Author | Tokens | Token Proportion | Commits | Commit Proportion |
---|---|---|---|---|
Jason Gunthorpe | 717 | 34.59% | 6 | 14.63% |
Jarkko Sakkinen | 371 | 17.90% | 11 | 26.83% |
James Bottomley | 334 | 16.11% | 1 | 2.44% |
Kylene Jo Hall | 283 | 13.65% | 5 | 12.20% |
Rajiv Andrade | 79 | 3.81% | 2 | 4.88% |
Stefan Berger | 71 | 3.42% | 3 | 7.32% |
Gerard Snitselaar | 64 | 3.09% | 1 | 2.44% |
Yani Ioannou | 60 | 2.89% | 1 | 2.44% |
Daniel De Graaf | 53 | 2.56% | 1 | 2.44% |
Andy Shevchenko | 8 | 0.39% | 1 | 2.44% |
Marcin Obara | 8 | 0.39% | 1 | 2.44% |
axelj | 8 | 0.39% | 1 | 2.44% |
Tomas Winkler | 8 | 0.39% | 3 | 7.32% |
Mimi Zohar | 5 | 0.24% | 1 | 2.44% |
Thomas Gleixner | 2 | 0.10% | 1 | 2.44% |
Fengguang Wu | 1 | 0.05% | 1 | 2.44% |
Roberto Sassu | 1 | 0.05% | 1 | 2.44% |
Total | 2073 | 41 |
// SPDX-License-Identifier: GPL-2.0-only /* * Copyright (C) 2004 IBM Corporation * Authors: * Leendert van Doorn <leendert@watson.ibm.com> * Dave Safford <safford@watson.ibm.com> * Reiner Sailer <sailer@watson.ibm.com> * Kylene Hall <kjhall@us.ibm.com> * * Copyright (C) 2013 Obsidian Research Corp * Jason Gunthorpe <jgunthorpe@obsidianresearch.com> * * sysfs filesystem inspection interface to the TPM */ #include <linux/device.h> #include "tpm.h" struct tpm_readpubek_out { u8 algorithm[4]; u8 encscheme[2]; u8 sigscheme[2]; __be32 paramsize; u8 parameters[12]; __be32 keysize; u8 modulus[256]; u8 checksum[20]; } __packed; #define READ_PUBEK_RESULT_MIN_BODY_SIZE (28 + 256) #define TPM_ORD_READPUBEK 124 static ssize_t pubek_show(struct device *dev, struct device_attribute *attr, char *buf) { struct tpm_buf tpm_buf; struct tpm_readpubek_out *out; int i; char *str = buf; struct tpm_chip *chip = to_tpm_chip(dev); char anti_replay[20]; memset(&anti_replay, 0, sizeof(anti_replay)); if (tpm_try_get_ops(chip)) return 0; if (tpm_buf_init(&tpm_buf, TPM_TAG_RQU_COMMAND, TPM_ORD_READPUBEK)) goto out_ops; tpm_buf_append(&tpm_buf, anti_replay, sizeof(anti_replay)); if (tpm_transmit_cmd(chip, &tpm_buf, READ_PUBEK_RESULT_MIN_BODY_SIZE, "attempting to read the PUBEK")) goto out_buf; out = (struct tpm_readpubek_out *)&tpm_buf.data[10]; str += sprintf(str, "Algorithm: %4ph\n" "Encscheme: %2ph\n" "Sigscheme: %2ph\n" "Parameters: %12ph\n" "Modulus length: %d\n" "Modulus:\n", out->algorithm, out->encscheme, out->sigscheme, out->parameters, be32_to_cpu(out->keysize)); for (i = 0; i < 256; i += 16) str += sprintf(str, "%16ph\n", &out->modulus[i]); out_buf: tpm_buf_destroy(&tpm_buf); out_ops: tpm_put_ops(chip); return str - buf; } static DEVICE_ATTR_RO(pubek); static ssize_t pcrs_show(struct device *dev, struct device_attribute *attr, char *buf) { cap_t cap; u8 digest[TPM_DIGEST_SIZE]; u32 i, j, num_pcrs; char *str = buf; struct tpm_chip *chip = to_tpm_chip(dev); if (tpm_try_get_ops(chip)) return 0; if (tpm1_getcap(chip, TPM_CAP_PROP_PCR, &cap, "attempting to determine the number of PCRS", sizeof(cap.num_pcrs))) { tpm_put_ops(chip); return 0; } num_pcrs = be32_to_cpu(cap.num_pcrs); for (i = 0; i < num_pcrs; i++) { if (tpm1_pcr_read(chip, i, digest)) { str = buf; break; } str += sprintf(str, "PCR-%02d: ", i); for (j = 0; j < TPM_DIGEST_SIZE; j++) str += sprintf(str, "%02X ", digest[j]); str += sprintf(str, "\n"); } tpm_put_ops(chip); return str - buf; } static DEVICE_ATTR_RO(pcrs); static ssize_t