summaryrefslogtreecommitdiff
path: root/src/drivers/spi
diff options
context:
space:
mode:
authorTim Wawrzynczak <twawrzynczak@chromium.org>2022-02-14 16:04:21 -0700
committerTim Wawrzynczak <twawrzynczak@chromium.org>2022-03-07 18:06:24 +0000
commit6b8599f29a888c0946ff44e97c32ecd4cec2a151 (patch)
treeca38ae8682e63f5abc66e9475798b5614a05c0fe /src/drivers/spi
parentf019d986b154cb95db541be9c71eafde51ec9294 (diff)
drivers/tpm/spi: Refactor out some cr50-specific logic
Mainboards accessing the cr50 over an I2C bus may want to reuse some of the same firmware version and BOARD_CFG logic, therefore refactor this logic out into a bus-agnostic file, drivers/tpm/cr50.c. This file uses the new tis_vendor_read/write() functions in order to access the cr50 regardless of the bus which is physically used. In order to leave SPI devices intact, the tis_vendor_* functions are added to the SPI driver. BUG=b:202246591 TEST=boot to OS on google/dratini, see the same FW version and board_cfg console prints as before the change. Signed-off-by: Tim Wawrzynczak <twawrzynczak@chromium.org> Change-Id: Ie68618cbe026a2b9221f93d0fe41d0b2054e8091 Reviewed-on: https://review.coreboot.org/c/coreboot/+/61977 Tested-by: build bot (Jenkins) <no-reply@coreboot.org> Reviewed-by: Subrata Banik <subratabanik@google.com>
Diffstat (limited to 'src/drivers/spi')
-rw-r--r--src/drivers/spi/tpm/tpm.c163
-rw-r--r--src/drivers/spi/tpm/tpm.h16
2 files changed, 18 insertions, 161 deletions
diff --git a/src/drivers/spi/tpm/tpm.c b/src/drivers/spi/tpm/tpm.c
index 971e60348f..53b3a254c8 100644
--- a/src/drivers/spi/tpm/tpm.c
+++ b/src/drivers/spi/tpm/tpm.c
@@ -23,8 +23,6 @@
#include "tpm.h"
-#define TPM_LOCALITY_0_SPI_BASE 0x00d40000
-
/* Assorted TPM2 registers for interface type FIFO. */
#define TPM_ACCESS_REG (TPM_LOCALITY_0_SPI_BASE + 0)
#define TPM_STS_REG (TPM_LOCALITY_0_SPI_BASE + 0x18)
@@ -34,14 +32,6 @@
#define TPM_FW_VER (TPM_LOCALITY_0_SPI_BASE + 0xf90)
#define CR50_BOARD_CFG (TPM_LOCALITY_0_SPI_BASE + 0xfe0)
-#define CR50_BOARD_CFG_LOCKBIT_MASK 0x80000000U
-#define CR50_BOARD_CFG_FEATUREBITS_MASK 0x3FFFFFFFU
-
-#define CR50_BOARD_CFG_100US_READY_PULSE 0x00000001U
-#define CR50_BOARD_CFG_VALUE \
- (CONFIG(CR50_USE_LONG_INTERRUPT_PULSES) \
- ? CR50_BOARD_CFG_100US_READY_PULSE : 0)
-
#define CR50_TIMEOUT_INIT_MS 30000 /* Very long timeout for TPM init */
/* SPI slave structure for TPM device. */
@@ -49,7 +39,6 @@ static struct spi_slave spi_slave;
/* Cached TPM device identification. */
static struct tpm2_info tpm_info;
-static struct cr50_firmware_version cr50_firmware_version;
/*
* TODO(vbendeb): make CONFIG(DEBUG_TPM) an int to allow different level of
@@ -427,114 +416,12 @@ static enum cb_err tpm2_claim_locality(void)
return CB_ERR;
}
-static enum cb_err cr50_parse_fw_version(const char *version_str,
- struct cr50_firmware_version *ver)
-{
- int epoch, major, minor;
-
- char *number = strstr(version_str, " RW_A:");
- if (!number)
- number = strstr(version_str, " RW_B:");
- if (!number)
- return CB_ERR_ARG;
- number += 6; /* Skip past the colon. */
-
- epoch = skip_atoi(&number);
- if (*number++ != '.')
- return CB_ERR_ARG;
- major = skip_atoi(&number);
- if (*number++ != '.')
