| #include <linux/module.h> |
| #include <linux/kernel.h> |
| #include <linux/init.h> |
| #include <linux/types.h> |
| #include <linux/proc_fs.h> |
| #include <linux/seq_file.h> |
| #include <linux/mm.h> |
| #include <linux/types.h> |
| #include <linux/highmem.h> |
| |
| #ifdef CONFIG_RKP_CFP_FIX_SMC_BUG |
| #include <linux/rkp_cfp.h> |
| #endif |
| #define CMD_READ_SYSTEM_IMAGE_CHECK_STATUS 3 |
| |
| static inline u64 exynos_smc_verity(u64 cmd, u64 arg1, u64 arg2, u64 arg3) |
| { |
| register u64 reg0 __asm__("x0") = cmd; |
| register u64 reg1 __asm__("x1") = arg1; |
| register u64 reg2 __asm__("x2") = arg2; |
| register u64 reg3 __asm__("x3") = arg3; |
| |
| __asm__ volatile ( |
| #ifdef CONFIG_RKP_CFP_FIX_SMC_BUG |
| PRE_SMC_INLINE |
| #endif |
| "dsb sy\n" |
| "smc 0\n" |
| #ifdef CONFIG_RKP_CFP_FIX_SMC_BUG |
| POST_SMC_INLINE |
| #endif |
| : "+r"(reg0), "+r"(reg1), "+r"(reg2), "+r"(reg3) |
| |
| ); |
| |
| return reg0; |
| } |
| |
| |
| static int verity_scm_call(void) |
| { |
| return exynos_smc_verity(0x83000006, CMD_READ_SYSTEM_IMAGE_CHECK_STATUS, 0, 0); |
| } |
| |
| #define DRIVER_DESC "Read whether odin flash succeeded" |
| |
| |
| #if 0 |
| ssize_t dmverity_read(struct file *filep, char __user *buf, size_t size, loff_t *offset) |
| { |
| uint32_t odin_flag; |
| //int ret; |
| |
| /* First check is to get rid of integer overflow exploits */ |
| if (size < sizeof(uint32_t)) { |
| printk(KERN_ERR"Size must be atleast %d\n", (int)sizeof(uint32_t)); |
| return -EINVAL; |
| } |
| |
| odin_flag = verity_scm_call(); |
| printk(KERN_INFO"dmverity: odin flag: %x\n", odin_flag); |
| |
| if (copy_to_user(buf, &odin_flag, sizeof(uint32_t))) { |
| printk(KERN_ERR"Copy to user failed\n"); |
| return -1; |
| } else |
| return sizeof(uint32_t); |
| } |
| #endif |
| |
| static int dmverity_read(struct seq_file *m, void *v){ |
| int odin_flag = 0; |
| unsigned char ret_buffer[10]; |
| odin_flag = verity_scm_call(); |
| |
| memset(ret_buffer, 0, sizeof(ret_buffer)); |
| snprintf(ret_buffer, sizeof(ret_buffer), "%08x\n", odin_flag); |
| seq_write(m, ret_buffer, sizeof(ret_buffer)); |
| printk(KERN_INFO"dmverity: odin_flag: %x\n", odin_flag); |
| return 0; |
| } |
| static int dmverity_open(struct inode *inode, struct file *filep){ |
| return single_open(filep, dmverity_read, NULL); |
| } |
| |
| static const struct file_operations dmverity_proc_fops = { |
| .open = dmverity_open, |
| .read = seq_read, |
| |
| }; |
| |
| /** |
| * dmverity_odin_flag_read_init - Initialization function for DMVERITY |
| * |
| * It creates and initializes dmverity proc entry with initialized read handler |
| */ |
| static int __init dmverity_odin_flag_read_init(void) |
| { |
| //extern int boot_mode_recovery; |
| if (/* boot_mode_recovery == */ 1) { |
| /* Only create this in recovery mode. Not sure why I am doing this */ |
| if (proc_create("dmverity_odin_flag", 0644,NULL, &dmverity_proc_fops) == NULL) { |
| printk(KERN_ERR"dmverity_odin_flag_read_init: Error creating proc entry\n"); |
| goto error_return; |
| } |
| printk(KERN_INFO"dmverity_odin_flag_read_init:: Registering /proc/dmverity_odin_flag Interface \n"); |
| } else { |
| printk(KERN_INFO"dmverity_odin_flag_read_init:: not enabling in non-recovery mode\n"); |
| goto error_return; |
| } |
| |
| return 0; |
| |
| error_return: |
| return -1; |
| } |
| |
| |
| /** |
| * dmverity_odin_flag_read_exit - Cleanup Code for DMVERITY |
| * |
| * It removes /proc/dmverity proc entry and does the required cleanup operations |
| */ |
| static void __exit dmverity_odin_flag_read_exit(void) |
| { |
| remove_proc_entry("dmverity_odin_flag", NULL); |
| printk(KERN_INFO"Deregistering /proc/dmverity_odin_flag interface\n"); |
| } |
| |
| |
| module_init(dmverity_odin_flag_read_init); |
| module_exit(dmverity_odin_flag_read_exit); |
| |
| MODULE_DESCRIPTION(DRIVER_DESC); |