tpm-sysfs.c 7.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318
  1. /*
  2. * Copyright (C) 2004 IBM Corporation
  3. * Authors:
  4. * Leendert van Doorn <leendert@watson.ibm.com>
  5. * Dave Safford <safford@watson.ibm.com>
  6. * Reiner Sailer <sailer@watson.ibm.com>
  7. * Kylene Hall <kjhall@us.ibm.com>
  8. *
  9. * Copyright (C) 2013 Obsidian Research Corp
  10. * Jason Gunthorpe <jgunthorpe@obsidianresearch.com>
  11. *
  12. * sysfs filesystem inspection interface to the TPM
  13. *
  14. * This program is free software; you can redistribute it and/or
  15. * modify it under the terms of the GNU General Public License as
  16. * published by the Free Software Foundation, version 2 of the
  17. * License.
  18. *
  19. */
  20. #include <linux/device.h>
  21. #include "tpm.h"
  22. /* XXX for now this helper is duplicated in tpm-interface.c */
  23. static ssize_t transmit_cmd(struct tpm_chip *chip, struct tpm_cmd_t *cmd,
  24. int len, const char *desc)
  25. {
  26. int err;
  27. len = tpm_transmit(chip, (u8 *) cmd, len);
  28. if (len < 0)
  29. return len;
  30. else if (len < TPM_HEADER_SIZE)
  31. return -EFAULT;
  32. err = be32_to_cpu(cmd->header.out.return_code);
  33. if (err != 0 && desc)
  34. dev_err(chip->dev, "A TPM error (%d) occurred %s\n", err, desc);
  35. return err;
  36. }
  37. #define READ_PUBEK_RESULT_SIZE 314
  38. #define TPM_ORD_READPUBEK cpu_to_be32(124)
  39. static struct tpm_input_header tpm_readpubek_header = {
  40. .tag = TPM_TAG_RQU_COMMAND,
  41. .length = cpu_to_be32(30),
  42. .ordinal = TPM_ORD_READPUBEK
  43. };
  44. static ssize_t pubek_show(struct device *dev, struct device_attribute *attr,
  45. char *buf)
  46. {
  47. u8 *data;
  48. struct tpm_cmd_t tpm_cmd;
  49. ssize_t err;
  50. int i, rc;
  51. char *str = buf;
  52. struct tpm_chip *chip = dev_get_drvdata(dev);
  53. tpm_cmd.header.in = tpm_readpubek_header;
  54. err = transmit_cmd(chip, &tpm_cmd, READ_PUBEK_RESULT_SIZE,
  55. "attempting to read the PUBEK");
  56. if (err)
  57. goto out;
  58. /*
  59. ignore header 10 bytes
  60. algorithm 32 bits (1 == RSA )
  61. encscheme 16 bits
  62. sigscheme 16 bits
  63. parameters (RSA 12->bytes: keybit, #primes, expbit)
  64. keylenbytes 32 bits
  65. 256 byte modulus
  66. ignore checksum 20 bytes
  67. */
  68. data = tpm_cmd.params.readpubek_out_buffer;
  69. str +=
  70. sprintf(str,
  71. "Algorithm: %02X %02X %02X %02X\n"
  72. "Encscheme: %02X %02X\n"
  73. "Sigscheme: %02X %02X\n"
  74. "Parameters: %02X %02X %02X %02X "
  75. "%02X %02X %02X %02X "
  76. "%02X %02X %02X %02X\n"
  77. "Modulus length: %d\n"
  78. "Modulus:\n",
  79. data[0], data[1], data[2], data[3],
  80. data[4], data[5],
  81. data[6], data[7],
  82. data[12], data[13], data[14], data[15],
  83. data[16], data[17], data[18], data[19],
  84. data[20], data[21], data[22], data[23],
  85. be32_to_cpu(*((__be32 *) (data + 24))));
  86. for (i = 0; i < 256; i++) {
  87. str += sprintf(str, "%02X ", data[i + 28]);
  88. if ((i + 1) % 16 == 0)
  89. str += sprintf(str, "\n");
  90. }
  91. out:
  92. rc = str - buf;
