| 1 | /****************************************************************************** |
|---|
| 2 | * drivers/xen/tpmback/tpmback.c |
|---|
| 3 | * |
|---|
| 4 | * Copyright (c) 2005, IBM Corporation |
|---|
| 5 | * |
|---|
| 6 | * Author: Stefan Berger, stefanb@us.ibm.com |
|---|
| 7 | * Grant table support: Mahadevan Gomathisankaran |
|---|
| 8 | * |
|---|
| 9 | * This code has been derived from drivers/xen/netback/netback.c |
|---|
| 10 | * Copyright (c) 2002-2004, K A Fraser |
|---|
| 11 | * |
|---|
| 12 | */ |
|---|
| 13 | |
|---|
| 14 | #include "common.h" |
|---|
| 15 | #include <xen/evtchn.h> |
|---|
| 16 | |
|---|
| 17 | #include <linux/types.h> |
|---|
| 18 | #include <linux/list.h> |
|---|
| 19 | #include <linux/miscdevice.h> |
|---|
| 20 | #include <linux/poll.h> |
|---|
| 21 | #include <asm/uaccess.h> |
|---|
| 22 | #include <xen/xenbus.h> |
|---|
| 23 | #include <xen/interface/grant_table.h> |
|---|
| 24 | #include <xen/gnttab.h> |
|---|
| 25 | |
|---|
| 26 | /* local data structures */ |
|---|
| 27 | struct data_exchange { |
|---|
| 28 | struct list_head pending_pak; |
|---|
| 29 | struct list_head current_pak; |
|---|
| 30 | unsigned int copied_so_far; |
|---|
| 31 | u8 has_opener:1; |
|---|
| 32 | u8 aborted:1; |
|---|
| 33 | rwlock_t pak_lock; // protects all of the previous fields |
|---|
| 34 | wait_queue_head_t wait_queue; |
|---|
| 35 | }; |
|---|
| 36 | |
|---|
| 37 | struct vtpm_resp_hdr { |
|---|
| 38 | uint32_t instance_no; |
|---|
| 39 | uint16_t tag_no; |
|---|
| 40 | uint32_t len_no; |
|---|
| 41 | uint32_t ordinal_no; |
|---|
| 42 | } __attribute__ ((packed)); |
|---|
| 43 | |
|---|
| 44 | struct packet { |
|---|
| 45 | struct list_head next; |
|---|
| 46 | unsigned int data_len; |
|---|
| 47 | u8 *data_buffer; |
|---|
| 48 | tpmif_t *tpmif; |
|---|
| 49 | u32 tpm_instance; |
|---|
| 50 | u8 req_tag; |
|---|
| 51 | u32 last_read; |
|---|
| 52 | u8 flags; |
|---|
| 53 | struct timer_list processing_timer; |
|---|
| 54 | }; |
|---|
| 55 | |
|---|
| 56 | enum { |
|---|
| 57 | PACKET_FLAG_DISCARD_RESPONSE = 1, |
|---|
| 58 | }; |
|---|
| 59 | |
|---|
| 60 | /* local variables */ |
|---|
| 61 | static struct data_exchange dataex; |
|---|
| 62 | |
|---|
| 63 | /* local function prototypes */ |
|---|
| 64 | static int _packet_write(struct packet *pak, |
|---|
| 65 | const char *data, size_t size, int userbuffer); |
|---|
| 66 | static void processing_timeout(unsigned long ptr); |
|---|
| 67 | static int packet_read_shmem(struct packet *pak, |
|---|
| 68 | tpmif_t * tpmif, |
|---|
| 69 | u32 offset, |
|---|
| 70 | char *buffer, int isuserbuffer, u32 left); |
|---|
| 71 | static int vtpm_queue_packet(struct packet *pak); |
|---|
| 72 | |
|---|
| 73 | /*************************************************************** |
|---|
| 74 | Buffer copying fo user and kernel space buffes. |
|---|
| 75 | ***************************************************************/ |
|---|
| 76 | static inline int copy_from_buffer(void *to, |
|---|
| 77 | const void *from, unsigned long size, |
|---|
| 78 | int isuserbuffer) |
|---|
| 79 | { |
|---|
| 80 | if (isuserbuffer) { |
|---|
| 81 | if (copy_from_user(to, (void __user *)from, size)) |
|---|
| 82 | return -EFAULT; |
|---|
| 83 | } else { |
|---|
| 84 | memcpy(to, from, size); |
|---|
| 85 | } |
|---|
| 86 | return 0; |
|---|
| 87 | } |
|---|
| 88 | |
|---|
| 89 | static inline int copy_to_buffer(void *to, |
|---|
| 90 | const void *from, unsigned long size, |
|---|
| 91 | int isuserbuffer) |
|---|
| 92 | { |
|---|
| 93 | if (isuserbuffer) { |
|---|
| 94 | if (copy_to_user((void __user *)to, from, size)) |
|---|
| 95 | return -EFAULT; |
|---|
| 96 | } else { |
|---|
| 97 | memcpy(to, from, size); |
|---|
| 98 | } |
|---|
| 99 | return 0; |
|---|
| 100 | } |
|---|
| 101 | |
|---|
| 102 | |
|---|
| 103 | static void dataex_init(struct data_exchange *dataex) |
|---|
| 104 | { |
|---|
| 105 | INIT_LIST_HEAD(&dataex->pending_pak); |
|---|
| 106 | INIT_LIST_HEAD(&dataex->current_pak); |
|---|
| 107 | dataex->has_opener = 0; |
|---|
| 108 | rwlock_init(&dataex->pak_lock); |
|---|
| 109 | init_waitqueue_head(&dataex->wait_queue); |
|---|
| 110 | } |
|---|
| 111 | |
|---|
| 112 | /*************************************************************** |
|---|
| 113 | Packet-related functions |
|---|
| 114 | ***************************************************************/ |
|---|
| 115 | |
|---|