- return CB_ERR_ARG;
- minor = skip_atoi(&number);
-
- ver->epoch = epoch;
- ver->major = major;
- ver->minor = minor;
- return CB_SUCCESS;
-}
-
-static bool cr50_fw_supports_board_cfg(struct cr50_firmware_version *version)
-{
- /* Cr50 supports the CR50_BOARD_CFG register from version 0.5.5 / 0.6.5
- * and onwards. */
- if (version->epoch > 0 || version->major >= 7
- || (version->major >= 5 && version->minor >= 5))
- return true;
- printk(BIOS_INFO, "Cr50 firmware does not support CR50_BOARD_CFG, version: %d.%d.%d\n",
- version->epoch, version->major, version->minor);
- return false;
-}
-
-/**
- * Set the BOARD_CFG register on the TPM chip to a particular compile-time constant value.
- */
-static void cr50_set_board_cfg(void)
-{
- uint32_t board_cfg_value;
- if (!cr50_fw_supports_board_cfg(&cr50_firmware_version))
- return;
- /* Set the CR50_BOARD_CFG register, for e.g. asking cr50 to use longer ready pulses. */
- if (tpm2_read_reg(CR50_BOARD_CFG, &board_cfg_value, sizeof(board_cfg_value))
- != CB_SUCCESS) {
- printk(BIOS_INFO, "Error reading from cr50\n");
- return;
- }
- if ((board_cfg_value & CR50_BOARD_CFG_FEATUREBITS_MASK) == CR50_BOARD_CFG_VALUE) {
- printk(BIOS_INFO,
- "Current CR50_BOARD_CFG = 0x%08x, matches desired = 0x%08x\n",
- board_cfg_value, CR50_BOARD_CFG_VALUE);
- return;
- }
- if (board_cfg_value & CR50_BOARD_CFG_LOCKBIT_MASK) {
- /* The high bit is set, meaning that the Cr50 is already locked on a particular
- * value for the register, but not the one we wanted. */
- printk(BIOS_ERR,
- "Current CR50_BOARD_CFG = 0x%08x, does not match desired = 0x%08x\n",
- board_cfg_value, CR50_BOARD_CFG_VALUE);
- return;
- }
- printk(BIOS_INFO, "Current CR50_BOARD_CFG = 0x%08x, setting to 0x%08x\n",
- board_cfg_value, CR50_BOARD_CFG_VALUE);
- board_cfg_value = CR50_BOARD_CFG_VALUE;
- if (tpm2_write_reg(CR50_BOARD_CFG, &board_cfg_value, sizeof(board_cfg_value))
- != CB_SUCCESS)
- printk(BIOS_INFO, "Error writing to cr50\n");
-}
-
-/*
- * Expose method to read the CR50_BOARD_CFG register, will return zero if
- * register not supported by Cr50 firmware.
- */
-static uint32_t cr50_get_board_cfg(void)
-{
- uint32_t board_cfg_value;
- if (!cr50_fw_supports_board_cfg(&cr50_firmware_version))
- return 0;
-
- if (tpm2_read_reg(CR50_BOARD_CFG, &board_cfg_value, sizeof(board_cfg_value))
- != CB_SUCCESS) {
- printk(BIOS_INFO, "Error reading from cr50\n");
- return 0;
- }
- return board_cfg_value & CR50_BOARD_CFG_FEATUREBITS_MASK;
-}
-
-bool cr50_is_long_interrupt_pulse_enabled(void)
-{
- return cr50_get_board_cfg() & CR50_BOARD_CFG_100US_READY_PULSE;
-}
-
/* Device/vendor ID values of the TPM devices this driver supports. */
static const uint32_t supported_did_vids[] = {
0x00281ae0, /* H1 based Cr50 security chip. */
0x0000104a /* ST33HTPH2E32 */
};
-static bool first_access_this_boot(void)
-{
- return ENV_SEPARATE_VERSTAGE || ENV_BOOTBLOCK || !CONFIG(VBOOT);
-}
-
int tpm2_init(struct spi_slave *spi_if)
{
uint32_t did_vid, status;
@@ -579,7 +466,7 @@ int tpm2_init(struct spi_slave *spi_if)
printk(BIOS_INFO, " done!\n");
// FIXME: Move this to tpm_setup()
- if (first_access_this_boot())
+ if (tpm_first_access_this_boot())
/*
* Claim locality 0, do it only during the first
* initialization after reset.
