Received: by 2002:a05:6358:9144:b0:117:f937:c515 with SMTP id r4csp5869650rwr; Tue, 9 May 2023 07:20:28 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ6Fv1keuyCxWzk32oJv7+EcdFBf1QZGgiqlGgem56srmabCPdbTCZUKS5A8ksrHKx8+FaCz X-Received: by 2002:a05:6a20:9191:b0:f3:b764:5ded with SMTP id v17-20020a056a20919100b000f3b7645dedmr18593026pzd.53.1683642028101; Tue, 09 May 2023 07:20:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1683642028; cv=none; d=google.com; s=arc-20160816; b=WvwMK3UqnF/Gd/U6iSJS5rN5CyGgSf364FMFi2fwduIzeeSOQDh57/GiowG/6Wn6o1 UaWDWuW0kAehQmxPeazBxqrPm/1zzv74AyZX4JxRSnXj4U0AQzTe7NSxzrU3T/wiBnM2 Laf8n5PzazeIN6kTqZxxcQL7gkXnm9jba9BttL9VfiLAnpnqKSfwLH2qv+oRnpnpWN0F misSf1UgxbfeGSWzYsfoCeAOCIqmacxzGc7m7TBftWKugS2neQIL5S8EfV7qgeP2SYCd Xj6V4t8VW9TV2ML+TLf455GmptmuZjQbRPJeLo3mCGW66k23/rkQsrEp8W1OZtyJ2rFb Fw4Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:references:message-id:in-reply-to :subject:cc:to:from:date:dkim-signature; bh=bYhDaawCjGpahBlrByZnyWB0x1SCYQcLrP3Ch0pmcOM=; b=b6atXl82vP5zkncVTkbRoZmwO80aMXBq0Et6UKWsv7tyhs7vXdIag9LN5e8BbpM6iw zXS8V4Zh+oPtmVITvvLXeqZrhB/rQnZlpXi/7FjYQhZ7ogMJtQwD7BUrhZn4PfSlA9kV b6f01DFzljhOOeFjdgbiNequkQ5dwhmucjbB7G15pnL9hgRpd7hyHaMJajwmV6ZBYuDp ENm56X7huVMZPVjH15Q+N328jWwCjWX00qwCeqZTcpjAk1IkDHrGkrj5fscamEZFqIui Svbyr6Vbbvn284eFq39WFv9sQCEGOtK5ht6IExPppvaGaEcSU3jtARcvt8qTyJAcSGjF 710A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b="nkchgBe/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id g15-20020aa79f0f000000b006439d46853dsi2284944pfr.364.2023.05.09.07.20.13; Tue, 09 May 2023 07:20:28 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b="nkchgBe/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235635AbjEIN50 (ORCPT + 99 others); Tue, 9 May 2023 09:57:26 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42460 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234641AbjEIN5Z (ORCPT ); Tue, 9 May 2023 09:57:25 -0400 Received: from mga05.intel.com (mga05.intel.com [192.55.52.43]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6EFB12693; Tue, 9 May 2023 06:57:24 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1683640644; x=1715176644; h=date:from:to:cc:subject:in-reply-to:message-id: references:mime-version; bh=UVy64Pk+hgKwBjp3S6QK5h+QalJxWGgJ9Y6DVov4oOw=; b=nkchgBe/fT2flOjASp7cx2hQ9ylyn1DdHfePUhbK3Ip6uGK0GNSdWYCQ 9VDBwCuKTUzp/6VwB0lYvVzvnrcSXQWD0DMUfMGquITo5NEHBc6nUbrYq Stn/7yfVo1PKHVHCPpe3ww8RA4OWdfbLhWYaLcud2wXhODv6b43cwlFPZ b++swLEfKajoBsUeXUflJm0v5QIcK94ZSs1q1pnZA9lYLwrytpUU28K9w HbpD+/vY59Df3VPp52c9dvrdriUkhc7yGT8oS/nJ1KwtkBoweM6A+uUCQ QPnVEVSlllzF7+7m/FpoSkvs8ynoGTNjnbFx3WslfwQRZwQaJpojipWsk g==; X-IronPort-AV: E=McAfee;i="6600,9927,10705"; a="436248177" X-IronPort-AV: E=Sophos;i="5.99,262,1677571200"; d="scan'208";a="436248177" Received: from fmsmga005.fm.intel.com ([10.253.24.32]) by fmsmga105.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 09 May 2023 06:57:21 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10705"; a="1028823776" X-IronPort-AV: E=Sophos;i="5.99,262,1677571200"; d="scan'208";a="1028823776" Received: from mbrdon-mobl.ger.corp.intel.com ([10.251.219.121]) by fmsmga005-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 09 May 2023 06:57:20 -0700 Date: Tue, 9 May 2023 16:57:17 +0300 (EEST) From: =?ISO-8859-15?Q?Ilpo_J=E4rvinen?