| 116 | static struct packet *packet_find_instance(struct list_head *head, |
|---|
| 117 | u32 tpm_instance) |
|---|
| 118 | { |
|---|
| 119 | struct packet *pak; |
|---|
| 120 | struct list_head *p; |
|---|
| 121 | |
|---|
| 122 | /* |
|---|
| 123 | * traverse the list of packets and return the first |
|---|
| 124 | * one with the given instance number |
|---|
| 125 | */ |
|---|
| 126 | list_for_each(p, head) { |
|---|
| 127 | pak = list_entry(p, struct packet, next); |
|---|
| 128 | |
|---|
| 129 | if (pak->tpm_instance == tpm_instance) { |
|---|
| 130 | return pak; |
|---|
| 131 | } |
|---|
| 132 | } |
|---|
| 133 | return NULL; |
|---|
| 134 | } |
|---|
| 135 | |
|---|
| 136 | static struct packet *packet_find_packet(struct list_head *head, void *packet) |
|---|
| 137 | { |
|---|
| 138 | struct packet *pak; |
|---|
| 139 | struct list_head *p; |
|---|
| 140 | |
|---|
| 141 | /* |
|---|
| 142 | * traverse the list of packets and return the first |
|---|
| 143 | * one with the given instance number |
|---|
| 144 | */ |
|---|
| 145 | list_for_each(p, head) { |
|---|
| 146 | pak = list_entry(p, struct packet, next); |
|---|
| 147 | |
|---|
| 148 | if (pak == packet) { |
|---|
| 149 | return pak; |
|---|
| 150 | } |
|---|
| 151 | } |
|---|
| 152 | return NULL; |
|---|
| 153 | } |
|---|
| 154 | |
|---|
| 155 | static struct packet *packet_alloc(tpmif_t * tpmif, |
|---|
| 156 | u32 size, u8 req_tag, u8 flags) |
|---|
| 157 | { |
|---|
| 158 | struct packet *pak = NULL; |
|---|
| 159 | pak = kzalloc(sizeof (struct packet), GFP_ATOMIC); |
|---|
| 160 | if (NULL != pak) { |
|---|
| 161 | if (tpmif) { |
|---|
| 162 | pak->tpmif = tpmif; |
|---|
| 163 | pak->tpm_instance = tpmback_get_instance(tpmif->bi); |
|---|
| 164 | tpmif_get(tpmif); |
|---|
| 165 | } |
|---|
| 166 | pak->data_len = size; |
|---|
| 167 | pak->req_tag = req_tag; |
|---|
| 168 | pak->last_read = 0; |
|---|
| 169 | pak->flags = flags; |
|---|
| 170 | |
|---|
| 171 | /* |
|---|
| 172 | * cannot do tpmif_get(tpmif); bad things happen |
|---|
| 173 | * on the last tpmif_put() |
|---|
| 174 | */ |
|---|
| 175 | init_timer(&pak->processing_timer); |
|---|
| 176 | pak->processing_timer.function = processing_timeout; |
|---|
| 177 | pak->processing_timer.data = (unsigned long)pak; |
|---|
| 178 | } |
|---|
| 179 | return pak; |
|---|
| 180 | } |
|---|
| 181 | |
|---|
| 182 | static void inline packet_reset(struct packet *pak) |
|---|
| 183 | { |
|---|
| 184 | pak->last_read = 0; |
|---|
| 185 | } |
|---|
| 186 | |
|---|
| 187 | static void packet_free(struct packet *pak) |
|---|
| 188 | { |
|---|
| 189 | if (timer_pending(&pak->processing_timer)) { |
|---|
| 190 | BUG(); |
|---|
| 191 | } |
|---|
| 192 | |
|---|
| 193 | if (pak->tpmif) |
|---|
| 194 | tpmif_put(pak->tpmif); |
|---|
| 195 | kfree(pak->data_buffer); |
|---|
| 196 | /* |
|---|
| 197 | * cannot do tpmif_put(pak->tpmif); bad things happen |
|---|
| 198 | * on the last tpmif_put() |
|---|
| 199 | */ |
|---|
| 200 | kfree(pak); |
|---|
| 201 | } |
|---|
| 202 | |
|---|
| 203 | |
|---|
| 204 | /* |
|---|
| 205 | * Write data to the shared memory and send it to the FE. |
|---|
| 206 | */ |
|---|
| 207 | static int packet_write(struct packet *pak, |
|---|
| 208 | const char *data, size_t size, int isuserbuffer) |
|---|
| 209 | { |
|---|
| 210 | int rc = 0; |
|---|
| 211 | |
|---|
| 212 | if (0 != (pak->flags & PACKET_FLAG_DISCARD_RESPONSE)) { |
|---|
| 213 | /* Don't send a respone to this packet. Just acknowledge it. */ |
|---|
| 214 | rc = size; |
|---|
| 215 | } else { |
|---|
| 216 | rc = _packet_write(pak, data, size, isuserbuffer); |
|---|
| 217 | } |
|---|
| 218 | |
|---|
| 219 | return rc; |
|---|
| 220 | } |
|---|
| 221 | |
|---|
| 222 | int _packet_write(struct packet *pak, |
|---|
| 223 | const char *data, size_t size, int isuserbuffer) |
|---|
| 224 | { |
|---|
| 225 | /* |
|---|
| 226 | * Write into the shared memory pages directly |
|---|
| 227 | * and send it to the front end. |
|---|
| 228 | */ |
|---|
| 229 | tpmif_t *tpmif = pak->tpmif; |
|---|
| 230 | grant_handle_t handle; |
|---|
| 231 | int rc = 0; |
|---|
| 232 | unsigned int i = 0; |
|---|
| 233 | unsigned int offset = 0; |
|---|
| 234 | |
|---|
| 235 | if (tpmif == NULL) { |
|---|
| 236 | return -EFAULT; |
|---|
| 237 | } |
|---|
| 238 | |
|---|
| 239 | if (tpmif->status == DISCONNECTED) { |
|---|
| 240 | return size; |
|---|
| 241 | } |
|---|
| 242 | |
|---|