  93. return rc;
  94. }
  95. static DEVICE_ATTR_RO(pubek);
  96. static ssize_t pcrs_show(struct device *dev, struct device_attribute *attr,
  97. char *buf)
  98. {
  99. cap_t cap;
  100. u8 digest[TPM_DIGEST_SIZE];
  101. ssize_t rc;
  102. int i, j, num_pcrs;
  103. char *str = buf;
  104. struct tpm_chip *chip = dev_get_drvdata(dev);
  105. rc = tpm_getcap(dev, TPM_CAP_PROP_PCR, &cap,
  106. "attempting to determine the number of PCRS");
  107. if (rc)
  108. return 0;
  109. num_pcrs = be32_to_cpu(cap.num_pcrs);
  110. for (i = 0; i < num_pcrs; i++) {
  111. rc = tpm_pcr_read_dev(chip, i, digest);
  112. if (rc)
  113. break;
  114. str += sprintf(str, "PCR-%02d: ", i);
  115. for (j = 0; j < TPM_DIGEST_SIZE; j++)
  116. str += sprintf(str, "%02X ", digest[j]);
  117. str += sprintf(str, "\n");
  118. }
  119. return str - buf;
  120. }
  121. static DEVICE_ATTR_RO(pcrs);
  122. static ssize_t enabled_show(struct device *dev, struct device_attribute *attr,
  123. char *buf)
  124. {
  125. cap_t cap;
  126. ssize_t rc;
  127. rc = tpm_getcap(dev, TPM_CAP_FLAG_PERM, &cap,
  128. "attempting to determine the permanent enabled state");
  129. if (rc)
  130. return 0;
  131. rc = sprintf(buf, "%d\n", !cap.perm_flags.disable);
  132. return rc;
  133. }
  134. static DEVICE_ATTR_RO(enabled);
  135. static ssize_t active_show(struct device *dev, struct device_attribute *attr,
  136. char *buf)
  137. {
  138. cap_t cap;
  139. ssize_t rc;
  140. rc = tpm_getcap(dev, TPM_CAP_FLAG_PERM, &cap,
  141. "attempting to determine the permanent active state");
  142. if (rc)
  143. return 0;
  144. rc = sprintf(buf, "%d\n", !cap.perm_flags.deactivated);
  145. return rc;
  146. }
  147. static DEVICE_ATTR_RO(active);
  148. static ssize_t owned_show(struct device *dev, struct device_attribute *attr,
  149. char *buf)
  150. {
  151. cap_t cap;
  152. ssize_t rc;
  153. rc = tpm_getcap(dev, TPM_CAP_PROP_OWNER, &cap,
  154. "attempting to determine the owner state");
  155. if (rc)
  156. return 0;
  157. rc = sprintf(buf, "%d\n", cap.owned);
  158. return rc;
  159. }
  160. static DEVICE_ATTR_RO(owned);
  161. static ssize_t temp_deactivated_show(struct device *dev,
  162. struct device_attribute *attr, char *buf)
  163. {
  164. cap_t cap;
  165. ssize_t rc;
  166. rc = tpm_getcap(dev, TPM_CAP_FLAG_VOL, &cap,
  167. "attempting to determine the temporary state");
  168. if (rc)
  169. return 0;
  170. rc = sprintf(buf, "%d\n", cap.stclear_flags.deactivated);
  171. return rc;
  172. }
  173. static DEVICE_ATTR_RO(temp_deactivated);
  174. static ssize_t caps_show(struct device *dev, struct device_attribute *attr,
  175. char *buf)
  176. {
  177. cap_t cap;
  178. ssize_t rc;
  179. char *str = buf;
  180. rc = tpm_getcap(dev, TPM_CAP_PROP_MANUFACTURER, &cap,
  181. "attempting to determine the manufacturer");
  182. if (rc)
  183. return 0;
  184. str += sprintf(str, "Manufacturer: 0x%x\n",
  185. be32_to_cpu(cap.manufacturer_id));
  186. /* Try to get a TPM version 1.2 TPM_CAP_VERSION_INFO */
  187. rc = tpm_getcap(dev, CAP_VERSION_1_2, &cap,