= To: Jorge Lopez cc: hdegoede@redhat.com, platform-driver-x86@vger.kernel.org, linux-kernel@vger.kernel.org, thomas@t-8ch.de Subject: Re: [PATCH v12 11/13] HP BIOSCFG driver - surestart-attributes In-Reply-To: <20230505220043.39036-12-jorge.lopez2@hp.com> Message-ID: References: <20230505220043.39036-1-jorge.lopez2@hp.com> <20230505220043.39036-12-jorge.lopez2@hp.com> MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="8323329-1677896569-1683640641=:2036" X-Spam-Status: No, score=-4.3 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_EF,RCVD_IN_DNSWL_MED,SPF_HELO_NONE, SPF_NONE,T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This message is in MIME format. The first part should be readable text, while the remaining parts are likely unreadable without MIME-aware tools. --8323329-1677896569-1683640641=:2036 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8BIT On Fri, 5 May 2023, Jorge Lopez wrote: > HP BIOS Configuration driver purpose is to provide a driver supporting > the latest sysfs class firmware attributes framework allowing the user > to change BIOS settings and security solutions on HP Inc.’s commercial > notebooks. > > Many features of HP Commercial notebooks can be managed using Windows > Management Instrumentation (WMI). WMI is an implementation of Web-Based > Enterprise Management (WBEM) that provides a standards-based interface > for changing and monitoring system settings. HP BIOSCFG driver provides > a native Linux solution and the exposed features facilitates the > migration to Linux environments. > > The Linux security features to be provided in hp-bioscfg driver enables > managing the BIOS settings and security solutions via sysfs, a virtual > filesystem that can be used by user-mode applications. The new > documentation cover HP-specific firmware sysfs attributes such Secure > Platform Management and Sure Start. Each section provides security > feature description and identifies sysfs directories and files exposed > by the driver. > > Many HP Commercial notebooks include a feature called Secure Platform > Management (SPM), which replaces older password-based BIOS settings > management with public key cryptography. PC secure product management > begins when a target system is provisioned with cryptographic keys > that are used to ensure the integrity of communications between system > management utilities and the BIOS. > > HP Commercial notebooks have several BIOS settings that control its > behaviour and capabilities, many of which are related to security. > To prevent unauthorized changes to these settings, the system can > be configured to use a cryptographic signature-based authorization > string that the BIOS will use to verify authorization to modify the > setting. > > Linux Security components are under development and not published yet. > The only linux component is the driver (hp bioscfg) at this time. > Other published security components are under Windows. > > Signed-off-by: Jorge Lopez > > --- > Based on the latest platform-drivers-x86.git/for-next > --- > .../x86/hp/hp-bioscfg/surestart-attributes.c | 133 ++++++++++++++++++ > 1 file changed, 133 insertions(+) > create mode 100644 drivers/platform/x86/hp/hp-bioscfg/surestart-attributes.c > > diff --git a/drivers/platform/x86/hp/hp-bioscfg/surestart-attributes.c b/drivers/platform/x86/hp/hp-bioscfg/surestart-attributes.c > new file mode 100644 > index 000000000000..b627c324f6a6 > --- /dev/null > +++ b/drivers/platform/x86/hp/hp-bioscfg/surestart-attributes.c > @@ -0,0 +1,133 @@ > +// SPDX-License-Identifier: GPL-2.0 > +/* > + * Functions corresponding to sure start object type attributes under > + * BIOS for use with hp-bioscfg driver > + * > + * Copyright (c) 2022 HP Development Company, L.P. > + */ > + > +#include "bioscfg.h" > +#include > + > +/* Maximum number of log entries supported when log entry size is 16 > + * bytes. This value is