| 243 | while (offset < size && i < TPMIF_TX_RING_SIZE) { |
|---|
| 244 | unsigned int tocopy; |
|---|
| 245 | struct gnttab_map_grant_ref map_op; |
|---|
| 246 | struct gnttab_unmap_grant_ref unmap_op; |
|---|
| 247 | tpmif_tx_request_t *tx; |
|---|
| 248 | |
|---|
| 249 | tx = &tpmif->tx->ring[i].req; |
|---|
| 250 | |
|---|
| 251 | if (0 == tx->addr) { |
|---|
| 252 | DPRINTK("ERROR: Buffer for outgoing packet NULL?! i=%d\n", i); |
|---|
| 253 | return 0; |
|---|
| 254 | } |
|---|
| 255 | |
|---|
| 256 | gnttab_set_map_op(&map_op, idx_to_kaddr(tpmif, i), |
|---|
| 257 | GNTMAP_host_map, tx->ref, tpmif->domid); |
|---|
| 258 | |
|---|
| 259 | if (unlikely(HYPERVISOR_grant_table_op(GNTTABOP_map_grant_ref, |
|---|
| 260 | &map_op, 1))) { |
|---|
| 261 | BUG(); |
|---|
| 262 | } |
|---|
| 263 | |
|---|
| 264 | handle = map_op.handle; |
|---|
| 265 | |
|---|
| 266 | if (map_op.status) { |
|---|
| 267 | DPRINTK(" Grant table operation failure !\n"); |
|---|
| 268 | return 0; |
|---|
| 269 | } |
|---|
| 270 | |
|---|
| 271 | tocopy = min_t(size_t, size - offset, PAGE_SIZE); |
|---|
| 272 | |
|---|
| 273 | if (copy_from_buffer((void *)(idx_to_kaddr(tpmif, i) | |
|---|
| 274 | (tx->addr & ~PAGE_MASK)), |
|---|
| 275 | &data[offset], tocopy, isuserbuffer)) { |
|---|
| 276 | tpmif_put(tpmif); |
|---|
| 277 | return -EFAULT; |
|---|
| 278 | } |
|---|
| 279 | tx->size = tocopy; |
|---|
| 280 | |
|---|
| 281 | gnttab_set_unmap_op(&unmap_op, idx_to_kaddr(tpmif, i), |
|---|
| 282 | GNTMAP_host_map, handle); |
|---|
| 283 | |
|---|
| 284 | if (unlikely |
|---|
| 285 | (HYPERVISOR_grant_table_op |
|---|
| 286 | (GNTTABOP_unmap_grant_ref, &unmap_op, 1))) { |
|---|
| 287 | BUG(); |
|---|
| 288 | } |
|---|
| 289 | |
|---|
| 290 | offset += tocopy; |
|---|
| 291 | i++; |
|---|
| 292 | } |
|---|
| 293 | |
|---|
| 294 | rc = offset; |
|---|
| 295 | DPRINTK("Notifying frontend via irq %d\n", tpmif->irq); |
|---|
| 296 | notify_remote_via_irq(tpmif->irq); |
|---|
| 297 | |
|---|
| 298 | return rc; |
|---|
| 299 | } |
|---|
| 300 | |
|---|
| 301 | /* |
|---|
| 302 | * Read data from the shared memory and copy it directly into the |
|---|
| 303 | * provided buffer. Advance the read_last indicator which tells |
|---|
| 304 | * how many bytes have already been read. |
|---|
| 305 | */ |
|---|
| 306 | static int packet_read(struct packet *pak, size_t numbytes, |
|---|
| 307 | char *buffer, size_t buffersize, int isuserbuffer) |
|---|
| 308 | { |
|---|
| 309 | tpmif_t *tpmif = pak->tpmif; |
|---|
| 310 | |
|---|
| 311 | /* |
|---|
| 312 | * Read 'numbytes' of data from the buffer. The first 4 |
|---|
| 313 | * bytes are the instance number in network byte order, |
|---|
| 314 | * after that come the data from the shared memory buffer. |
|---|
| 315 | */ |
|---|
| 316 | u32 to_copy; |
|---|
| 317 | u32 offset = 0; |
|---|
| 318 | u32 room_left = buffersize; |
|---|
| 319 | |
|---|
| 320 | if (pak->last_read < 4) { |
|---|
| 321 | /* |
|---|
| 322 | * copy the instance number into the buffer |
|---|
| 323 | */ |
|---|
| 324 | u32 instance_no = htonl(pak->tpm_instance); |
|---|
| 325 | u32 last_read = pak->last_read; |
|---|
| 326 | |
|---|
| 327 | to_copy = min_t(size_t, 4 - last_read, numbytes); |
|---|
| 328 | |
|---|
| 329 | if (copy_to_buffer(&buffer[0], |
|---|
| 330 | &(((u8 *) & instance_no)[last_read]), |
|---|
| 331 | to_copy, isuserbuffer)) { |
|---|
| 332 | return -EFAULT; |
|---|
| 333 | } |
|---|
| 334 | |
|---|
| 335 | pak->last_read += to_copy; |
|---|
| 336 | offset += to_copy; |
|---|
| 337 | room_left -= to_copy; |
|---|
| 338 | } |
|---|
| 339 | |
|---|
| 340 | /* |
|---|
| 341 | * If the packet has a data buffer appended, read from it... |
|---|
| 342 | */ |
|---|
| 343 | |
|---|
| 344 | if (room_left > 0) { |
|---|
| 345 | if (pak->data_buffer) { |
|---|
| 346 | u32 to_copy = min_t(u32, pak->data_len - offset, room_left); |
|---|
| 347 | u32 last_read = pak->last_read - 4; |
|---|
| 348 | |
|---|
| 349 | if (copy_to_buffer(&buffer[offset], |
|---|
| 350 | &pak->data_buffer[last_read], |
|---|
| 351 | to_copy, isuserbuffer)) { |
|---|
| 352 | return -EFAULT; |
|---|
| 353 | } |
|---|
| 354 | pak->last_read += to_copy; |
|---|
| 355 | offset += to_copy; |
|---|
| 356 | } else { |
|---|
| 357 | offset = packet_read_shmem(pak, |
|---|
| 358 | tpmif, |
|---|
| 359 | offset, |
|---|
| 360 | buffer, |
|---|
| 361 | isuserbuffer, room_left); |
|---|
| 362 | } |
|---|
