[PATCH v2 6/7] tpm: Implement state command for Cr50
Ilias Apalodimas
ilias.apalodimas at linaro.org
Tue Aug 16 14:43:01 CEST 2022
Hi Simon,
I know little of this device and the whole patch seems fine apart from
the definitions and declarations of the state functions.
On Sat, 13 Aug 2022 at 22:56, Simon Glass <sjg at chromium.org> wrote:
>
>
> drivers/tpm/cr50_i2c.c | 117 +++++++++++++++++++++++++++++++++++++++++
> include/tpm-v2.h | 54 +++++++++++++++++++
> lib/tpm-v2.c | 24 +++++++++
[...]
> diff --git a/include/tpm-v2.h b/include/tpm-v2.h
> index e79c90b9395..8e90a616220 100644
> --- a/include/tpm-v2.h
> +++ b/include/tpm-v2.h
> @@ -419,6 +419,50 @@ enum {
> HR_NV_INDEX = TPM_HT_NV_INDEX << HR_SHIFT,
> };
>
> +/*
> + * Operations specific to the Cr50 TPM used on Chromium OS and Android devices
> + *
> + * FIXME: below is not enough to differentiate between vendors commands
> + * of numerous devices. However, the current tpm2 APIs aren't very amenable
> + * to extending generically because the marshaling code is assuming all
> + * knowledge of all commands.
> + */
> +#define TPM2_CC_VENDOR_BIT_MASK 0x20000000
> +
> +#define TPM2_CR50_VENDOR_COMMAND (TPM2_CC_VENDOR_BIT_MASK | 0)
> +#define TPM2_CR50_SUB_CMD_IMMEDIATE_RESET 19
> +#define TPM2_CR50_SUB_CMD_NVMEM_ENABLE_COMMITS 21
> +#define TPM2_CR50_SUB_CMD_REPORT_TPM_STATE 23
> +#define TPM2_CR50_SUB_CMD_TURN_UPDATE_ON 24
> +#define TPM2_CR50_SUB_CMD_GET_REC_BTN 29
> +#define TPM2_CR50_SUB_CMD_TPM_MODE 40
> +#define TPM2_CR50_SUB_CMD_GET_BOOT_MODE 52
> +#define TPM2_CR50_SUB_CMD_RESET_EC 53
> +
> +/* Cr50 vendor-specific error codes. */
> +#define VENDOR_RC_ERR 0x00000500
> +enum cr50_vendor_rc {
> + VENDOR_RC_INTERNAL_ERROR = (VENDOR_RC_ERR | 6),
> + VENDOR_RC_NO_SUCH_SUBCOMMAND = (VENDOR_RC_ERR | 8),
> + VENDOR_RC_NO_SUCH_COMMAND = (VENDOR_RC_ERR | 127),
> +};
> +
> +enum cr50_tpm_mode {
> + /*
> + * Default state: TPM is enabled, and may be set to either
> + * TPM_MODE_ENABLED or TPM_MODE_DISABLED.
> + */
> + TPM_MODE_ENABLED_TENTATIVE = 0,
> +
> + /* TPM is enabled, and mode may not be changed. */
> + TPM_MODE_ENABLED = 1,
> +
> + /* TPM is disabled, and mode may not be changed. */
> + TPM_MODE_DISABLED = 2,
> +
> + TPM_MODE_INVALID,
> +};
> +
> /**
> * Issue a TPM2_Startup command.
> *
> @@ -658,4 +702,14 @@ u32 tpm2_disable_platform_hierarchy(struct udevice *dev);
> u32 tpm2_submit_command(struct udevice *dev, const u8 *sendbuf,
> u8 *recvbuf, size_t *recv_size);
>
> +/**
> + * tpm_cr50_report_state() - Report the Cr50 internal state
> + *
> + * @dev: TPM device
> + * @recvbuf: Buffer to save the response to
> + * @recv_size: Pointer to the size of the response buffer
> + * Return: result of the operation
> + */
> +u32 tpm2_cr50_report_state(struct udevice *dev, u8 *recvbuf, size_t *recv_size);
> +
I think we should keep the generic include files clean for hardware
specific details.
> #endif /* __TPM_V2_H */
> diff --git a/lib/tpm-v2.c b/lib/tpm-v2.c
> index 3e240bb4c67..3de4841974a 100644
> --- a/lib/tpm-v2.c
> +++ b/lib/tpm-v2.c
> @@ -679,3 +679,27 @@ u32 tpm2_submit_command(struct udevice *dev, const u8 *sendbuf,
> {
> return tpm_sendrecv_command(dev, sendbuf, recvbuf, recv_size);
> }
> +
> +u32 tpm2_cr50_report_state(struct udevice *dev, u8 *recvbuf, size_t *recv_size)
> +{
> + u8 command_v2[COMMAND_BUFFER_SIZE] = {
> + /* header 10 bytes */
> + tpm_u16(TPM2_ST_NO_SESSIONS), /* TAG */
> + tpm_u32(10 + 2), /* Length */
> + tpm_u32(TPM2_CR50_VENDOR_COMMAND), /* Command code */
> +
> + tpm_u16(TPM2_CR50_SUB_CMD_REPORT_TPM_STATE),
> + };
> + int ret;
> +
> + ret = tpm_sendrecv_command(dev, command_v2, recvbuf, recv_size);
> + log_debug("ret=%s, %x\n", dev->name, ret);
> + if (ret)
> + return ret;
> + if (*recv_size < 12)
> + return -ENODATA;
> + *recv_size -= 12;
> + memcpy(recvbuf, recvbuf + 12, *recv_size);
> +
> + return 0;
> +}
Same here, this functions seems ok but shouldn't land in the generic TPM API
Thanks
/Ilias
> --
> 2.37.1.595.g718a3a8f04-goog
>
More information about the U-Boot
mailing list