root/drivers/char/tpm/tpm-dev-common.c
// SPDX-License-Identifier: GPL-2.0-only
/*
 * Copyright (C) 2004 IBM Corporation
 * Authors:
 * Leendert van Doorn <leendert@watson.ibm.com>
 * Dave Safford <safford@watson.ibm.com>
 * Reiner Sailer <sailer@watson.ibm.com>
 * Kylene Hall <kjhall@us.ibm.com>
 *
 * Copyright (C) 2013 Obsidian Research Corp
 * Jason Gunthorpe <jgunthorpe@obsidianresearch.com>
 *
 * Device file system interface to the TPM
 */
#include <linux/poll.h>
#include <linux/slab.h>
#include <linux/uaccess.h>
#include <linux/workqueue.h>
#include "tpm.h"
#include "tpm-dev.h"

static struct workqueue_struct *tpm_dev_wq;

static ssize_t tpm_dev_transmit(struct tpm_chip *chip, struct tpm_space *space,
                                u8 *buf, size_t bufsiz)
{
        struct tpm_header *header = (void *)buf;
        ssize_t ret, len;

        if (chip->flags & TPM_CHIP_FLAG_TPM2)
                tpm2_end_auth_session(chip);

        ret = tpm2_prepare_space(chip, space, buf, bufsiz);
        /* If the command is not implemented by the TPM, synthesize a
         * response with a TPM2_RC_COMMAND_CODE return for user-space.
         */
        if (ret == -EOPNOTSUPP) {
                header->length = cpu_to_be32(sizeof(*header));
                header->tag = cpu_to_be16(TPM2_ST_NO_SESSIONS);
                header->return_code = cpu_to_be32(TPM2_RC_COMMAND_CODE |
                                                  TSS2_RESMGR_TPM_RC_LAYER);
                ret = sizeof(*header);
        }
        if (ret)
                goto out_rc;

        len = tpm_transmit(chip, buf, bufsiz);
        if (len < 0)
                ret = len;

        if (!ret)
                ret = tpm2_commit_space(chip, space, buf, &len);
        else
                tpm2_flush_space(chip);

out_rc:
        return ret ? ret : len;
}

static void tpm_dev_async_work(struct work_struct *work)
{
        struct file_priv *priv =
                        container_of(work, struct file_priv, async_work);
        ssize_t ret;

        mutex_lock(&priv->buffer_mutex);
        priv->command_enqueued = false;
        ret = tpm_try_get_ops(priv->chip);
        if (ret) {
                priv->response_length = ret;
                goto out;
        }

        ret = tpm_dev_transmit(priv->chip, priv->space, priv->data_buffer,
                               sizeof(priv->data_buffer));
        tpm_put_ops(priv->chip);

        /*
         * If ret is > 0 then tpm_dev_transmit returned the size of the
         * response. If ret is < 0 then tpm_dev_transmit failed and
         * returned an error code.
         */
        if (ret != 0) {
                priv->response_length = ret;
                mod_timer(&priv->user_read_timer, jiffies + (120 * HZ));
        }
out:
        mutex_unlock(&priv->buffer_mutex);
        wake_up_interruptible(&priv->async_wait);
}

static void user_reader_timeout(struct timer_list *t)
{
        struct file_priv *priv = timer_container_of(priv, t, user_read_timer);

        pr_warn("TPM user space timeout is deprecated (pid=%d)\n",
                task_tgid_nr(current));

        schedule_work(&priv->timeout_work);
}

static void tpm_timeout_work(struct work_struct *work)
{
        struct file_priv *priv = container_of(work, struct file_priv,
                                              timeout_work);

        mutex_lock(&priv->buffer_mutex);
        priv->response_read = true;
        priv->response_length = 0;
        memset(priv->data_buffer, 0, sizeof(priv->data_buffer));
        mutex_unlock(&priv->buffer_mutex);
        wake_up_interruptible(&priv->async_wait);
}

void tpm_common_open(struct file *file, struct tpm_chip *chip,
                     struct file_priv *priv, struct tpm_space *space)
{
        priv->chip = chip;
        priv->space = space;
        priv->response_read = true;

        mutex_init(&priv->buffer_mutex);
        timer_setup(&priv->user_read_timer, user_reader_timeout, 0);
        INIT_WORK(&priv->timeout_work, tpm_timeout_work);
        INIT_WORK(&priv->async_work, tpm_dev_async_work);
        init_waitqueue_head(&priv->async_wait);
        file->private_data = priv;
}