| 363 | } |
|---|
| 364 | return offset; |
|---|
| 365 | } |
|---|
| 366 | |
|---|
| 367 | static int packet_read_shmem(struct packet *pak, |
|---|
| 368 | tpmif_t * tpmif, |
|---|
| 369 | u32 offset, char *buffer, int isuserbuffer, |
|---|
| 370 | u32 room_left) |
|---|
| 371 | { |
|---|
| 372 | u32 last_read = pak->last_read - 4; |
|---|
| 373 | u32 i = (last_read / PAGE_SIZE); |
|---|
| 374 | u32 pg_offset = last_read & (PAGE_SIZE - 1); |
|---|
| 375 | u32 to_copy; |
|---|
| 376 | grant_handle_t handle; |
|---|
| 377 | |
|---|
| 378 | tpmif_tx_request_t *tx; |
|---|
| 379 | |
|---|
| 380 | tx = &tpmif->tx->ring[0].req; |
|---|
| 381 | /* |
|---|
| 382 | * Start copying data at the page with index 'index' |
|---|
| 383 | * and within that page at offset 'offset'. |
|---|
| 384 | * Copy a maximum of 'room_left' bytes. |
|---|
| 385 | */ |
|---|
| 386 | to_copy = min_t(u32, PAGE_SIZE - pg_offset, room_left); |
|---|
| 387 | while (to_copy > 0) { |
|---|
| 388 | void *src; |
|---|
| 389 | struct gnttab_map_grant_ref map_op; |
|---|
| 390 | struct gnttab_unmap_grant_ref unmap_op; |
|---|
| 391 | |
|---|
| 392 | tx = &tpmif->tx->ring[i].req; |
|---|
| 393 | |
|---|
| 394 | gnttab_set_map_op(&map_op, idx_to_kaddr(tpmif, i), |
|---|
| 395 | GNTMAP_host_map, tx->ref, tpmif->domid); |
|---|
| 396 | |
|---|
| 397 | if (unlikely(HYPERVISOR_grant_table_op(GNTTABOP_map_grant_ref, |
|---|
| 398 | &map_op, 1))) { |
|---|
| 399 | BUG(); |
|---|
| 400 | } |
|---|
| 401 | |
|---|
| 402 | if (map_op.status) { |
|---|
| 403 | DPRINTK(" Grant table operation failure !\n"); |
|---|
| 404 | return -EFAULT; |
|---|
| 405 | } |
|---|
| 406 | |
|---|
| 407 | handle = map_op.handle; |
|---|
| 408 | |
|---|
| 409 | if (to_copy > tx->size) { |
|---|
| 410 | /* |
|---|
| 411 | * User requests more than what's available |
|---|
| 412 | */ |
|---|
| 413 | to_copy = min_t(u32, tx->size, to_copy); |
|---|
| 414 | } |
|---|
| 415 | |
|---|
| 416 | DPRINTK("Copying from mapped memory at %08lx\n", |
|---|
| 417 | (unsigned long)(idx_to_kaddr(tpmif, i) | |
|---|
| 418 | (tx->addr & ~PAGE_MASK))); |
|---|
| 419 | |
|---|
| 420 | src = (void *)(idx_to_kaddr(tpmif, i) | |
|---|
| 421 | ((tx->addr & ~PAGE_MASK) + pg_offset)); |
|---|
| 422 | if (copy_to_buffer(&buffer[offset], |
|---|
| 423 | src, to_copy, isuserbuffer)) { |
|---|
| 424 | return -EFAULT; |
|---|
| 425 | } |
|---|
| 426 | |
|---|
| 427 | DPRINTK("Data from TPM-FE of domain %d are %d %d %d %d\n", |
|---|
| 428 | tpmif->domid, buffer[offset], buffer[offset + 1], |
|---|
| 429 | buffer[offset + 2], buffer[offset + 3]); |
|---|
| 430 | |
|---|
| 431 | gnttab_set_unmap_op(&unmap_op, idx_to_kaddr(tpmif, i), |
|---|
| 432 | GNTMAP_host_map, handle); |
|---|
| 433 | |
|---|
| 434 | if (unlikely |
|---|
| 435 | (HYPERVISOR_grant_table_op |
|---|
| 436 | (GNTTABOP_unmap_grant_ref, &unmap_op, 1))) { |
|---|
| 437 | BUG(); |
|---|
| 438 | } |
|---|
| 439 | |
|---|
| 440 | offset += to_copy; |
|---|
| 441 | pg_offset = 0; |
|---|
| 442 | last_read += to_copy; |
|---|
| 443 | room_left -= to_copy; |
|---|
| 444 | |
|---|
| 445 | to_copy = min_t(u32, PAGE_SIZE, room_left); |
|---|
| 446 | i++; |
|---|
| 447 | } /* while (to_copy > 0) */ |
|---|
| 448 | /* |
|---|
| 449 | * Adjust the last_read pointer |
|---|
| 450 | */ |
|---|
| 451 | pak->last_read = last_read + 4; |
|---|
| 452 | return offset; |
|---|
| 453 | } |
|---|
| 454 | |
|---|
| 455 | /* ============================================================ |
|---|
| 456 | * The file layer for reading data from this device |
|---|
| 457 | * ============================================================ |
|---|
| 458 | */ |
|---|
| 459 | static int vtpm_op_open(struct inode *inode, struct file *f) |
|---|
| 460 | { |
|---|
| 461 | int rc = 0; |
|---|
| 462 | unsigned long flags; |
|---|
| 463 | |
|---|
| 464 | write_lock_irqsave(&dataex.pak_lock, flags); |
|---|
| 465 | if (dataex.has_opener == 0) { |
|---|
| 466 | dataex.has_opener = 1; |
|---|
| 467 | } else { |
|---|
| 468 | rc = -EPERM; |
|---|
| 469 | } |
|---|
| 470 | write_unlock_irqrestore(&dataex.pak_lock, flags); |
|---|
| 471 | return rc; |
|---|
| 472 | } |
|---|
| 473 | |
|---|
| 474 | static ssize_t vtpm_op_read(struct file *file, |
|---|
| 475 | char __user * data, size_t size, loff_t * offset) |
|---|
| 476 | { |
|---|
| 477 | int ret_size = -ENODATA; |
|---|
| 478 | struct packet *pak = NULL; |
|---|
| 479 | unsigned long flags; |