enabled_show(struct device *dev, struct device_attribute *attr, char *buf) { struct tpm_chip *chip = to_tpm_chip(dev); ssize_t rc = 0; cap_t cap; if (tpm_try_get_ops(chip)) return 0; if (tpm1_getcap(chip, TPM_CAP_FLAG_PERM, &cap, "attempting to determine the permanent enabled state", sizeof(cap.perm_flags))) goto out_ops; rc = sprintf(buf, "%d\n", !cap.perm_flags.disable); out_ops: tpm_put_ops(chip); return rc; } static DEVICE_ATTR_RO(enabled); static ssize_t active_show(struct device *dev, struct device_attribute *attr, char *buf) { struct tpm_chip *chip = to_tpm_chip(dev); ssize_t rc = 0; cap_t cap; if (tpm_try_get_ops(chip)) return 0; if (tpm1_getcap(chip, TPM_CAP_FLAG_PERM, &cap, "attempting to determine the permanent active state", sizeof(cap.perm_flags))) goto out_ops; rc = sprintf(buf, "%d\n", !cap.perm_flags.deactivated); out_ops: tpm_put_ops(chip); return rc; } static DEVICE_ATTR_RO(active); static ssize_t owned_show(struct device *dev, struct device_attribute *attr, char *buf) { struct tpm_chip *chip = to_tpm_chip(dev); ssize_t rc = 0; cap_t cap; if (tpm_try_get_ops(chip)) return 0; if (tpm1_getcap(to_tpm_chip(dev), TPM_CAP_PROP_OWNER, &cap, "attempting to determine the owner state", sizeof(cap.owned))) goto out_ops; rc = sprintf(buf, "%d\n", cap.owned); out_ops: tpm_put_ops(chip); return rc; } static DEVICE_ATTR_RO(owned); static ssize_t temp_deactivated_show(struct device *dev, struct device_attribute *attr, char *buf) { struct tpm_chip *chip = to_tpm_chip(dev); ssize_t rc = 0; cap_t cap; if (tpm_try_get_ops(chip)) return 0; if (tpm1_getcap(to_tpm_chip(dev), TPM_CAP_FLAG_VOL, &cap, "attempting to determine the temporary state", sizeof(cap.stclear_flags))) goto out_ops; rc = sprintf(buf, "%d\n", cap.stclear_flags.deactivated); out_ops: tpm_put_ops(chip); return rc; } static DEVICE_ATTR_RO(temp_deactivated); static ssize_t caps_show(struct device *dev, struct device_attribute *attr, char *buf) { struct tpm_chip *chip = to_tpm_chip(dev); struct tpm1_version *version; ssize_t rc = 0; char *str = buf; cap_t cap; if (tpm_try_get_ops(chip)) return 0; if (tpm1_getcap(chip, TPM_CAP_PROP_MANUFACTURER, &cap, "attempting to determine the manufacturer", sizeof(cap.manufacturer_id))) goto out_ops; str += sprintf(str, "Manufacturer: 0x%x\n", be32_to_cpu(cap.manufacturer_id)); /* TPM 1.2 */ if (!tpm1_getcap(chip, TPM_CAP_VERSION_1_2, &cap, "attempting to determine the 1.2 version", sizeof(cap.version2))) { version = &cap.version2.version; goto out_print; } /* TPM 1.1 */ if (tpm1_getcap(chip, TPM_CAP_VERSION_1_1, &cap, "attempting to determine the 1.1 version", sizeof(cap.version1))) { goto out_ops; } version = &cap.version1; out_print: str += sprintf(str, "TCG version: %d.%d\nFirmware version: %d.%d\n", version->major, version->minor, version->rev_major, version->rev_minor); rc = str - buf; out_ops: tpm_put_ops(chip); return rc; } static DEVICE_ATTR_RO(caps); static ssize_t cancel_store(struct device *dev, struct device_attribute *attr, const char *buf, size_t count) { struct tpm_chip *chip = to_tpm_chip(dev); if (tpm_try_get_ops(chip)) return 0; chip->ops->cancel(chip); tpm_put_ops(chip); return count; } static DEVICE_ATTR_WO(cancel); static ssize_t durations_show(struct device *dev, struct device_attribute *attr, char *buf) { struct tpm_chip *chip = to_tpm_chip(dev); if (chip->duration[TPM_LONG] == 0) return 0; return sprintf(buf, "%d %d %d [%s]\n", jiffies_to_usecs(chip->duration[TPM_SHORT]), jiffies_to_usecs(chip->duration[TPM_MEDIUM]), jiffies_to_usecs(chip->duration[TPM_LONG]), chip->duration_adjusted ? "adjusted" : "original"); } static DEVICE_ATTR_RO(durations); static ssize_t timeouts_show(struct device *dev, struct device_attribute *attr, char *buf) { struct tpm_chip *chip = to_tpm_chip(dev); return sprintf(buf, "%d %d %d %d [%s]\n", jiffies_to_usecs(chip->timeout_a), jiffies_to_usecs(chip->timeout_b), jiffies_to_usecs(chip->timeout_c), jiffies_to_usecs(chip->timeout_d), chip->timeout_adjusted ? "adjusted" : "original"); } static DEVICE_ATTR_RO(timeouts); static ssize_t tpm_version_major_show(struct device *dev, struct device_attribute *attr, char *buf) { struct tpm_chip *chip = to_tpm_chip(dev); return sprintf(buf, "%s\n", chip->flags & TPM_CHIP_FLAG_TPM2 ? "2" : "1"); } static DEVICE_ATTR_RO(tpm_version_major); static struct attribute *tpm1_dev_attrs[] = { &dev_attr_pubek.attr, &dev_attr_pcrs.attr, &dev_attr_enabled.attr, &dev_attr_active.attr, &dev_attr_owned.attr, &dev_attr_temp_deactivated.attr, &dev_attr_caps.attr, &dev_attr_cancel.attr, &dev_attr_durations.attr, &dev_attr_timeouts.attr, &dev_attr_tpm_version_major.attr, NULL, }; static struct attribute *tpm2_dev_attrs[] = { &dev_attr_tpm_version_major.attr, NULL }; static const struct attribute_group tpm1_dev_group = { .attrs = tpm1_dev_attrs, }; static const struct attribute_group tpm2_dev_group = { .attrs = tpm2_dev_attrs, }; struct tpm_pcr_attr { int alg_id; int pcr; struct device_attribute attr; }; #define to_tpm_pcr_attr(a) container_of(a, struct tpm_pcr_attr, attr) static ssize_t pcr_value_show(struct device *dev, struct device_attribute *attr, char *buf) { struct tpm_pcr_attr *ha = to_tpm_pcr_attr(attr); struct tpm_chip *chip = to_tpm_chip(dev); struct tpm_digest digest; int i; int digest_size = 0; int rc; char *str = buf; for (i = 0; i < chip->nr_allocated_banks; i++) if (ha->alg_id == chip->allocated_banks[i].alg_id) digest_size = chip->allocated_banks[i].digest_size; /* should never happen */ if (!digest_size) return -EINVAL; digest.alg_id = ha->alg_id; rc = tpm_pcr_read(chip, ha->pcr, &digest); if (rc) return rc; for (i = 0; i < digest_size; i++) str += sprintf(str, "%02X", digest.digest[i]); str += sprintf(str, "\n"); return str - buf; } /* * The following set of defines represents all the magic to build * the per hash attribute groups for displaying each bank of PCRs. * The only slight problem with this approach is that every PCR is * hard coded to be present, so you don't know if an PCR is missing * until a cat of the file returns -EINVAL * * Also note you must ignore checkpatch warnings in this macro * code. This is deep macro magic that checkpatch.pl doesn't * understand. */ /* Note, this must match TPM2_PLATFORM_PCR which is fixed at 24. */ #define _TPM_HELPER(_alg, _hash, F) \ F(_alg, _hash, 0) \ F(_alg, _hash, 1) \ F(_alg, _hash, 2) \ F(_alg, _hash, 3) \ F(_alg, _hash, 4) \ F(_alg, _hash, 5) \ F(_alg, _hash, 6) \ F(_alg, _hash, 7) \ F(_alg, _hash, 8) \ F(_alg, _hash, 9) \ F(_alg, _hash, 10) \ F(_alg, _hash, 11) \ F(_alg, _hash, 12) \ F(_alg, _hash, 13) \ F(_alg, _hash, 14) \ F(_alg, _hash, 15) \ F(_alg, _hash, 16) \ F(_alg, _hash, 17) \ F(_alg, _hash, 18) \ F(_alg, _hash, 19) \ F(_alg, _hash, 20) \ F(_alg, _hash, 21) \ F(_alg, _hash, 22) \ F(_alg, _hash, 23) /* ignore checkpatch warning about trailing ; in macro. */ #define PCR_ATTR(_alg, _hash, _pcr) \ static struct tpm_pcr_attr dev_attr_pcr_##_hash##_##_pcr = { \ .alg_id = _alg, \ .pcr = _pcr, \ .attr = { \ .attr = { \ .name = __stringify(_pcr), \ .mode = 0444 \ }, \ .show = pcr_value_show \ } \ }; #define PCR_ATTRS(_alg, _hash) \ _TPM_HELPER(_alg, _hash, PCR_ATTR) /* ignore checkpatch warning about trailing , in macro. */ #define PCR_ATTR_VAL(_alg, _hash, _pcr) \ &dev_attr_pcr_##_hash##_##_pcr.attr.attr, #define PCR_ATTR_GROUP_ARRAY(_alg, _hash) \ static struct attribute *pcr_group_attrs_##_hash[] = { \ _TPM_HELPER(_alg, _hash, PCR_ATTR_VAL) \ NULL \ } #define PCR_ATTR_GROUP(_alg, _hash) \ static struct attribute_group pcr_group_##_hash = { \ .name = "pcr-" __stringify(_hash), \ .attrs = pcr_group_attrs_##_hash \ } #define PCR_ATTR_BUILD(_alg, _hash) \ PCR_ATTRS(_alg, _hash) \ PCR_ATTR_GROUP_ARRAY(_alg, _hash); \ PCR_ATTR_GROUP(_alg, _hash) /* * End of macro structure to build an attribute group containing 24 * PCR value files for each supported hash algorithm */ /* * The next set of macros implements the cleverness for each hash to * build a static attribute group called pcr_group_<hash> which can be * added to chip->groups[]. * * The first argument is the TPM algorithm id and the second is the * hash used as both the suffix and the group name. Note: the group * name is a directory in the top level tpm class with the name * pcr-<hash>, so it must not clash with any other names already * in the sysfs directory. */ PCR_ATTR_BUILD(TPM_ALG_SHA1, sha1); PCR_ATTR_BUILD(TPM_ALG_SHA256, sha256); PCR_ATTR_BUILD(TPM_ALG_SHA384, sha384); PCR_ATTR_BUILD(TPM_ALG_SHA512, sha512); PCR_ATTR_BUILD(TPM_ALG_SM3_256, sm3); void tpm_sysfs_add_device(struct tpm_chip *chip) { int i; WARN_ON(chip->groups_cnt != 0); if (tpm_is_firmware_upgrade(chip)) return; if (chip->flags & TPM_CHIP_FLAG_TPM2) chip->groups[chip->groups_cnt++] = &tpm2_dev_group; else chip->groups[chip->groups_cnt++] = &tpm1_dev_group; /* add one group for each bank hash */ for (i = 0; i < chip->nr_allocated_banks; i++) { switch (chip->allocated_banks[i].alg_id) { case TPM_ALG_SHA1: chip->groups[chip->groups_cnt++] = &pcr_group_sha1; break; case TPM_ALG_SHA256: chip->groups[chip->groups_cnt++] = &pcr_group_sha256; break; case TPM_ALG_SHA384: chip->groups[chip->groups_cnt++] = &pcr_group_sha384; break; case TPM_ALG_SHA512: chip->groups[chip->groups_cnt++] = &pcr_group_sha512; break; case TPM_ALG_SM3_256: chip->groups[chip->groups_cnt++] = &pcr_group_sm3; break; default: /* * If triggers, send a patch to add both a * PCR_ATTR_BUILD() macro above for the * missing algorithm as well as an additional * case in this switch statement. */ dev_err(&chip->dev, "TPM with unsupported bank algorithm 0x%04x", chip->allocated_banks[i].alg_id); break; } } /* * This will only trigger if someone has added an additional * hash to the tpm_algorithms enum without incrementing * TPM_MAX_HASHES. */ WARN_ON(chip->groups_cnt > TPM_MAX_HASHES + 1); }
Information contained on this website is for historical information purposes only and does not indicate or represent copyright ownership.
Created with Cregit http://github.com/cregit/cregit
Version 2.0-RC1