[PATCH] tpm: address missing const defs
[safe/jmp/linux-2.6] / drivers / char / tpm / tpm.c
1 /*
2  * Copyright (C) 2004 IBM Corporation
3  *
4  * Authors:
5  * Leendert van Doorn <leendert@watson.ibm.com>
6  * Dave Safford <safford@watson.ibm.com>
7  * Reiner Sailer <sailer@watson.ibm.com>
8  * Kylene Hall <kjhall@us.ibm.com>
9  *
10  * Maintained by: <tpmdd_devel@lists.sourceforge.net>
11  *
12  * Device driver for TCG/TCPA TPM (trusted platform module).
13  * Specifications at www.trustedcomputinggroup.org       
14  *
15  * This program is free software; you can redistribute it and/or
16  * modify it under the terms of the GNU General Public License as
17  * published by the Free Software Foundation, version 2 of the
18  * License.
19  * 
20  * Note, the TPM chip is not interrupt driven (only polling)
21  * and can have very long timeouts (minutes!). Hence the unusual
22  * calls to msleep.
23  *
24  */
25
26 #include <linux/sched.h>
27 #include <linux/poll.h>
28 #include <linux/spinlock.h>
29 #include "tpm.h"
30
31 enum tpm_const {
32         TPM_MINOR = 224,        /* officially assigned */
33         TPM_BUFSIZE = 2048,
34         TPM_NUM_DEVICES = 256,
35         TPM_NUM_MASK_ENTRIES = TPM_NUM_DEVICES / (8 * sizeof(int))
36 };
37
38   /* PCI configuration addresses */
39 enum tpm_pci_config_addr {
40         PCI_GEN_PMCON_1 = 0xA0,
41         PCI_GEN1_DEC = 0xE4,
42         PCI_LPC_EN = 0xE6,
43         PCI_GEN2_DEC = 0xEC
44 };
45
46 enum tpm_config {
47         TPM_LOCK_REG = 0x0D,
48         TPM_INTERUPT_REG = 0x0A,
49         TPM_BASE_ADDR_LO = 0x08,
50         TPM_BASE_ADDR_HI = 0x09,
51         TPM_UNLOCK_VALUE = 0x55,
52         TPM_LOCK_VALUE = 0xAA,
53         TPM_DISABLE_INTERUPT_VALUE = 0x00
54 };
55
56
57 static LIST_HEAD(tpm_chip_list);
58 static DEFINE_SPINLOCK(driver_lock);
59 static int dev_mask[TPM_NUM_MASK_ENTRIES];
60
61 static void user_reader_timeout(unsigned long ptr)
62 {
63         struct tpm_chip *chip = (struct tpm_chip *) ptr;
64
65         down(&chip->buffer_mutex);
66         atomic_set(&chip->data_pending, 0);
67         memset(chip->data_buffer, 0, TPM_BUFSIZE);
68         up(&chip->buffer_mutex);
69 }
70
71 /*
72  * Initialize the LPC bus and enable the TPM ports
73  */
74 int tpm_lpc_bus_init(struct pci_dev *pci_dev, u16 base)
75 {
76         u32 lpcenable, tmp;
77         int is_lpcm = 0;
78
79         switch (pci_dev->vendor) {
80         case PCI_VENDOR_ID_INTEL:
81                 switch (pci_dev->device) {
82                 case PCI_DEVICE_ID_INTEL_82801CA_12:
83                 case PCI_DEVICE_ID_INTEL_82801DB_12:
84                         is_lpcm = 1;
85                         break;
86                 }
87                 /* init ICH (enable LPC) */
88                 pci_read_config_dword(pci_dev, PCI_GEN1_DEC, &lpcenable);
89                 lpcenable |= 0x20000000;
90                 pci_write_config_dword(pci_dev, PCI_GEN1_DEC, lpcenable);
91
92                 if (is_lpcm) {
93                         pci_read_config_dword(pci_dev, PCI_GEN1_DEC,
94                                               &lpcenable);
95                         if ((lpcenable & 0x20000000) == 0) {
96                                 dev_err(&pci_dev->dev,
97                                         "cannot enable LPC\n");
98                                 return -ENODEV;
99                         }
100                 }
101
102                 /* initialize TPM registers */
103                 pci_read_config_dword(pci_dev, PCI_GEN2_DEC, &tmp);
104
105                 if (!is_lpcm)
106                         tmp = (tmp & 0xFFFF0000) | (base & 0xFFF0);
107                 else
108                         tmp =
109                             (tmp & 0xFFFF0000) | (base & 0xFFF0) |
110                             0x00000001;
111
112                 pci_write_config_dword(pci_dev, PCI_GEN2_DEC, tmp);
113
114                 if (is_lpcm) {
115                         pci_read_config_dword(pci_dev, PCI_GEN_PMCON_1,
