1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16#include <linux/seq_file.h>
17#include <linux/fs.h>
18#include <linux/security.h>
19#include <linux/module.h>
20#include <linux/tpm_eventlog.h>
21
22#include "../tpm.h"
23#include "common.h"
24
25static int tpm_bios_measurements_open(struct inode *inode,
26 struct file *file)
27{
28 int err;
29 struct seq_file *seq;
30 struct tpm_chip_seqops *chip_seqops;
31 const struct seq_operations *seqops;
32 struct tpm_chip *chip;
33
34 inode_lock(inode);
35 if (!inode->i_private) {
36 inode_unlock(inode);
37 return -ENODEV;
38 }
39 chip_seqops = (struct tpm_chip_seqops *)inode->i_private;
40 seqops = chip_seqops->seqops;
41 chip = chip_seqops->chip;
42 get_device(&chip->dev);
43 inode_unlock(inode);
44
45
46 err = seq_open(file, seqops);
47 if (!err) {
48 seq = file->private_data;
49 seq->private = chip;
50 }
51
52 return err;
53}
54
55static int tpm_bios_measurements_release(struct inode *inode,
56 struct file *file)
57{
58 struct seq_file *seq = (struct seq_file *)file->private_data;
59 struct tpm_chip *chip = (struct tpm_chip *)seq->private;
60
61 put_device(&chip->dev);
62
63 return seq_release(inode, file);
64}
65
66static const struct file_operations tpm_bios_measurements_ops = {
67 .owner = THIS_MODULE,
68 .open = tpm_bios_measurements_open,
69 .read = seq_read,
70 .llseek = seq_lseek,
71 .release = tpm_bios_measurements_release,
72};
73
74static int tpm_read_log(struct tpm_chip *chip)
75{
76 int rc;
77
78 if (chip->log.bios_event_log != NULL) {
79 dev_dbg(&chip->dev,
80 "%s: ERROR - event log already initialized\n",
81 __func__);
82 return -EFAULT;
83 }
84
85 rc = tpm_read_log_acpi(chip);
86 if (rc != -ENODEV)
87 return rc;
88
89 rc = tpm_read_log_efi(chip);
90 if (rc != -ENODEV)
91 return rc;
92
93 return tpm_read_log_of(chip);
94}
95
96
97
98
99
100
101
102
103void tpm_bios_log_setup(struct tpm_chip *chip)
104{
105 const char *name = dev_name(&chip->dev);
106 unsigned int cnt;
107 int log_version;
108 int rc = 0;
109
110 if (chip->flags & TPM_CHIP_FLAG_VIRTUAL)
111 return;
112
113 rc = tpm_read_log(chip);
114 if (rc < 0)
115 return;
116 log_version = rc;
117
118 cnt = 0;
119 chip->bios_dir[cnt] = securityfs_create_dir(name, NULL);
120
121
122
123 if (IS_ERR(chip->bios_dir[cnt]))
124 goto err;
125 cnt++;
126
127 chip->bin_log_seqops.chip = chip;
128 if (log_version == EFI_TCG2_EVENT_LOG_FORMAT_TCG_2)
129 chip->bin_log_seqops.seqops =
130 &tpm2_binary_b_measurements_seqops;
131 else
132 chip->bin_log_seqops.seqops =
133 &tpm1_binary_b_measurements_seqops;
134
135
136 chip->bios_dir[cnt] =
137 securityfs_create_file("binary_bios_measurements",
138 0440, chip->bios_dir[0],
139 (void *)&chip->bin_log_seqops,
140 &tpm_bios_measurements_ops);
141 if (IS_ERR(chip->bios_dir[cnt]))
142 goto err;
143 cnt++;
144
145 if (!(chip->flags & TPM_CHIP_FLAG_TPM2)) {
146
147 chip->ascii_log_seqops.chip = chip;
148 chip->ascii_log_seqops.seqops =
149 &tpm1_ascii_b_measurements_seqops;
150
151 chip->bios_dir[cnt] =
152 securityfs_create_file("ascii_bios_measurements",
153 0440, chip->bios_dir[0],
154 (void *)&chip->ascii_log_seqops,
155 &tpm_bios_measurements_ops);
156 if (IS_ERR(chip->bios_dir[cnt]))
157 goto err;
158 cnt++;
159 }
160
161 return;
162
163err:
164 chip->bios_dir[cnt] = NULL;
165 tpm_bios_log_teardown(chip);
166 return;
167}
168
169void tpm_bios_log_teardown(struct tpm_chip *chip)
170{
171 int i;
172 struct inode *inode;
173
174
175
176
177
178
179
180 for (i = (TPM_NUM_EVENT_LOG_FILES - 1); i >= 0; i--) {
181 if (chip->bios_dir[i]) {
182 inode = d_inode(chip->bios_dir[i]);
183 inode_lock(inode);
184 inode->i_private = NULL;
185 inode_unlock(inode);
186 securityfs_remove(chip->bios_dir[i]);
187 }
188 }
189}
190