// SPDX-License-Identifier: GPL-2.0-only /* * Copyright (C) 2025 Red Hat, Inc. All Rights Reserved. * * Driver for the vTPM defined by the AMD SVSM spec [1]. * * The specification defines a protocol that a SEV-SNP guest OS can use to * discover and talk to a vTPM emulated by the Secure VM Service Module (SVSM) * in the guest context, but at a more privileged level (usually VMPL0). * * [1] "Secure VM Service Module for SEV-SNP Guests" * Publication # 58019 Revision: 1.00 */ #include #include #include #include #include #include "tpm.h" struct tpm_svsm_priv { void *buffer; }; static int tpm_svsm_send(struct tpm_chip *chip, u8 *buf, size_t len) { struct tpm_svsm_priv *priv = dev_get_drvdata(&chip->dev); int ret; ret = svsm_vtpm_cmd_request_fill(priv->buffer, 0, buf, len); if (ret) return ret; /* * The SVSM call uses the same buffer for the command and for the * response, so after this call, the buffer will contain the response * that can be used by .recv() op. */ return snp_svsm_vtpm_send_command(priv->buffer); } static int tpm_svsm_recv(struct tpm_chip *chip, u8 *buf, size_t len) { struct tpm_svsm_priv *priv = dev_get_drvdata(&chip->dev); /* * The internal buffer contains the response after we send the command * to SVSM. */ return svsm_vtpm_cmd_response_parse(priv->buffer, buf, len); } static struct tpm_class_ops tpm_chip_ops = { .flags = TPM_OPS_AUTO_STARTUP, .recv = tpm_svsm_recv, .send = tpm_svsm_send, }; static int __init tpm_svsm_probe(struct platform_device *pdev) { struct device *dev = &pdev->dev; struct tpm_svsm_priv *priv; struct tpm_chip *chip; int err; priv = devm_kmalloc(dev, sizeof(*priv), GFP_KERNEL); if (!priv) return -ENOMEM; /* * The maximum buffer supported is one page (see SVSM_VTPM_MAX_BUFFER * in tpm_svsm.h). */ priv->buffer = (void *)devm_get_free_pages(dev, GFP_KERNEL, 0); if (!priv->buffer) return -ENOMEM; chip = tpmm_chip_alloc(dev, &tpm_chip_ops); if (IS_ERR(chip)) return PTR_ERR(chip); dev_set_drvdata(&chip->dev, priv); err = tpm2_probe(chip); if (err) return err; err = tpm_chip_register(chip); if (err) return err; dev_info(dev, "SNP SVSM vTPM %s device\n", (chip->flags & TPM_CHIP_FLAG_TPM2) ? "2.0" : "1.2"); return 0; } static void __exit tpm_svsm_remove(struct platform_device *pdev) { struct tpm_chip *chip = platform_get_drvdata(pdev); tpm_chip_unregister(chip); } /* * tpm_svsm_remove() lives in .exit.text. For drivers registered via * module_platform_driver_probe() this is ok because they cannot get unbound * at runtime. So mark the driver struct with __refdata to prevent modpost * triggering a section mismatch warning. */ static struct platform_driver tpm_svsm_driver __refdata = { .remove = __exit_p(tpm_svsm_remove), .driver = { .name = "tpm-svsm", }, }; module_platform_driver_probe(tpm_svsm_driver, tpm_svsm_probe); MODULE_DESCRIPTION("SNP SVSM vTPM Driver"); MODULE_LICENSE("GPL"); MODULE_ALIAS("platform:tpm-svsm");