116                                               &tmp);
117                         tmp |= 0x00000004;      /* enable CLKRUN */
118                         pci_write_config_dword(pci_dev, PCI_GEN_PMCON_1,
119                                                tmp);
120                 }
121                 break;
122         case PCI_VENDOR_ID_AMD:
123                 /* nothing yet */
124                 break;
125         }
126
127         tpm_write_index(TPM_LOCK_REG, TPM_UNLOCK_VALUE);
128         tpm_write_index(TPM_INTERUPT_REG, TPM_DISABLE_INTERUPT_VALUE);
129         tpm_write_index(TPM_BASE_ADDR_LO, base);
130         tpm_write_index(TPM_BASE_ADDR_HI, (base & 0xFF00) >> 8);
131         tpm_write_index(TPM_LOCK_REG, TPM_LOCK_VALUE);
132
133         return 0;
134 }
135
136 EXPORT_SYMBOL_GPL(tpm_lpc_bus_init);
137
138 /*
139  * Internal kernel interface to transmit TPM commands
140  */
141 static ssize_t tpm_transmit(struct tpm_chip *chip, const char *buf,
142                             size_t bufsiz)
143 {
144         ssize_t len;
145         u32 count;
146         __be32 *native_size;
147         unsigned long stop;
148
149         native_size = (__force __be32 *) (buf + 2);
150         count = be32_to_cpu(*native_size);
151
152         if (count == 0)
153                 return -ENODATA;
154         if (count > bufsiz) {
155                 dev_err(&chip->pci_dev->dev,
156                         "invalid count value %x %zx \n", count, bufsiz);
157                 return -E2BIG;
158         }
159
160         down(&chip->tpm_mutex);
161
162         if ((len = chip->vendor->send(chip, (u8 *) buf, count)) < 0) {
163                 dev_err(&chip->pci_dev->dev,
164                         "tpm_transmit: tpm_send: error %zd\n", len);
165                 return len;
166         }
167
168         stop = jiffies + 2 * 60 * HZ;
169         do {
170                 u8 status = inb(chip->vendor->base + 1);
171                 if ((status & chip->vendor->req_complete_mask) ==
172                     chip->vendor->req_complete_val) {
173                         goto out_recv;
174                 }
175                 msleep(TPM_TIMEOUT); /* CHECK */
176                 rmb();
177         } while (time_before(jiffies, stop));
178
179
180         chip->vendor->cancel(chip);
181         dev_err(&chip->pci_dev->dev, "Time expired\n");
182         up(&chip->tpm_mutex);
183         return -EIO;
184
185 out_recv:
186         len = chip->vendor->recv(chip, (u8 *) buf, bufsiz);
187         if (len < 0)
188                 dev_err(&chip->pci_dev->dev,
189                         "tpm_transmit: tpm_recv: error %zd\n", len);
190         up(&chip->tpm_mutex);
191         return len;
192 }
193
194 #define TPM_DIGEST_SIZE 20
195 #define CAP_PCR_RESULT_SIZE 18
196 static const u8 cap_pcr[] = {
197         0, 193,                 /* TPM_TAG_RQU_COMMAND */
198         0, 0, 0, 22,            /* length */
199         0, 0, 0, 101,           /* TPM_ORD_GetCapability */
200         0, 0, 0, 5,
201         0, 0, 0, 4,
202         0, 0, 1, 1
203 };
204
205 #define READ_PCR_RESULT_SIZE 30
206 static const u8 pcrread[] = {
207         0, 193,                 /* TPM_TAG_RQU_COMMAND */
208         0, 0, 0, 14,            /* length */
209         0, 0, 0, 21,            /* TPM_ORD_PcrRead */
210         0, 0, 0, 0              /* PCR index */
211 };
212
213 static ssize_t show_pcrs(struct device *dev, struct device_attribute *attr, char *buf)
214 {
215         u8 data[READ_PCR_RESULT_SIZE];
216         ssize_t len;
217         int i, j, index, num_pcrs;
218         char *str = buf;
219
220         struct tpm_chip *chip =
221             pci_get_drvdata(container_of(dev, struct pci_dev, dev));
222         if (chip == NULL)
223                 return -ENODEV;
224
225         memcpy(data, cap_pcr, sizeof(cap_pcr));
226         if ((len = tpm_transmit(chip, data, sizeof(data)))
227             < CAP_PCR_RESULT_SIZE)
228                 return len;
229
