diff options
author | Sergii Dmytruk <sergii.dmytruk@3mdeb.com> | 2022-10-30 17:19:46 +0200 |
---|---|---|
committer | Felix Held <felix-coreboot@felixheld.de> | 2024-02-07 12:20:25 +0000 |
commit | 7608699a9edb7a0bbf6a2c2051fba2db781975c2 (patch) | |
tree | 9b84c20bea4eccd16c595cd027c001f6d809aff1 /src | |
parent | a122041be15baf7e212c4b9dee63f6b0a9cf1edb (diff) |
drivers/pc80/tpm: probe for TPM family of a device
At the moment this is to handle the situation when device ID is the
same for TPM1 and TPM2 versions of a device. Later this TPM family will
be returned to the caller.
Change-Id: I23b85e6da0e02999704f3ec30412db0bdce2dd8a
Ticket: https://ticket.coreboot.org/issues/433
Signed-off-by: Sergii Dmytruk <sergii.dmytruk@3mdeb.com>
Reviewed-on: https://review.coreboot.org/c/coreboot/+/76955
Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
Reviewed-by: Julius Werner <jwerner@chromium.org>
Diffstat (limited to 'src')
-rw-r--r-- | src/drivers/pc80/tpm/tis.c | 104 | ||||
-rw-r--r-- | src/security/tpm/tss_errors.h | 1 |
2 files changed, 80 insertions, 25 deletions
diff --git a/src/drivers/pc80/tpm/tis.c b/src/drivers/pc80/tpm/tis.c index 2099bb7bf6..90fa32e318 100644 --- a/src/drivers/pc80/tpm/tis.c +++ b/src/drivers/pc80/tpm/tis.c @@ -55,6 +55,7 @@ #define TIS_REG_STS 0x18 #define TIS_REG_BURST_COUNT 0x19 #define TIS_REG_DATA_FIFO 0x24 +#define TIS_REG_INTF_ID 0x30 #define TIS_REG_DID_VID 0xf00 #define TIS_REG_RID 0xf04 @@ -77,13 +78,19 @@ /* 1 second is plenty for anything TPM does.*/ #define MAX_DELAY_US USECS_PER_SEC +enum tpm_family { + TPM_UNKNOWN = 0, + TPM_1 = 1, + TPM_2 = 2, +}; + /* * Structures defined below allow creating descriptions of TPM vendor/device - * ID information for run time discovery. The only device the system knows - * about at this time is Infineon slb9635 + * ID information for run time discovery. */ struct device_name { u16 dev_id; + enum tpm_family family; const char *const dev_name; }; @@ -94,37 +101,33 @@ struct vendor_name { }; static const struct device_name atmel_devices[] = { - {0x3204, "AT97SC3204"}, + {0x3204, TPM_1, "AT97SC3204"}, {0xffff} }; static const struct device_name infineon_devices[] = { - {0x000b, "SLB9635 TT 1.2"}, -#if CONFIG(TPM2) - {0x001a, "SLB9665 TT 2.0"}, - {0x001b, "SLB9670 TT 2.0"}, - {0x001d, "SLB9672 TT 2.0"}, -#else - {0x001a, "SLB9660 TT 1.2"}, - {0x001b, "SLB9670 TT 1.2"}, -#endif + {0x000b, TPM_1, "SLB9635 TT 1.2"}, + {0x001a, TPM_1, "SLB9660 TT 1.2"}, + {0x001b, TPM_1, "SLB9670 TT 1.2"}, + {0x001a, TPM_2, "SLB9665 TT 2.0"}, + {0x001b, TPM_2, "SLB9670 TT 2.0"}, + {0x001d, TPM_2, "SLB9672 TT 2.0"}, {0xffff} }; static const struct device_name nuvoton_devices[] = { - {0x00fe, "NPCT420AA V2"}, + {0x00fe, TPM_1, "NPCT420AA V2"}, {0xffff} }; static const struct device_name stmicro_devices[] = { - {0x0000, "ST33ZP24" }, + {0x0000, TPM_1, "ST33ZP24" }, {0xffff} }; static const struct device_name swtpm_devices[] = { -#if CONFIG(TPM2) - {0x0001, "SwTPM 2.0" }, -#endif + {0x0001, TPM_1, "SwTPM 1.2" }, + {0x0001, TPM_2, "SwTPM 2.0" }, {0xffff} }; @@ -190,6 +193,20 @@ static inline void tpm_write_access(u8 data, int locality) write8(TIS_REG(locality, TIS_REG_ACCESS), data); } +static inline u32 tpm_read_intf_cap(int locality) +{ + u32 