|---|
| 480 | |
|---|
| 481 | write_lock_irqsave(&dataex.pak_lock, flags); |
|---|
| 482 | if (dataex.aborted) { |
|---|
| 483 | dataex.aborted = 0; |
|---|
| 484 | dataex.copied_so_far = 0; |
|---|
| 485 | write_unlock_irqrestore(&dataex.pak_lock, flags); |
|---|
| 486 | return -EIO; |
|---|
| 487 | } |
|---|
| 488 | |
|---|
| 489 | if (list_empty(&dataex.pending_pak)) { |
|---|
| 490 | write_unlock_irqrestore(&dataex.pak_lock, flags); |
|---|
| 491 | wait_event_interruptible(dataex.wait_queue, |
|---|
| 492 | !list_empty(&dataex.pending_pak)); |
|---|
| 493 | write_lock_irqsave(&dataex.pak_lock, flags); |
|---|
| 494 | dataex.copied_so_far = 0; |
|---|
| 495 | } |
|---|
| 496 | |
|---|
| 497 | if (!list_empty(&dataex.pending_pak)) { |
|---|
| 498 | unsigned int left; |
|---|
| 499 | |
|---|
| 500 | pak = list_entry(dataex.pending_pak.next, struct packet, next); |
|---|
| 501 | left = pak->data_len - dataex.copied_so_far; |
|---|
| 502 | list_del(&pak->next); |
|---|
| 503 | write_unlock_irqrestore(&dataex.pak_lock, flags); |
|---|
| 504 | |
|---|
| 505 | DPRINTK("size given by app: %d, available: %d\n", size, left); |
|---|
| 506 | |
|---|
| 507 | ret_size = min_t(size_t, size, left); |
|---|
| 508 | |
|---|
| 509 | ret_size = packet_read(pak, ret_size, data, size, 1); |
|---|
| 510 | |
|---|
| 511 | write_lock_irqsave(&dataex.pak_lock, flags); |
|---|
| 512 | |
|---|
| 513 | if (ret_size < 0) { |
|---|
| 514 | del_singleshot_timer_sync(&pak->processing_timer); |
|---|
| 515 | packet_free(pak); |
|---|
| 516 | dataex.copied_so_far = 0; |
|---|
| 517 | } else { |
|---|
| 518 | DPRINTK("Copied %d bytes to user buffer\n", ret_size); |
|---|
| 519 | |
|---|
| 520 | dataex.copied_so_far += ret_size; |
|---|
| 521 | if (dataex.copied_so_far >= pak->data_len + 4) { |
|---|
| 522 | DPRINTK("All data from this packet given to app.\n"); |
|---|
| 523 | /* All data given to app */ |
|---|
| 524 | |
|---|
| 525 | del_singleshot_timer_sync(&pak-> |
|---|
| 526 | processing_timer); |
|---|
| 527 | list_add_tail(&pak->next, &dataex.current_pak); |
|---|
| 528 | /* |
|---|
| 529 | * The more fontends that are handled at the same time, |
|---|
| 530 | * the more time we give the TPM to process the request. |
|---|
| 531 | */ |
|---|
| 532 | mod_timer(&pak->processing_timer, |
|---|
| 533 | jiffies + (num_frontends * 60 * HZ)); |
|---|
| 534 | dataex.copied_so_far = 0; |
|---|
| 535 | } else { |
|---|
| 536 | list_add(&pak->next, &dataex.pending_pak); |
|---|
| 537 | } |
|---|
| 538 | } |
|---|
| 539 | } |
|---|
| 540 | write_unlock_irqrestore(&dataex.pak_lock, flags); |
|---|
| 541 | |
|---|
| 542 | DPRINTK("Returning result from read to app: %d\n", ret_size); |
|---|
| 543 | |
|---|
| 544 | return ret_size; |
|---|
| 545 | } |
|---|
| 546 | |
|---|
| 547 | /* |
|---|
| 548 | * Write operation - only works after a previous read operation! |
|---|
| 549 | */ |
|---|
| 550 | static ssize_t vtpm_op_write(struct file *file, |
|---|
| 551 | const char __user * data, size_t size, |
|---|
| 552 | loff_t * offset) |
|---|
| 553 | { |
|---|
| 554 | struct packet *pak; |
|---|
| 555 | int rc = 0; |
|---|
| 556 | unsigned int off = 4; |
|---|
| 557 | unsigned long flags; |
|---|
| 558 | struct vtpm_resp_hdr vrh; |
|---|
| 559 | |
|---|
| 560 | /* |
|---|
| 561 | * Minimum required packet size is: |
|---|
| 562 | * 4 bytes for instance number |
|---|
| 563 | * 2 bytes for tag |
|---|
| 564 | * 4 bytes for paramSize |
|---|
| 565 | * 4 bytes for the ordinal |
|---|
| 566 | * sum: 14 bytes |
|---|
| 567 | */ |
|---|
| 568 | if (size < sizeof (vrh)) |
|---|
| 569 | return -EFAULT; |
|---|
| 570 | |
|---|
| 571 | if (copy_from_user(&vrh, data, sizeof (vrh))) |
|---|
| 572 | return -EFAULT; |
|---|
| 573 | |
|---|
| 574 | /* malformed packet? */ |
|---|
| 575 | if ((off + ntohl(vrh.len_no)) != size) |
|---|
| 576 | return -EFAULT; |
|---|
| 577 | |
|---|
| 578 | write_lock_irqsave(&dataex.pak_lock, flags); |
|---|
| 579 | pak = packet_find_instance(&dataex.current_pak, |
|---|
| 580 | ntohl(vrh.instance_no)); |
|---|
| 581 | |
|---|
| 582 | if (pak == NULL) { |
|---|
| 583 | write_unlock_irqrestore(&dataex.pak_lock, flags); |
|---|
| 584 | DPRINTK(KERN_ALERT "No associated packet! (inst=%d)\n", |
|---|
| 585 | ntohl(vrh.instance_no)); |
|---|
| 586 | return -EFAULT; |
|---|
| 587 | } |
|---|
| 588 | |
|---|
| 589 | del_singleshot_timer_sync(&pak->processing_timer); |