230         num_pcrs = be32_to_cpu(*((__force __be32 *) (data + 14)));
231
232         for (i = 0; i < num_pcrs; i++) {
233                 memcpy(data, pcrread, sizeof(pcrread));
234                 index = cpu_to_be32(i);
235                 memcpy(data + 10, &index, 4);
236                 if ((len = tpm_transmit(chip, data, sizeof(data)))
237                     < READ_PCR_RESULT_SIZE)
238                         return len;
239                 str += sprintf(str, "PCR-%02d: ", i);
240                 for (j = 0; j < TPM_DIGEST_SIZE; j++)
241                         str += sprintf(str, "%02X ", *(data + 10 + j));
242                 str += sprintf(str, "\n");
243         }
244         return str - buf;
245 }
246
247 static DEVICE_ATTR(pcrs, S_IRUGO, show_pcrs, NULL);
248
249 #define  READ_PUBEK_RESULT_SIZE 314
250 static const u8 readpubek[] = {
251         0, 193,                 /* TPM_TAG_RQU_COMMAND */
252         0, 0, 0, 30,            /* length */
253         0, 0, 0, 124,           /* TPM_ORD_ReadPubek */
254 };
255
256 static ssize_t show_pubek(struct device *dev, struct device_attribute *attr, char *buf)
257 {
258         u8 data[READ_PUBEK_RESULT_SIZE];
259         ssize_t len;
260         __be32 *native_val;
261         int i;
262         char *str = buf;
263
264         struct tpm_chip *chip =
265             pci_get_drvdata(container_of(dev, struct pci_dev, dev));
266         if (chip == NULL)
267                 return -ENODEV;
268
269         memcpy(data, readpubek, sizeof(readpubek));
270         memset(data + sizeof(readpubek), 0, 20);        /* zero nonce */
271
272         if ((len = tpm_transmit(chip, data, sizeof(data))) <
273             READ_PUBEK_RESULT_SIZE)
274                 return len;
275
276         /* 
277            ignore header 10 bytes
278            algorithm 32 bits (1 == RSA )
279            encscheme 16 bits
280            sigscheme 16 bits
281            parameters (RSA 12->bytes: keybit, #primes, expbit)  
282            keylenbytes 32 bits
283            256 byte modulus
284            ignore checksum 20 bytes
285          */
286
287         native_val = (__force __be32 *) (data + 34);
288
289         str +=
290             sprintf(str,
291                     "Algorithm: %02X %02X %02X %02X\nEncscheme: %02X %02X\n"
292                     "Sigscheme: %02X %02X\nParameters: %02X %02X %02X %02X"
293                     " %02X %02X %02X %02X %02X %02X %02X %02X\n"
294                     "Modulus length: %d\nModulus: \n",
295                     data[10], data[11], data[12], data[13], data[14],
296                     data[15], data[16], data[17], data[22], data[23],
297                     data[24], data[25], data[26], data[27], data[28],
298                     data[29], data[30], data[31], data[32], data[33],
299                     be32_to_cpu(*native_val)
300             );
301
302         for (i = 0; i < 256; i++) {
303                 str += sprintf(str, "%02X ", data[i + 39]);
304                 if ((i + 1) % 16 == 0)
305                         str += sprintf(str, "\n");
306         }
307         return str - buf;
308 }
309
310 static DEVICE_ATTR(pubek, S_IRUGO, show_pubek, NULL);
311
312 #define CAP_VER_RESULT_SIZE 18
313 static const u8 cap_version[] = {
314         0, 193,                 /* TPM_TAG_RQU_COMMAND */
315         0, 0, 0, 18,            /* length */
316         0, 0, 0, 101,           /* TPM_ORD_GetCapability */
317         0, 0, 0, 6,
318         0, 0, 0, 0
319 };
320
321 #define CAP_MANUFACTURER_RESULT_SIZE 18
322 static const u8 cap_manufacturer[] = {
323         0, 193,                 /* TPM_TAG_RQU_COMMAND */
324         0, 0, 0, 22,            /* length */
325         0, 0, 0, 101,           /* TPM_ORD_GetCapability */
326         0, 0, 0, 5,
327         0, 0, 0, 4,
328         0, 0, 1, 3
329 };
330
331 static ssize_t show_caps(struct device *dev, struct device_attribute *attr, char *buf)
332 {
333         u8 data[READ_PUBEK_RESULT_SIZE];
334         ssize_t len;