calculated by dividing 4096 (page size) by > + * log entry size. > + */ > +#define LOG_MAX_ENTRIES 254 > + > +/* > + * Current Log entry size. This value size will change in the > + * future. The driver reads a total of 128 bytes for each log entry > + * provided by BIOS but only the first 16 bytes are used/read. > + */ > +#define LOG_ENTRY_SIZE 16 > + > +/* > + * audit_log_entry_count_show - Reports the number of > + * existing audit log entries available > + * to be read > + */ > +static ssize_t audit_log_entry_count_show(struct kobject *kobj, > + struct kobj_attribute *attr, char *buf) > +{ > + int ret; > + u32 count = 0; > + > + ret = hp_wmi_perform_query(HPWMI_SURESTART_GET_LOG_COUNT, > + HPWMI_SURESTART, > + &count, 1, sizeof(count)); > + Extra newline. > + if (ret < 0) > + return ret; > + > + return sysfs_emit(buf, "%d,%d,%d\n", count, LOG_ENTRY_SIZE, > + LOG_MAX_ENTRIES); Why 3 values instead of 1? > +} > + > +/* > + * audit_log_entries_show() - Return all entries found in log file > + */ > +static ssize_t audit_log_entries_show(struct kobject *kobj, > + struct kobj_attribute *attr, char *buf) > +{ > + int ret; > + int i; > + u32 count = 0; > + u8 audit_log_buffer[128]; > + > + // Get the number of event logs > + ret = hp_wmi_perform_query(HPWMI_SURESTART_GET_LOG_COUNT, > + HPWMI_SURESTART, > + &count, 1, sizeof(count)); > + Extra newline. > + if (ret < 0) > + return ret; > + > + /* > + * The show() api will not work if the audit logs ever go > + * beyond 4KB Extra space. > + */ > + if (count * LOG_ENTRY_SIZE > PAGE_SIZE) > + return -EIO; > + > + /* > + * We are guaranteed the buffer is 4KB so today all the event > + * logs will fit > + */ > + for (i = 0; i < count; i++) { > + audit_log_buffer[0] = (i + 1); Extra parenthesis. > + > + /* > + * read audit log entry at a time. 'buf' input value > + * provides the audit log entry to be read. On Extra spaces. > + * input, Byte 0 = Audit Log entry number from > + * beginning (1..254) > + * Entry number 1 is the newest entry whereas the > + * highest entry number (number of entries) is the > + * oldest entry. > + */ > + ret = hp_wmi_perform_query(HPWMI_SURESTART_GET_LOG, > + HPWMI_SURESTART, > + audit_log_buffer, 1, 128); > + > + if (ret >= 0 && (LOG_ENTRY_SIZE * i) < PAGE_SIZE) { Can the second condition ever fail? > + memcpy(buf, audit_log_buffer, LOG_ENTRY_SIZE); > + buf += LOG_ENTRY_SIZE; > + } else { > + /* > + * Encountered a failure while reading > + * individual logs. Only a partial list of > + * audit log will be returned. > + */ > + count = i + 1; > + break; > + } Reverse order, do error handling with break first. Why not return i * LOG_ENTRY_SIZE directly (or at the end), no need to tweak count? > + } > + > + return count * LOG_ENTRY_SIZE; > +} > + > +static struct kobj_attribute sure_start_audit_log_entry_count = __ATTR_RO(audit_log_entry_count); > +static struct kobj_attribute sure_start_audit_log_entries = __ATTR_RO(audit_log_entries); > + > +static struct attribute *sure_start_attrs[] = { > + &sure_start_audit_log_entry_count.attr, > + &sure_start_audit_log_entries.attr, > + NULL, > +}; > + > +static const struct attribute_group sure_start_attr_group = { > + .attrs = sure_start_attrs, > +}; > + > +void exit_sure_start_attributes(void) > +{ > + sysfs_remove_group(bioscfg_drv.sure_start_attr_kobj, > + &sure_start_attr_group); > +} > + > +int populate_sure_start_data(struct kobject *attr_name_kobj) > +{ > + bioscfg_drv.sure_start_attr_kobj = attr_name_kobj; > + return sysfs_create_group(attr_name_kobj, &sure_start_attr_group); > +} > -- i. --8323329-1677896569-1683640641=:2036--