@@ -609,40 +496,15 @@ int tpm2_init(struct spi_slave *spi_if)
printk(BIOS_INFO, "Connected to device vid:did:rid of %4.4x:%4.4x:%2.2x\n",
tpm_info.vendor_id, tpm_info.device_id, tpm_info.revision);
- /* Let's report device FW version if available. */
+ /* Do some cr50-specific things here. */
if (CONFIG(TPM_CR50) && tpm_info.vendor_id == 0x1ae0) {
- int chunk_count = 0;
- size_t chunk_size = 50;
- char version_str[301];
+ struct cr50_firmware_version ver;
- /*
- * Does not really matter what's written, this just makes sure
- * the version is reported from the beginning.
- */
- tpm2_write_reg(TPM_FW_VER, &chunk_size, 1);
-
- /*
- * Read chunk_size bytes at a time, last chunk will be zero padded.
- */
- do {
- tpm2_read_reg(TPM_FW_VER,
- version_str + chunk_count * chunk_size,
- chunk_size);
- if (!version_str[++chunk_count * chunk_size - 1])
- /* Zero padding detected: end of string. */
- break;
- /* Check if there is enough room for reading one more chunk. */
- } while (chunk_count * chunk_size < sizeof(version_str) - chunk_size);
- version_str[chunk_count * chunk_size] = '\0';
- printk(BIOS_INFO, "Firmware version: %s\n", version_str);
-
- if (cr50_parse_fw_version(version_str, &cr50_firmware_version) != CB_SUCCESS) {
- printk(BIOS_ERR, "Did not recognize Cr50 version format\n");
- return -1;
- }
- if (CR50_BOARD_CFG_VALUE) {
- if (first_access_this_boot())
- cr50_set_board_cfg();
+ if (tpm_first_access_this_boot()) {
+ /* This is called for the side-effect of printing the firmware version
+ string */
+ cr50_get_firmware_version(&ver);
+ cr50_set_board_cfg();
}
}
return 0;
@@ -866,7 +728,12 @@ size_t tpm2_process_command(const void *tpm2_command, size_t command_size,
return payload_size;
}
-void cr50_get_firmware_version(struct cr50_firmware_version *version)
+cb_err_t tis_vendor_write(unsigned int addr, const void *buffer, size_t bytes)
+{
+ return tpm2_write_reg(addr, buffer, bytes);
+}
+
+cb_err_t tis_vendor_read(unsigned int addr, void *buffer, size_t bytes)
{
- memcpy(version, &cr50_firmware_version, sizeof(*version));
+ return tpm2_read_reg(addr, buffer, bytes);
}
diff --git a/src/drivers/spi/tpm/tpm.h b/src/drivers/spi/tpm/tpm.h
index f48943e020..cb09148b1f 100644
--- a/src/drivers/spi/tpm/tpm.h
+++ b/src/drivers/spi/tpm/tpm.h
@@ -3,9 +3,12 @@
#ifndef __COREBOOT_SRC_DRIVERS_SPI_TPM_TPM_H
#define __COREBOOT_SRC_DRIVERS_SPI_TPM_TPM_H
+#include <drivers/tpm/cr50.h>
#include <stddef.h>
#include <spi-generic.h>
+#define TPM_LOCALITY_0_SPI_BASE 0x00d40000
+
/*
* A tpm device descriptor, values read from the appropriate device regisrers
* are cached here.
@@ -16,13 +19,6 @@ struct tpm2_info {
uint16_t revision;
};
-/* Structure describing the elements of Cr50 firmware version. */
-struct cr50_firmware_version {
- int epoch;
- int major;
- int minor;
-};
-
/*
* Initialize a TPM2 device: read its id, claim locality of zero, verify that
* this indeed is a TPM2 device. Use the passed in handle to access the right
@@ -47,10 +43,4 @@ size_t tpm2_process_command(const void *tpm2_command, size_t command_size,
/* Get information about previously initialized TPM device. */
void tpm2_get_info(struct tpm2_info *info);
-/* Indicates whether Cr50 ready pulses are guaranteed to be at least 100us. */
-bool cr50_is_long_interrupt_pulse_enabled(void);
-
-/* Get the cr50 firmware version information. */
-void cr50_get_firmware_version(struct cr50_firmware_version *version);
-
#endif /* ! __COREBOOT_SRC_DRIVERS_SPI_TPM_TPM_H */