arm64: dts: Revert "specify console via command line"
[linux/fpc-iii.git] / arch / powerpc / kernel / secvar-sysfs.c
bloba0a78aba2083e073a537398d9c9d39b899edad87
1 // SPDX-License-Identifier: GPL-2.0+
2 /*
3 * Copyright (C) 2019 IBM Corporation <nayna@linux.ibm.com>
5 * This code exposes secure variables to user via sysfs
6 */
8 #define pr_fmt(fmt) "secvar-sysfs: "fmt
10 #include <linux/slab.h>
11 #include <linux/compat.h>
12 #include <linux/string.h>
13 #include <linux/of.h>
14 #include <asm/secvar.h>
16 #define NAME_MAX_SIZE 1024
18 static struct kobject *secvar_kobj;
19 static struct kset *secvar_kset;
21 static ssize_t format_show(struct kobject *kobj, struct kobj_attribute *attr,
22 char *buf)
24 ssize_t rc = 0;
25 struct device_node *node;
26 const char *format;
28 node = of_find_compatible_node(NULL, NULL, "ibm,secvar-backend");
29 if (!of_device_is_available(node))
30 return -ENODEV;
32 rc = of_property_read_string(node, "format", &format);
33 if (rc)
34 return rc;
36 rc = sprintf(buf, "%s\n", format);
38 of_node_put(node);
40 return rc;
44 static ssize_t size_show(struct kobject *kobj, struct kobj_attribute *attr,
45 char *buf)
47 uint64_t dsize;
48 int rc;
50 rc = secvar_ops->get(kobj->name, strlen(kobj->name) + 1, NULL, &dsize);
51 if (rc) {
52 pr_err("Error retrieving %s variable size %d\n", kobj->name,
53 rc);
54 return rc;
57 return sprintf(buf, "%llu\n", dsize);
60 static ssize_t data_read(struct file *filep, struct kobject *kobj,
61 struct bin_attribute *attr, char *buf, loff_t off,
62 size_t count)
64 uint64_t dsize;
65 char *data;
66 int rc;
68 rc = secvar_ops->get(kobj->name, strlen(kobj->name) + 1, NULL, &dsize);
69 if (rc) {
70 pr_err("Error getting %s variable size %d\n", kobj->name, rc);
71 return rc;
73 pr_debug("dsize is %llu\n", dsize);
75 data = kzalloc(dsize, GFP_KERNEL);
76 if (!data)
77 return -ENOMEM;
79 rc = secvar_ops->get(kobj->name, strlen(kobj->name) + 1, data, &dsize);
80 if (rc) {
81 pr_err("Error getting %s variable %d\n", kobj->name, rc);
82 goto data_fail;
85 rc = memory_read_from_buffer(buf, count, &off, data, dsize);
87 data_fail:
88 kfree(data);
89 return rc;
92 static ssize_t update_write(struct file *filep, struct kobject *kobj,
93 struct bin_attribute *attr, char *buf, loff_t off,
94 size_t count)
96 int rc;
98 pr_debug("count is %ld\n", count);
99 rc = secvar_ops->set(kobj->name, strlen(kobj->name) + 1, buf, count);
100 if (rc) {
101 pr_err("Error setting the %s variable %d\n", kobj->name, rc);
102 return rc;
105 return count;
108 static struct kobj_attribute format_attr = __ATTR_RO(format);
110 static struct kobj_attribute size_attr = __ATTR_RO(size);
112 static struct bin_attribute data_attr = __BIN_ATTR_RO(data, 0);
114 static struct bin_attribute update_attr = __BIN_ATTR_WO(update, 0);
116 static struct bin_attribute *secvar_bin_attrs[] = {
117 &data_attr,
118 &update_attr,
119 NULL,
122 static struct attribute *secvar_attrs[] = {
123 &size_attr.attr,
124 NULL,
127 static const struct attribute_group secvar_attr_group = {
128 .attrs = secvar_attrs,
129 .bin_attrs = secvar_bin_attrs,
131 __ATTRIBUTE_GROUPS(secvar_attr);
133 static struct kobj_type secvar_ktype = {
134 .sysfs_ops = &kobj_sysfs_ops,
135 .default_groups = secvar_attr_groups,
138 static int update_kobj_size(void)
141 struct device_node *node;
142 u64 varsize;
143 int rc = 0;
145 node = of_find_compatible_node(NULL, NULL, "ibm,secvar-backend");
146 if (!of_device_is_available(node)) {
147 rc = -ENODEV;
148 goto out;
151 rc = of_property_read_u64(node, "max-var-size", &varsize);
152 if (rc)
153 goto out;
155 data_attr.size = varsize;
156 update_attr.size = varsize;
158 out:
159 of_node_put(node);
161 return rc;
164 static int secvar_sysfs_load(void)
166 char *name;
167 uint64_t namesize = 0;
168 struct kobject *kobj;
169 int rc;
171 name = kzalloc(NAME_MAX_SIZE, GFP_KERNEL);
172 if (!name)
173 return -ENOMEM;
175 do {
176 rc = secvar_ops->get_next(name, &namesize, NAME_MAX_SIZE);
177 if (rc) {
178 if (rc != -ENOENT)
179 pr_err("error getting secvar from firmware %d\n",
180 rc);
181 break;
184 kobj = kzalloc(sizeof(*kobj), GFP_KERNEL);
185 if (!kobj) {
186 rc = -ENOMEM;
187 break;
190 kobject_init(kobj, &secvar_ktype);
192 rc = kobject_add(kobj, &secvar_kset->kobj, "%s", name);
193 if (rc) {
194 pr_warn("kobject_add error %d for attribute: %s\n", rc,
195 name);
196 kobject_put(kobj);
197 kobj = NULL;
200 if (kobj)
201 kobject_uevent(kobj, KOBJ_ADD);
203 } while (!rc);
205 kfree(name);
206 return rc;
209 static int secvar_sysfs_init(void)
211 int rc;
213 if (!secvar_ops) {
214 pr_warn("secvar: failed to retrieve secvar operations.\n");
215 return -ENODEV;
218 secvar_kobj = kobject_create_and_add("secvar", firmware_kobj);
219 if (!secvar_kobj) {
220 pr_err("secvar: Failed to create firmware kobj\n");
221 return -ENOMEM;
224 rc = sysfs_create_file(secvar_kobj, &format_attr.attr);
225 if (rc) {
226 kobject_put(secvar_kobj);
227 return -ENOMEM;
230 secvar_kset = kset_create_and_add("vars", NULL, secvar_kobj);
231 if (!secvar_kset) {
232 pr_err("secvar: sysfs kobject registration failed.\n");
233 kobject_put(secvar_kobj);
234 return -ENOMEM;
237 rc = update_kobj_size();
238 if (rc) {
239 pr_err("Cannot read the size of the attribute\n");
240 return rc;
243 secvar_sysfs_load();
245 return 0;
248 late_initcall(secvar_sysfs_init);