335         char *str = buf;
336
337         struct tpm_chip *chip =
338             pci_get_drvdata(container_of(dev, struct pci_dev, dev));
339         if (chip == NULL)
340                 return -ENODEV;
341
342         memcpy(data, cap_manufacturer, sizeof(cap_manufacturer));
343
344         if ((len = tpm_transmit(chip, data, sizeof(data))) <
345             CAP_MANUFACTURER_RESULT_SIZE)
346                 return len;
347
348         str += sprintf(str, "Manufacturer: 0x%x\n",
349                        be32_to_cpu(*(data + 14)));
350
351         memcpy(data, cap_version, sizeof(cap_version));
352
353         if ((len = tpm_transmit(chip, data, sizeof(data))) <
354             CAP_VER_RESULT_SIZE)
355                 return len;
356
357         str +=
358             sprintf(str, "TCG version: %d.%d\nFirmware version: %d.%d\n",
359                     (int) data[14], (int) data[15], (int) data[16],
360                     (int) data[17]);
361
362         return str - buf;
363 }
364
365 static DEVICE_ATTR(caps, S_IRUGO, show_caps, NULL);
366
367 /*
368  * Device file system interface to the TPM
369  */
370 int tpm_open(struct inode *inode, struct file *file)
371 {
372         int rc = 0, minor = iminor(inode);
373         struct tpm_chip *chip = NULL, *pos;
374
375         spin_lock(&driver_lock);
376
377         list_for_each_entry(pos, &tpm_chip_list, list) {
378                 if (pos->vendor->miscdev.minor == minor) {
379                         chip = pos;
380                         break;
381                 }
382         }
383
384         if (chip == NULL) {
385                 rc = -ENODEV;
386                 goto err_out;
387         }
388
389         if (chip->num_opens) {
390                 dev_dbg(&chip->pci_dev->dev,
391                         "Another process owns this TPM\n");
392                 rc = -EBUSY;
393                 goto err_out;
394         }
395
396         chip->num_opens++;
397         pci_dev_get(chip->pci_dev);
398
399         spin_unlock(&driver_lock);
400
401         chip->data_buffer = kmalloc(TPM_BUFSIZE * sizeof(u8), GFP_KERNEL);
402         if (chip->data_buffer == NULL) {
403                 chip->num_opens--;
404                 pci_dev_put(chip->pci_dev);
405                 return -ENOMEM;
406         }
407
408         atomic_set(&chip->data_pending, 0);
409
410         file->private_data = chip;
411         return 0;
412
413 err_out:
414         spin_unlock(&driver_lock);
415         return rc;
416 }
417
418 EXPORT_SYMBOL_GPL(tpm_open);
419
420 int tpm_release(struct inode *inode, struct file *file)
421 {
422         struct tpm_chip *chip = file->private_data;
423         
424         file->private_data = NULL;
425
426         spin_lock(&driver_lock);
427         chip->num_opens--;
428         spin_unlock(&driver_lock);
429
430         down(&chip->timer_manipulation_mutex);
431         if (timer_pending(&chip->user_read_timer))
432                 del_singleshot_timer_sync(&chip->user_read_timer);
433         else if (timer_pending(&chip->device_timer))
434                 del_singleshot_timer_sync(&chip->device_timer);
435         up(&chip->timer_manipulation_mutex);
436
437         kfree(chip->data_buffer);
438         atomic_set(&chip->data_pending, 0);
439
440         pci_dev_put(chip->pci_dev);
441         return 0;
442 }
443
444 EXPORT_SYMBOL_GPL(tpm_release);
445
446 ssize_t tpm_write(struct file * file, const char __user * buf,
447                   size_t size, loff_t * off)
448 {
449         struct tpm_chip *chip = file->private_data;
450         int in_size = size, out_size;
451
452         /* cannot perform a write until the read has cleared
453            either via tpm_read or a user_read_timer timeout */
454         while (atomic_read(&chip->data_pending) != 0)
455                 msleep(TPM_TIMEOUT);
456
457         down(&chip->buffer_mutex);
458
459         if (in_size > TPM_BUFSIZE)
460                 in_size = TPM_BUFSIZE;
461
462         if (copy_from_user