ssize_t tpm_common_read(struct file *file, char __user *buf,
                        size_t size, loff_t *off)
{
        struct file_priv *priv = file->private_data;
        ssize_t ret_size = 0;
        int rc;

        mutex_lock(&priv->buffer_mutex);

        if (priv->response_length) {
                priv->response_read = true;

                ret_size = min_t(ssize_t, size, priv->response_length);
                if (ret_size <= 0) {
                        priv->response_length = 0;
                        goto out;
                }

                rc = copy_to_user(buf, priv->data_buffer + *off, ret_size);
                if (rc) {
                        memset(priv->data_buffer, 0, TPM_BUFSIZE);
                        priv->response_length = 0;
                        ret_size = -EFAULT;
                } else {
                        memset(priv->data_buffer + *off, 0, ret_size);
                        priv->response_length -= ret_size;
                        *off += ret_size;
                }
        }

out:
        if (!priv->response_length) {
                *off = 0;
                timer_delete_sync(&priv->user_read_timer);
                flush_work(&priv->timeout_work);
        }
        mutex_unlock(&priv->buffer_mutex);
        return ret_size;
}

ssize_t tpm_common_write(struct file *file, const char __user *buf,
                         size_t size, loff_t *off)
{
        struct file_priv *priv = file->private_data;
        int ret = 0;

        if (size > TPM_BUFSIZE)
                return -E2BIG;

        mutex_lock(&priv->buffer_mutex);

        /* Cannot perform a write until the read has cleared either via
         * tpm_read or a user_read_timer timeout. This also prevents split
         * buffered writes from blocking here.
         */
        if ((!priv->response_read && priv->response_length) ||
            priv->command_enqueued) {
                ret = -EBUSY;
                goto out;
        }

        if (copy_from_user(priv->data_buffer, buf, size)) {
                ret = -EFAULT;
                goto out;
        }

        if (size < 6 ||
            size < be32_to_cpu(*((__be32 *)(priv->data_buffer + 2)))) {
                ret = -EINVAL;
                goto out;
        }

        priv->response_length = 0;
        priv->response_read = false;
        *off = 0;

        /*
         * If in nonblocking mode schedule an async job to send
         * the command return the size.
         * In case of error the err code will be returned in
         * the subsequent read call.
         */
        if (file->f_flags & O_NONBLOCK) {
                priv->command_enqueued = true;
                queue_work(tpm_dev_wq, &priv->async_work);
                mutex_unlock(&priv->buffer_mutex);
                return size;
        }

        /* atomic tpm command send and result receive. We only hold the ops
         * lock during this period so that the tpm can be unregistered even if
         * the char dev is held open.
         */
        if (tpm_try_get_ops(priv->chip)) {
                ret = -EPIPE;
                goto out;
        }

        ret = tpm_dev_transmit(priv->chip, priv->space, priv->data_buffer,
                               sizeof(priv->data_buffer));
        tpm_put_ops(priv->chip);

        if (ret > 0) {
                priv->response_length = ret;
                mod_timer(&priv->user_read_timer, jiffies + (120 * HZ));
                ret = size;
        }
out:
        mutex_unlock(&priv->buffer_mutex);
        return ret;
}

__poll_t tpm_common_poll(struct file *file, poll_table *wait)
{
        struct file_priv *priv = file->private_data;
        __poll_t mask = 0;

        poll_wait(file, &priv->async_wait, wait);
        mutex_lock(&priv->buffer_mutex);

        /*
         * The response_length indicates if there is still response
         * (or part of it) to be consumed. Partial reads decrease it
         * by the number of bytes read, and write resets it the zero.
         */
        if (priv->response_length)
                mask = EPOLLIN | EPOLLRDNORM;
        else
                mask = EPOLLOUT | EPOLLWRNORM;

        mutex_unlock(&priv->buffer_mutex);
        return mask;
}

/*
 * Called on file close
 */
void tpm_common_release(struct file *file, struct file_priv *priv)
{
        flush_work(&priv->async_work);
        timer_delete_sync(&priv->user_read_timer);
        flush_work(&priv->timeout_work);
        file->private_data = NULL;
        priv->response_length = 0;
}

int __init tpm_dev_common_init(void)
{
        tpm_dev_wq = alloc_workqueue("tpm_dev_wq", WQ_MEM_RECLAIM | WQ_PERCPU,
                                     0);

        return !tpm_dev_wq ? -ENOMEM : 0;
}

void __exit tpm_dev_common_exit(void)
{
        if (tpm_dev_wq) {
                destroy_workqueue(tpm_dev_wq);
                tpm_dev_wq = NULL;
        }
}