  188. "attempting to determine the 1.2 version");
  189. if (!rc) {
  190. str += sprintf(str,
  191. "TCG version: %d.%d\nFirmware version: %d.%d\n",
  192. cap.tpm_version_1_2.Major,
  193. cap.tpm_version_1_2.Minor,
  194. cap.tpm_version_1_2.revMajor,
  195. cap.tpm_version_1_2.revMinor);
  196. } else {
  197. /* Otherwise just use TPM_STRUCT_VER */
  198. rc = tpm_getcap(dev, CAP_VERSION_1_1, &cap,
  199. "attempting to determine the 1.1 version");
  200. if (rc)
  201. return 0;
  202. str += sprintf(str,
  203. "TCG version: %d.%d\nFirmware version: %d.%d\n",
  204. cap.tpm_version.Major,
  205. cap.tpm_version.Minor,
  206. cap.tpm_version.revMajor,
  207. cap.tpm_version.revMinor);
  208. }
  209. return str - buf;
  210. }
  211. static DEVICE_ATTR_RO(caps);
  212. static ssize_t cancel_store(struct device *dev, struct device_attribute *attr,
  213. const char *buf, size_t count)
  214. {
  215. struct tpm_chip *chip = dev_get_drvdata(dev);
  216. if (chip == NULL)
  217. return 0;
  218. chip->ops->cancel(chip);
  219. return count;
  220. }
  221. static DEVICE_ATTR_WO(cancel);
  222. static ssize_t durations_show(struct device *dev, struct device_attribute *attr,
  223. char *buf)
  224. {
  225. struct tpm_chip *chip = dev_get_drvdata(dev);
  226. if (chip->vendor.duration[TPM_LONG] == 0)
  227. return 0;
  228. return sprintf(buf, "%d %d %d [%s]\n",
  229. jiffies_to_usecs(chip->vendor.duration[TPM_SHORT]),
  230. jiffies_to_usecs(chip->vendor.duration[TPM_MEDIUM]),
  231. jiffies_to_usecs(chip->vendor.duration[TPM_LONG]),
  232. chip->vendor.duration_adjusted
  233. ? "adjusted" : "original");
  234. }
  235. static DEVICE_ATTR_RO(durations);
  236. static ssize_t timeouts_show(struct device *dev, struct device_attribute *attr,
  237. char *buf)
  238. {
  239. struct tpm_chip *chip = dev_get_drvdata(dev);
  240. return sprintf(buf, "%d %d %d %d [%s]\n",
  241. jiffies_to_usecs(chip->vendor.timeout_a),
  242. jiffies_to_usecs(chip->vendor.timeout_b),
  243. jiffies_to_usecs(chip->vendor.timeout_c),
  244. jiffies_to_usecs(chip->vendor.timeout_d),
  245. chip->vendor.timeout_adjusted
  246. ? "adjusted" : "original");
  247. }
  248. static DEVICE_ATTR_RO(timeouts);
  249. static struct attribute *tpm_dev_attrs[] = {
  250. &dev_attr_pubek.attr,
  251. &dev_attr_pcrs.attr,
  252. &dev_attr_enabled.attr,
  253. &dev_attr_active.attr,
  254. &dev_attr_owned.attr,
  255. &dev_attr_temp_deactivated.attr,
  256. &dev_attr_caps.attr,
  257. &dev_attr_cancel.attr,
  258. &dev_attr_durations.attr,
  259. &dev_attr_timeouts.attr,
  260. NULL,
  261. };
  262. static const struct attribute_group tpm_dev_group = {
  263. .attrs = tpm_dev_attrs,
  264. };
  265. int tpm_sysfs_add_device(struct tpm_chip *chip)
  266. {
  267. int err;
  268. err = sysfs_create_group(&chip->dev->kobj,
  269. &tpm_dev_group);
  270. if (err)
  271. dev_err(chip->dev,
  272. "failed to create sysfs attributes, %d\n", err);
  273. return err;
  274. }
  275. void tpm_sysfs_del_device(struct tpm_chip *chip)
  276. {
  277. sysfs_remove_group(&chip->dev->kobj, &tpm_dev_group);
  278. }