|---|
| 590 | list_del(&pak->next); |
|---|
| 591 | |
|---|
| 592 | write_unlock_irqrestore(&dataex.pak_lock, flags); |
|---|
| 593 | |
|---|
| 594 | /* |
|---|
| 595 | * The first 'offset' bytes must be the instance number - skip them. |
|---|
| 596 | */ |
|---|
| 597 | size -= off; |
|---|
| 598 | |
|---|
| 599 | rc = packet_write(pak, &data[off], size, 1); |
|---|
| 600 | |
|---|
| 601 | if (rc > 0) { |
|---|
| 602 | /* I neglected the first 4 bytes */ |
|---|
| 603 | rc += off; |
|---|
| 604 | } |
|---|
| 605 | packet_free(pak); |
|---|
| 606 | return rc; |
|---|
| 607 | } |
|---|
| 608 | |
|---|
| 609 | static int vtpm_op_release(struct inode *inode, struct file *file) |
|---|
| 610 | { |
|---|
| 611 | unsigned long flags; |
|---|
| 612 | |
|---|
| 613 | vtpm_release_packets(NULL, 1); |
|---|
| 614 | write_lock_irqsave(&dataex.pak_lock, flags); |
|---|
| 615 | dataex.has_opener = 0; |
|---|
| 616 | write_unlock_irqrestore(&dataex.pak_lock, flags); |
|---|
| 617 | return 0; |
|---|
| 618 | } |
|---|
| 619 | |
|---|
| 620 | static unsigned int vtpm_op_poll(struct file *file, |
|---|
| 621 | struct poll_table_struct *pts) |
|---|
| 622 | { |
|---|
| 623 | unsigned int flags = POLLOUT | POLLWRNORM; |
|---|
| 624 | |
|---|
| 625 | poll_wait(file, &dataex.wait_queue, pts); |
|---|
| 626 | if (!list_empty(&dataex.pending_pak)) { |
|---|
| 627 | flags |= POLLIN | POLLRDNORM; |
|---|
| 628 | } |
|---|
| 629 | return flags; |
|---|
| 630 | } |
|---|
| 631 | |
|---|
| 632 | static const struct file_operations vtpm_ops = { |
|---|
| 633 | .owner = THIS_MODULE, |
|---|
| 634 | .llseek = no_llseek, |
|---|
| 635 | .open = vtpm_op_open, |
|---|
| 636 | .read = vtpm_op_read, |
|---|
| 637 | .write = vtpm_op_write, |
|---|
| 638 | .release = vtpm_op_release, |
|---|
| 639 | .poll = vtpm_op_poll, |
|---|
| 640 | }; |
|---|
| 641 | |
|---|
| 642 | static struct miscdevice vtpms_miscdevice = { |
|---|
| 643 | .minor = 225, |
|---|
| 644 | .name = "vtpm", |
|---|
| 645 | .fops = &vtpm_ops, |
|---|
| 646 | }; |
|---|
| 647 | |
|---|
| 648 | /*************************************************************** |
|---|
| 649 | Utility functions |
|---|
| 650 | ***************************************************************/ |
|---|
| 651 | |
|---|
| 652 | static int tpm_send_fail_message(struct packet *pak, u8 req_tag) |
|---|
| 653 | { |
|---|
| 654 | int rc; |
|---|
| 655 | static const unsigned char tpm_error_message_fail[] = { |
|---|
| 656 | 0x00, 0x00, |
|---|
| 657 | 0x00, 0x00, 0x00, 0x0a, |
|---|
| 658 | 0x00, 0x00, 0x00, 0x09 /* TPM_FAIL */ |
|---|
| 659 | }; |
|---|
| 660 | unsigned char buffer[sizeof (tpm_error_message_fail)]; |
|---|
| 661 | |
|---|
| 662 | memcpy(buffer, tpm_error_message_fail, |
|---|
| 663 | sizeof (tpm_error_message_fail)); |
|---|
| 664 | /* |
|---|
| 665 | * Insert the right response tag depending on the given tag |
|---|
| 666 | * All response tags are '+3' to the request tag. |
|---|
| 667 | */ |
|---|
| 668 | buffer[1] = req_tag + 3; |
|---|
| 669 | |
|---|
| 670 | /* |
|---|
| 671 | * Write the data to shared memory and notify the front-end |
|---|
| 672 | */ |
|---|
| 673 | rc = packet_write(pak, buffer, sizeof (buffer), 0); |
|---|
| 674 | |
|---|
| 675 | return rc; |
|---|
| 676 | } |
|---|
| 677 | |
|---|
| 678 | static int _vtpm_release_packets(struct list_head *head, |
|---|
| 679 | tpmif_t * tpmif, int send_msgs) |
|---|
| 680 | { |
|---|
| 681 | int aborted = 0; |
|---|
| 682 | int c = 0; |
|---|
| 683 | struct packet *pak; |
|---|
| 684 | struct list_head *pos, *tmp; |
|---|
| 685 | |
|---|
| 686 | list_for_each_safe(pos, tmp, head) { |
|---|
| 687 | pak = list_entry(pos, struct packet, next); |
|---|
| 688 | c += 1; |
|---|
| 689 | |
|---|
| 690 | if (tpmif == NULL || pak->tpmif == tpmif) { |
|---|
| 691 | int can_send = 0; |
|---|
| 692 | |
|---|
| 693 | del_singleshot_timer_sync(&pak->processing_timer); |
|---|
| 694 | list_del(&pak->next); |
|---|
| 695 | |
|---|
| 696 | if (pak->tpmif && pak->tpmif->status == CONNECTED) { |
|---|
| 697 | can_send = 1; |
|---|
| 698 | } |
|---|
| 699 | |
|---|
| 700 | if (send_msgs && can_send) { |
|---|
| 701 | tpm_send_fail_message(pak, pak->req_tag); |
|---|
| 702 | } |
|---|
| 703 | packet_free(pak); |
|---|
| 704 | if (c == 1) |
|---|
| 705 | aborted = 1; |
|---|
| 706 | } |
|---|
| 707 | } |
|---|
| 708 | return aborted; |
|---|
| 709 | } |
|---|
| 710 | |
|---|