463             (chip->data_buffer, (void __user *) buf, in_size)) {
464                 up(&chip->buffer_mutex);
465                 return -EFAULT;
466         }
467
468         /* atomic tpm command send and result receive */
469         out_size = tpm_transmit(chip, chip->data_buffer, TPM_BUFSIZE);
470
471         atomic_set(&chip->data_pending, out_size);
472         up(&chip->buffer_mutex);
473
474         /* Set a timeout by which the reader must come claim the result */
475         down(&chip->timer_manipulation_mutex);
476         init_timer(&chip->user_read_timer);
477         chip->user_read_timer.function = user_reader_timeout;
478         chip->user_read_timer.data = (unsigned long) chip;
479         chip->user_read_timer.expires = jiffies + (60 * HZ);
480         add_timer(&chip->user_read_timer);
481         up(&chip->timer_manipulation_mutex);
482
483         return in_size;
484 }
485
486 EXPORT_SYMBOL_GPL(tpm_write);
487
488 ssize_t tpm_read(struct file * file, char __user * buf,
489                  size_t size, loff_t * off)
490 {
491         struct tpm_chip *chip = file->private_data;
492         int ret_size = -ENODATA;
493
494         if (atomic_read(&chip->data_pending) != 0) {    /* Result available */
495                 down(&chip->timer_manipulation_mutex);
496                 del_singleshot_timer_sync(&chip->user_read_timer);
497                 up(&chip->timer_manipulation_mutex);
498
499                 down(&chip->buffer_mutex);
500
501                 ret_size = atomic_read(&chip->data_pending);
502                 atomic_set(&chip->data_pending, 0);
503
504                 if (ret_size == 0)      /* timeout just occurred */
505                         ret_size = -ETIME;
506                 else if (ret_size > 0) {        /* relay data */
507                         if (size < ret_size)
508                                 ret_size = size;
509
510                         if (copy_to_user((void __user *) buf,
511                                          chip->data_buffer, ret_size)) {
512                                 ret_size = -EFAULT;
513                         }
514                 }
515                 up(&chip->buffer_mutex);
516         }
517
518         return ret_size;
519 }
520
521 EXPORT_SYMBOL_GPL(tpm_read);
522
523 void __devexit tpm_remove(struct pci_dev *pci_dev)
524 {
525         struct tpm_chip *chip = pci_get_drvdata(pci_dev);
526
527         if (chip == NULL) {
528                 dev_err(&pci_dev->dev, "No device data found\n");
529                 return;
530         }
531
532         spin_lock(&driver_lock);
533
534         list_del(&chip->list);
535
536         spin_unlock(&driver_lock);
537
538         pci_set_drvdata(pci_dev, NULL);
539         misc_deregister(&chip->vendor->miscdev);
540
541         device_remove_file(&pci_dev->dev, &dev_attr_pubek);
542         device_remove_file(&pci_dev->dev, &dev_attr_pcrs);
543         device_remove_file(&pci_dev->dev, &dev_attr_caps);
544
545         pci_disable_device(pci_dev);
546
547         dev_mask[chip->dev_num / TPM_NUM_MASK_ENTRIES ] &= !(1 << (chip->dev_num % TPM_NUM_MASK_ENTRIES));
548
549         kfree(chip);
550
551         pci_dev_put(pci_dev);
552 }
553
554 EXPORT_SYMBOL_GPL(tpm_remove);
555
556 static u8 savestate[] = {
557         0, 193,                 /* TPM_TAG_RQU_COMMAND */
558         0, 0, 0, 10,            /* blob length (in bytes) */
559         0, 0, 0, 152            /* TPM_ORD_SaveState */
560 };
561
562 /*
563  * We are about to suspend. Save the TPM state
564  * so that it can be restored.
565  */
566 int tpm_pm_suspend(struct pci_dev *pci_dev, pm_message_t pm_state)
567 {
568         struct tpm_chip *chip = pci_get_drvdata(pci_dev);
569         if (chip == NULL)
570                 return -ENODEV;
571
572         tpm_transmit(chip, savestate, sizeof(savestate));
573         return 0;
574 }
575
576 EXPORT_SYMBOL_GPL(tpm_pm_suspend);
577
578 /*
579  * Resume from a power safe. The BIOS already restored
580  * the TPM state.
