.c b/src/mainboard/google/kukui/chromeos.c
index 4c4a8bec03..13e7f4c38f 100644
--- a/src/mainboard/google/kukui/chromeos.c
+++ b/src/mainboard/google/kukui/chromeos.c
@@ -2,8 +2,8 @@
#include <bootmode.h>
#include <boot/coreboot_tables.h>
+#include <drivers/tpm/cr50.h>
#include <gpio.h>
-#include <security/tpm/tis.h>
#include "gpio.h"
@@ -33,7 +33,7 @@ int get_write_protect_state(void)
return !gpio_get(GPIO_WP);
}
-int tis_plat_irq_status(void)
+int cr50_plat_irq_status(void)
{
return gpio_eint_poll(CR50_IRQ);
}
diff --git a/src/mainboard/google/myst/variants/baseboard/tpm_tis.c b/src/mainboard/google/myst/variants/baseboard/tpm_tis.c
index d03158db81..3641e7abd9 100644
--- a/src/mainboard/google/myst/variants/baseboard/tpm_tis.c
+++ b/src/mainboard/google/myst/variants/baseboard/tpm_tis.c
@@ -1,9 +1,9 @@
/* SPDX-License-Identifier: GPL-2.0-or-later */
-#include <security/tpm/tis.h>
+#include <drivers/tpm/cr50.h>
#include <gpio.h>
-int tis_plat_irq_status(void)
+int cr50_plat_irq_status(void)
{
return gpio_interrupt_status(GPIO_84);
}
diff --git a/src/mainboard/google/oak/tpm_tis.c b/src/mainboard/google/oak/tpm_tis.c
index 9071869642..75c951b41f 100644
--- a/src/mainboard/google/oak/tpm_tis.c
+++ b/src/mainboard/google/oak/tpm_tis.c
@@ -1,11 +1,11 @@
/* SPDX-License-Identifier: GPL-2.0-only */
+#include <drivers/tpm/cr50.h>
#include <gpio.h>
-#include <security/tpm/tis.h>
#include "gpio.h"
-int tis_plat_irq_status(void)
+int cr50_plat_irq_status(void)
{
return gpio_eint_poll(CR50_IRQ);
}
diff --git a/src/mainboard/google/skyrim/variants/baseboard/tpm_tis.c b/src/mainboard/google/skyrim/variants/baseboard/tpm_tis.c
index 7e513ef79f..b3ab49aee3 100644
--- a/src/mainboard/google/skyrim/variants/baseboard/tpm_tis.c
+++ b/src/mainboard/google/skyrim/variants/baseboard/tpm_tis.c
@@ -1,9 +1,9 @@
/* SPDX-License-Identifier: GPL-2.0-or-later */
-#include <security/tpm/tis.h>
+#include <drivers/tpm/cr50.h>
#include <gpio.h>
-int tis_plat_irq_status(void)
+int cr50_plat_irq_status(void)
{
return gpio_interrupt_status(GPIO_18);
}
diff --git a/src/mainboard/google/trogdor/chromeos.c b/src/mainboard/google/trogdor/chromeos.c
index 11b38b513d..2fe3e610e1 100644
--- a/src/mainboard/google/trogdor/chromeos.c
+++ b/src/mainboard/google/trogdor/chromeos.c
@@ -3,7 +3,7 @@
#include <boot/coreboot_tables.h>
#include <bootmode.h>
#include "board.h"
-#include <security/tpm/tis.h>
+#include <drivers/tpm/cr50.h>
void setup_chromeos_gpios(void)
{
@@ -53,7 +53,7 @@ void fill_lb_gpios(struct lb_gpios *gpios)
lb_add_gpios(gpios, chromeos_gpios, ARRAY_SIZE(chromeos_gpios));
}
-int tis_plat_irq_status(void)
+int cr50_plat_irq_status(void)
{
return gpio_irq_status(GPIO_H1_AP_INT);
}
diff --git a/src/mainboard/google/zork/variants/baseboard/tpm_tis.c b/src/mainboard/google/zork/variants/baseboard/tpm_tis.c
index 97eac5db92..822349288a 100644
--- a/src/mainboard/google/zork/variants/baseboard/tpm_tis.c
+++ b/src/mainboard/google/zork/variants/baseboard/tpm_tis.c
@@ -1,10 +1,10 @@
/* SPDX-License-Identifier: GPL-2.0-or-later */
+#include <drivers/tpm/cr50.h>
#include <gpio.h>
-#include <security/tpm/tis.h>
#include <variant/gpio.h>
-int tis_plat_irq_status(void)
+int cr50_plat_irq_status(void)
{
return gpio_interrupt_status(GPIO_3);
}
diff --git a/src/security/tpm/tis.h b/src/security/tpm/tis.h
index 9b343330e3..fae049efff 100644
--- a/src/security/tpm/tis.h
+++ b/src/security/tpm/tis.h
@@ -64,17 +64,6 @@ int tis_open(void);
int tis_sendrecv(const u8 *sendbuf, size_t send_size, u8 *recvbuf,
size_t *recv_len);
-/* TODO: This is supposed to be used only for Google TPM.
- Consider moving this to drivers/tpm/cr50.h. */
-/*
- * tis_plat_irq_status()
- *
- * Check tpm irq and clear it.
- *
- * Returns 1 when irq pending or 0 when not.
- */
-int tis_plat_irq_status(void);
-
/*
* tis_vendor_write()
*
diff --git a/src/soc/intel/common/tpm_tis.c b/src/soc/intel/common/tpm_tis.c
index d761f14483..56cf64809e 100644
--- a/src/soc/intel/common/tpm_tis.c
+++ b/src/soc/intel/common/tpm_tis.c
@@ -1,9 +1,9 @@
/* SPDX-License-Identifier: GPL-2.0-only */
#include <acpi/acpi.h>
-#include <security/tpm/tis.h>
+#include <drivers/tpm/cr50.h>
-int tis_plat_irq_status(void)
+int cr50_plat_irq_status(void)
{
return acpi_get_gpe(CONFIG_TPM_TIS_ACPI_INTERRUPT);
}