| 711 | int vtpm_release_packets(tpmif_t * tpmif, int send_msgs) |
|---|
| 712 | { |
|---|
| 713 | unsigned long flags; |
|---|
| 714 | |
|---|
| 715 | write_lock_irqsave(&dataex.pak_lock, flags); |
|---|
| 716 | |
|---|
| 717 | dataex.aborted = _vtpm_release_packets(&dataex.pending_pak, |
|---|
| 718 | tpmif, |
|---|
| 719 | send_msgs); |
|---|
| 720 | _vtpm_release_packets(&dataex.current_pak, tpmif, send_msgs); |
|---|
| 721 | |
|---|
| 722 | write_unlock_irqrestore(&dataex.pak_lock, flags); |
|---|
| 723 | return 0; |
|---|
| 724 | } |
|---|
| 725 | |
|---|
| 726 | static int vtpm_queue_packet(struct packet *pak) |
|---|
| 727 | { |
|---|
| 728 | int rc = 0; |
|---|
| 729 | |
|---|
| 730 | if (dataex.has_opener) { |
|---|
| 731 | unsigned long flags; |
|---|
| 732 | |
|---|
| 733 | write_lock_irqsave(&dataex.pak_lock, flags); |
|---|
| 734 | list_add_tail(&pak->next, &dataex.pending_pak); |
|---|
| 735 | /* give the TPM some time to pick up the request */ |
|---|
| 736 | mod_timer(&pak->processing_timer, jiffies + (30 * HZ)); |
|---|
| 737 | write_unlock_irqrestore(&dataex.pak_lock, flags); |
|---|
| 738 | |
|---|
| 739 | wake_up_interruptible(&dataex.wait_queue); |
|---|
| 740 | } else { |
|---|
| 741 | rc = -EFAULT; |
|---|
| 742 | } |
|---|
| 743 | return rc; |
|---|
| 744 | } |
|---|
| 745 | |
|---|
| 746 | static int vtpm_receive(tpmif_t * tpmif, u32 size) |
|---|
| 747 | { |
|---|
| 748 | int rc = 0; |
|---|
| 749 | unsigned char buffer[10]; |
|---|
| 750 | __be32 *native_size; |
|---|
| 751 | struct packet *pak = packet_alloc(tpmif, size, 0, 0); |
|---|
| 752 | |
|---|
| 753 | if (!pak) |
|---|
| 754 | return -ENOMEM; |
|---|
| 755 | /* |
|---|
| 756 | * Read 10 bytes from the received buffer to test its |
|---|
| 757 | * content for validity. |
|---|
| 758 | */ |
|---|
| 759 | if (sizeof (buffer) != packet_read(pak, |
|---|
| 760 | sizeof (buffer), buffer, |
|---|
| 761 | sizeof (buffer), 0)) { |
|---|
| 762 | goto failexit; |
|---|
| 763 | } |
|---|
| 764 | /* |
|---|
| 765 | * Reset the packet read pointer so we can read all its |
|---|
| 766 | * contents again. |
|---|
| 767 | */ |
|---|
| 768 | packet_reset(pak); |
|---|
| 769 | |
|---|
| 770 | native_size = (__force __be32 *) (&buffer[4 + 2]); |
|---|
| 771 | /* |
|---|
| 772 | * Verify that the size of the packet is correct |
|---|
| 773 | * as indicated and that there's actually someone reading packets. |
|---|
| 774 | * The minimum size of the packet is '10' for tag, size indicator |
|---|
| 775 | * and ordinal. |
|---|
| 776 | */ |
|---|
| 777 | if (size < 10 || |
|---|
| 778 | be32_to_cpu(*native_size) != size || |
|---|
| 779 | 0 == dataex.has_opener || tpmif->status != CONNECTED) { |
|---|
| 780 | rc = -EINVAL; |
|---|
| 781 | goto failexit; |
|---|
| 782 | } else { |
|---|
| 783 | rc = vtpm_queue_packet(pak); |
|---|
| 784 | if (rc < 0) |
|---|
| 785 | goto failexit; |
|---|
| 786 | } |
|---|
| 787 | return 0; |
|---|
| 788 | |
|---|
| 789 | failexit: |
|---|
| 790 | if (pak) { |
|---|
| 791 | tpm_send_fail_message(pak, buffer[4 + 1]); |
|---|
| 792 | packet_free(pak); |
|---|
| 793 | } |
|---|
| 794 | return rc; |
|---|
| 795 | } |
|---|
| 796 | |
|---|
| 797 | /* |
|---|
| 798 | * Timeout function that gets invoked when a packet has not been processed |
|---|
| 799 | * during the timeout period. |
|---|
| 800 | * The packet must be on a list when this function is invoked. This |
|---|
| 801 | * also means that once its taken off a list, the timer must be |
|---|
| 802 | * destroyed as well. |
|---|
| 803 | */ |
|---|
| 804 | static void processing_timeout(unsigned long ptr) |
|---|
| 805 | { |
|---|
| 806 | struct packet *pak = (struct packet *)ptr; |
|---|
| 807 | unsigned long flags; |
|---|
| 808 | |
|---|
| 809 | write_lock_irqsave(&dataex.pak_lock, flags); |
|---|
| 810 | /* |
|---|
| 811 | * The packet needs to be searched whether it |
|---|
| 812 | * is still on the list. |
|---|
| 813 | */ |
|---|
| 814 | if (pak == packet_find_packet(&dataex.pending_pak, pak) || |
|---|
| 815 | pak == packet_find_packet(&dataex.current_pak, pak)) { |
|---|
| 816 | if ((pak->flags & PACKET_FLAG_DISCARD_RESPONSE) == 0) { |
|---|
| 817 | tpm_send_fail_message(pak, pak->req_tag); |
|---|
| 818 | } |
|---|
| 819 | /* discard future responses */ |
|---|
| 820 | pak->flags |= PACKET_FLAG_DISCARD_RESPONSE; |
|---|
| 821 | } |
|---|
| 822 | |
|---|
| 823 | write_unlock_irqrestore(&dataex.pak_lock, flags); |
