1 // SPDX-License-Identifier: GPL-2.0 2 /* 3 * Functions corresponding to password object type attributes under BIOS Password Object GUID for 4 * use with dell-wmi-sysman 5 * 6 * Copyright (c) 2020 Dell Inc. 7 */ 8 9 #include "dell-wmi-sysman.h" 10 11 enum po_properties {IS_PASS_SET = 1, MIN_PASS_LEN, MAX_PASS_LEN}; 12 13 get_instance_id(po); 14 15 static ssize_t is_enabled_show(struct kobject *kobj, struct kobj_attribute *attr, 16 char *buf) 17 { 18 int instance_id = get_po_instance_id(kobj); 19 union acpi_object *obj; 20 ssize_t ret; 21 22 if (instance_id < 0) 23 return instance_id; 24 25 /* need to use specific instance_id and guid combination to get right data */ 26 obj = get_wmiobj_pointer(instance_id, DELL_WMI_BIOS_PASSOBJ_ATTRIBUTE_GUID); 27 if (!obj) 28 return -EIO; 29 if (obj->package.elements[IS_PASS_SET].type != ACPI_TYPE_INTEGER) { 30 kfree(obj); 31 return -EINVAL; 32 } 33 ret = snprintf(buf, PAGE_SIZE, "%lld\n", obj->package.elements[IS_PASS_SET].integer.value); 34 kfree(obj); 35 return ret; 36 } 37 38 static struct kobj_attribute po_is_pass_set = __ATTR_RO(is_enabled); 39 40 static ssize_t current_password_store(struct kobject *kobj, 41 struct kobj_attribute *attr, 42 const char *buf, size_t count) 43 { 44 char *target = NULL; 45 int length; 46 47 length = strlen(buf); 48 if (buf[length-1] == '\n') 49 length--; 50 51 /* firmware does verifiation of min/max password length, 52 * hence only check for not exceeding MAX_BUFF here. 53 */ 54 if (length >= MAX_BUFF) 55 return -EINVAL; 56 57 if (strcmp(kobj->name, "Admin") == 0) 58 target = wmi_priv.current_admin_password; 59 else if (strcmp(kobj->name, "System") == 0) 60 target = wmi_priv.current_system_password; 61 if (!target) 62 return -EIO; 63 memcpy(target, buf, length); 64 target[length] = '\0'; 65 66 return count; 67 } 68 69 static struct kobj_attribute po_current_password = __ATTR_WO(current_password); 70 71 static ssize_t new_password_store(struct kobject *kobj, 72 struct kobj_attribute *attr, 73 const char *buf, size_t count) 74 { 75 char *p, *buf_cp; 76 int ret; 77 78 buf_cp = kstrdup(buf, GFP_KERNEL); 79 if (!buf_cp) 80 return -ENOMEM; 81 p = memchr(buf_cp, '\n', count); 82 83 if (p != NULL) 84 *p = '\0'; 85 if (strlen(buf_cp) > MAX_BUFF) { 86 ret = -EINVAL; 87 goto out; 88 } 89 90 ret = set_new_password(kobj->name, buf_cp); 91 92 out: 93 kfree(buf_cp); 94 return ret ? ret : count; 95 } 96 97 static struct kobj_attribute po_new_password = __ATTR_WO(new_password); 98 99 attribute_n_property_show(min_password_length, po); 100 static struct kobj_attribute po_min_pass_length = __ATTR_RO(min_password_length); 101 102 attribute_n_property_show(max_password_length, po); 103 static struct kobj_attribute po_max_pass_length = __ATTR_RO(max_password_length); 104 105 static ssize_t mechanism_show(struct kobject *kobj, struct kobj_attribute *attr, 106 char *buf) 107 { 108 return sprintf(buf, "password\n"); 109 } 110 111 static struct kobj_attribute po_mechanism = __ATTR_RO(mechanism); 112 113 static ssize_t role_show(struct kobject *kobj, struct kobj_attribute *attr, 114 char *buf) 115 { 116 if (strcmp(kobj->name, "Admin") == 0) 117 return sprintf(buf, "bios-admin\n"); 118 else if (strcmp(kobj->name, "System") == 0) 119 return sprintf(buf, "power-on\n"); 120 return -EIO; 121 } 122 123 static struct kobj_attribute po_role = __ATTR_RO(role); 124 125 static struct attribute *po_attrs[] = { 126 &po_is_pass_set.attr, 127 &po_min_pass_length.attr, 128 &po_max_pass_length.attr, 129 &po_current_password.attr, 130 &po_new_password.attr, 131 &po_role.attr, 132 &po_mechanism.attr, 133 NULL, 134 }; 135 136 static const struct attribute_group po_attr_group = { 137 .attrs = po_attrs, 138 }; 139 140 int alloc_po_data(void) 141 { 142 int ret = 0; 143 144 wmi_priv.po_instances_count = get_instance_count(DELL_WMI_BIOS_PASSOBJ_ATTRIBUTE_GUID); 145 wmi_priv.po_data = kcalloc(wmi_priv.po_instances_count, sizeof(struct po_data), GFP_KERNEL); 146 if (!wmi_priv.po_data) { 147 wmi_priv.po_instances_count = 0; 148 ret = -ENOMEM; 149 } 150 return ret; 151 } 152 153 /** 154 * populate_po_data() - Populate all properties of an instance under password object attribute 155 * @po_obj: ACPI object with password object data 156 * @instance_id: The instance to enumerate 157 * @attr_name_kobj: The parent kernel object 158 */ 159 int populate_po_data(union acpi_object *po_obj, int instance_id, struct kobject *attr_name_kobj) 160 { 161 wmi_priv.po_data[instance_id].attr_name_kobj = attr_name_kobj; 162 strlcpy_attr(wmi_priv.po_data[instance_id].attribute_name, 163 po_obj[ATTR_NAME].string.pointer); 164 wmi_priv.po_data[instance_id].min_password_length = 165 (uintptr_t)po_obj[MIN_PASS_LEN].string.pointer; 166 wmi_priv.po_data[instance_id].max_password_length = 167 (uintptr_t) po_obj[MAX_PASS_LEN].string.pointer; 168 169 return sysfs_create_group(attr_name_kobj, &po_attr_group); 170 } 171 172 /** 173 * exit_po_attributes() - Clear all attribute data 174 * 175 * Clears all data allocated for this group of attributes 176 */ 177 void exit_po_attributes(void) 178 { 179 int instance_id; 180 181 for (instance_id = 0; instance_id < wmi_priv.po_instances_count; instance_id++) { 182 if (wmi_priv.po_data[instance_id].attr_name_kobj) 183 sysfs_remove_group(wmi_priv.po_data[instance_id].attr_name_kobj, 184 &po_attr_group); 185 } 186 wmi_priv.po_instances_count = 0; 187 188 kfree(wmi_priv.po_data); 189 wmi_priv.po_data = NULL; 190 } 191