value = read32(TIS_REG(locality, TIS_REG_INTF_CAPABILITY)); + TPM_DEBUG_IO_READ(TIS_REG_INTF_CAPABILITY, value); + return value; +} + +static inline u32 tpm_read_intf_id(int locality) +{ + u32 value = read32(TIS_REG(locality, TIS_REG_INTF_ID)); + TPM_DEBUG_IO_READ(TIS_REG_INTF_ID, value); + return value; +} + static inline u32 tpm_read_did_vid(int locality) { u32 value = read32(TIS_REG(locality, TIS_REG_DID_VID)); @@ -365,12 +382,15 @@ static tpm_result_t tis_command_ready(u8 locality) */ static tpm_result_t pc80_tis_probe(void) { - const char *device_name = "unknown"; - const char *vendor_name = device_name; + const char *device_name = NULL; + const char *vendor_name = NULL; const struct device_name *dev; - u32 didvid; + u32 didvid, intf_id; u16 vid, did; + u8 locality = 0, intf_type; int i; + enum tpm_family family; + const char *family_str; if (vendor_dev_id) return TPM_SUCCESS; /* Already probed. */ @@ -381,21 +401,45 @@ static tpm_result_t pc80_tis_probe(void) return TPM_CB_FAIL; } + intf_id = tpm_read_intf_id(locality); + intf_type = (intf_id & 0xf); + if (intf_type == 0xf) { + u32 intf_cap = tpm_read_intf_cap(locality); + u8 intf_version = (intf_cap >> 28) & 0x7; + switch (intf_version) { + case 0: + case 2: + family = TPM_1; + break; + case 3: + family = TPM_2; + break; + default: + printf("%s: Unexpected TPM interface version: %d\n", __func__, + intf_version); + return TPM_CB_PROBE_FAILURE; + } + } else if (intf_type == 0) { + family = TPM_2; + } else { + printf("%s: Unexpected TPM interface type: %d\n", __func__, intf_type); + return TPM_CB_PROBE_FAILURE; + } + vendor_dev_id = didvid; vid = didvid & 0xffff; did = (didvid >> 16) & 0xffff; for (i = 0; i < ARRAY_SIZE(vendor_names); i++) { int j = 0; - u16 known_did; if (vid == vendor_names[i].vendor_id) { vendor_name = vendor_names[i].vendor_name; } else { continue; } dev = &vendor_names[i].dev_names[j]; - while ((known_did = dev->dev_id) != 0xffff) { - if (known_did == did) { + while (dev->dev_id != 0xffff) { + if (dev->dev_id == did && dev->family == family) { device_name = dev->dev_name; break; } @@ -404,8 +448,18 @@ static tpm_result_t pc80_tis_probe(void) } break; } - /* this will have to be converted into debug printout */ - printk(BIOS_INFO, "Found TPM %s by %s\n", device_name, vendor_name); + + family_str = (family == TPM_1 ? "TPM 1.2" : "TPM 2.0"); + if (vendor_name == NULL) { + printk(BIOS_INFO, "Found %s 0x%04x by 0x%04x\n", family_str, did, vid); + } else if (device_name == NULL) { + printk(BIOS_INFO, "Found %s 0x%04x by %s (0x%04x)\n", family_str, did, + vendor_name, vid); + } else { + printk(BIOS_INFO, "Found %s %s (0x%04x) by %s (0x%04x)\n", family_str, + device_name, did, vendor_name, vid); + } + return TPM_SUCCESS; } diff --git a/src/security/tpm/tss_errors.h b/src/security/tpm/tss_errors.h index 8198ca1940..fc2bd87c2c 100644 --- a/src/security/tpm/tss_errors.h +++ b/src/security/tpm/tss_errors.h @@ -61,5 +61,6 @@ typedef uint32_t tpm_result_t; #define TPM_CB_RANGE ((tpm_result_t) (TPM_CB_ERROR + 0x8F)) #define TPM_CB_FAIL ((tpm_result_t) (TPM_CB_ERROR + 0x90)) #define TPM_CB_TIMEOUT ((tpm_result_t) (TPM_CB_ERROR + 0x91)) +#define TPM_CB_PROBE_FAILURE ((tpm_result_t) (TPM_CB_ERROR + 0x92)) #endif /* TSS_ERRORS_H_ */ |