|---|
| 824 | } |
|---|
| 825 | |
|---|
| 826 | static void tpm_tx_action(unsigned long unused); |
|---|
| 827 | static DECLARE_TASKLET(tpm_tx_tasklet, tpm_tx_action, 0); |
|---|
| 828 | |
|---|
| 829 | static struct list_head tpm_schedule_list; |
|---|
| 830 | static spinlock_t tpm_schedule_list_lock; |
|---|
| 831 | |
|---|
| 832 | static inline void maybe_schedule_tx_action(void) |
|---|
| 833 | { |
|---|
| 834 | smp_mb(); |
|---|
| 835 | tasklet_schedule(&tpm_tx_tasklet); |
|---|
| 836 | } |
|---|
| 837 | |
|---|
| 838 | static inline int __on_tpm_schedule_list(tpmif_t * tpmif) |
|---|
| 839 | { |
|---|
| 840 | return tpmif->list.next != NULL; |
|---|
| 841 | } |
|---|
| 842 | |
|---|
| 843 | static void remove_from_tpm_schedule_list(tpmif_t * tpmif) |
|---|
| 844 | { |
|---|
| 845 | spin_lock_irq(&tpm_schedule_list_lock); |
|---|
| 846 | if (likely(__on_tpm_schedule_list(tpmif))) { |
|---|
| 847 | list_del(&tpmif->list); |
|---|
| 848 | tpmif->list.next = NULL; |
|---|
| 849 | tpmif_put(tpmif); |
|---|
| 850 | } |
|---|
| 851 | spin_unlock_irq(&tpm_schedule_list_lock); |
|---|
| 852 | } |
|---|
| 853 | |
|---|
| 854 | static void add_to_tpm_schedule_list_tail(tpmif_t * tpmif) |
|---|
| 855 | { |
|---|
| 856 | if (__on_tpm_schedule_list(tpmif)) |
|---|
| 857 | return; |
|---|
| 858 | |
|---|
| 859 | spin_lock_irq(&tpm_schedule_list_lock); |
|---|
| 860 | if (!__on_tpm_schedule_list(tpmif) && tpmif->active) { |
|---|
| 861 | list_add_tail(&tpmif->list, &tpm_schedule_list); |
|---|
| 862 | tpmif_get(tpmif); |
|---|
| 863 | } |
|---|
| 864 | spin_unlock_irq(&tpm_schedule_list_lock); |
|---|
| 865 | } |
|---|
| 866 | |
|---|
| 867 | void tpmif_schedule_work(tpmif_t * tpmif) |
|---|
| 868 | { |
|---|
| 869 | add_to_tpm_schedule_list_tail(tpmif); |
|---|
| 870 | maybe_schedule_tx_action(); |
|---|
| 871 | } |
|---|
| 872 | |
|---|
| 873 | void tpmif_deschedule_work(tpmif_t * tpmif) |
|---|
| 874 | { |
|---|
| 875 | remove_from_tpm_schedule_list(tpmif); |
|---|
| 876 | } |
|---|
| 877 | |
|---|
| 878 | static void tpm_tx_action(unsigned long unused) |
|---|
| 879 | { |
|---|
| 880 | struct list_head *ent; |
|---|
| 881 | tpmif_t *tpmif; |
|---|
| 882 | tpmif_tx_request_t *tx; |
|---|
| 883 | |
|---|
| 884 | DPRINTK("%s: Getting data from front-end(s)!\n", __FUNCTION__); |
|---|
| 885 | |
|---|
| 886 | while (!list_empty(&tpm_schedule_list)) { |
|---|
| 887 | /* Get a tpmif from the list with work to do. */ |
|---|
| 888 | ent = tpm_schedule_list.next; |
|---|
| 889 | tpmif = list_entry(ent, tpmif_t, list); |
|---|
| 890 | tpmif_get(tpmif); |
|---|
| 891 | remove_from_tpm_schedule_list(tpmif); |
|---|
| 892 | |
|---|
| 893 | tx = &tpmif->tx->ring[0].req; |
|---|
| 894 | |
|---|
| 895 | /* pass it up */ |
|---|
| 896 | vtpm_receive(tpmif, tx->size); |
|---|
| 897 | |
|---|
| 898 | tpmif_put(tpmif); |
|---|
| 899 | } |
|---|
| 900 | } |
|---|
| 901 | |
|---|
| 902 | irqreturn_t tpmif_be_int(int irq, void *dev_id, struct pt_regs *regs) |
|---|
| 903 | { |
|---|
| 904 | tpmif_t *tpmif = (tpmif_t *) dev_id; |
|---|
| 905 | |
|---|
| 906 | add_to_tpm_schedule_list_tail(tpmif); |
|---|
| 907 | maybe_schedule_tx_action(); |
|---|
| 908 | return IRQ_HANDLED; |
|---|
| 909 | } |
|---|
| 910 | |
|---|
| 911 | static int __init tpmback_init(void) |
|---|
| 912 | { |
|---|
| 913 | int rc; |
|---|
| 914 | |
|---|
| 915 | if ((rc = misc_register(&vtpms_miscdevice)) != 0) { |
|---|
| 916 | printk(KERN_ALERT |
|---|
| 917 | "Could not register misc device for TPM BE.\n"); |
|---|
| 918 | return rc; |
|---|
| 919 | } |
|---|
| 920 | |
|---|
| 921 | dataex_init(&dataex); |
|---|
| 922 | |
|---|
| 923 | spin_lock_init(&tpm_schedule_list_lock); |
|---|
| 924 | INIT_LIST_HEAD(&tpm_schedule_list); |
|---|
| 925 | |
|---|
| 926 | tpmif_interface_init(); |
|---|
| 927 | tpmif_xenbus_init(); |
|---|
| 928 | |
|---|
| 929 | printk(KERN_ALERT "Successfully initialized TPM backend driver.\n"); |
|---|
| 930 | |
|---|
| 931 | return 0; |
|---|
| 932 | } |
|---|
| 933 | |
|---|
| 934 | module_init(tpmback_init); |
|---|
| 935 | |
|---|
| 936 | void __exit tpmback_exit(void) |
|---|
| 937 | { |
|---|
| 938 | vtpm_release_packets(NULL, 0); |
|---|
| 939 | tpmif_xenbus_exit(); |
|---|
| 940 | tpmif_interface_exit(); |
|---|
| 941 | misc_deregister(&vtpms_miscdevice); |
|---|
| 942 | } |
|---|
| 943 | |
|---|
| 944 | MODULE_LICENSE("Dual BSD/GPL"); |
|---|