581  */
582 int tpm_pm_resume(struct pci_dev *pci_dev)
583 {
584         struct tpm_chip *chip = pci_get_drvdata(pci_dev);
585
586         if (chip == NULL)
587                 return -ENODEV;
588
589         spin_lock(&driver_lock);
590         tpm_lpc_bus_init(pci_dev, chip->vendor->base);
591         spin_unlock(&driver_lock);
592
593         return 0;
594 }
595
596 EXPORT_SYMBOL_GPL(tpm_pm_resume);
597
598 /*
599  * Called from tpm_<specific>.c probe function only for devices 
600  * the driver has determined it should claim.  Prior to calling
601  * this function the specific probe function has called pci_enable_device
602  * upon errant exit from this function specific probe function should call
603  * pci_disable_device
604  */
605 int tpm_register_hardware(struct pci_dev *pci_dev,
606                           struct tpm_vendor_specific *entry)
607 {
608         char devname[7];
609         struct tpm_chip *chip;
610         int i, j;
611
612         /* Driver specific per-device data */
613         chip = kmalloc(sizeof(*chip), GFP_KERNEL);
614         if (chip == NULL)
615                 return -ENOMEM;
616
617         memset(chip, 0, sizeof(struct tpm_chip));
618
619         init_MUTEX(&chip->buffer_mutex);
620         init_MUTEX(&chip->tpm_mutex);
621         init_MUTEX(&chip->timer_manipulation_mutex);
622         INIT_LIST_HEAD(&chip->list);
623
624         chip->vendor = entry;
625
626         chip->dev_num = -1;
627
628         for (i = 0; i < TPM_NUM_MASK_ENTRIES; i++)
629                 for (j = 0; j < 8 * sizeof(int); j++)
630                         if ((dev_mask[i] & (1 << j)) == 0) {
631                                 chip->dev_num =
632                                     i * TPM_NUM_MASK_ENTRIES + j;
633                                 dev_mask[i] |= 1 << j;
634                                 goto dev_num_search_complete;
635                         }
636
637 dev_num_search_complete:
638         if (chip->dev_num < 0) {
639                 dev_err(&pci_dev->dev,
640                         "No available tpm device numbers\n");
641                 kfree(chip);
642                 return -ENODEV;
643         } else if (chip->dev_num == 0)
644                 chip->vendor->miscdev.minor = TPM_MINOR;
645         else
646                 chip->vendor->miscdev.minor = MISC_DYNAMIC_MINOR;
647
648         snprintf(devname, sizeof(devname), "%s%d", "tpm", chip->dev_num);
649         chip->vendor->miscdev.name = devname;
650
651         chip->vendor->miscdev.dev = &(pci_dev->dev);
652         chip->pci_dev = pci_dev_get(pci_dev);
653
654         if (misc_register(&chip->vendor->miscdev)) {
655                 dev_err(&chip->pci_dev->dev,
656                         "unable to misc_register %s, minor %d\n",
657                         chip->vendor->miscdev.name,
658                         chip->vendor->miscdev.minor);
659                 pci_dev_put(pci_dev);
660                 kfree(chip);
661                 dev_mask[i] &= !(1 << j);
662                 return -ENODEV;
663         }
664
665         pci_set_drvdata(pci_dev, chip);
666
667         list_add(&chip->list, &tpm_chip_list);
668
669         device_create_file(&pci_dev->dev, &dev_attr_pubek);
670         device_create_file(&pci_dev->dev, &dev_attr_pcrs);
671         device_create_file(&pci_dev->dev, &dev_attr_caps);
672
673         return 0;
674 }
675
676 EXPORT_SYMBOL_GPL(tpm_register_hardware);
677
678 static int __init init_tpm(void)
679 {
680         return 0;
681 }
682
683 static void __exit cleanup_tpm(void)
684 {
685
686 }
687
688 module_init(init_tpm);
689 module_exit(cleanup_tpm);
690
691 MODULE_AUTHOR("Leendert van Doorn (leendert@watson.ibm.com)");
692 MODULE_DESCRIPTION("TPM Driver");
693 MODULE_VERSION("2.0");
694 MODULE_LICENSE("GPL");