GNU Linux-libre 4.19.207-gnu1
[releases.git] / drivers / char / tpm / eventlog / common.c
1 /*
2  * Copyright (C) 2005, 2012 IBM Corporation
3  *
4  * Authors:
5  *      Kent Yoder <key@linux.vnet.ibm.com>
6  *      Seiji Munetoh <munetoh@jp.ibm.com>
7  *      Stefan Berger <stefanb@us.ibm.com>
8  *      Reiner Sailer <sailer@watson.ibm.com>
9  *      Kylene Hall <kjhall@us.ibm.com>
10  *      Nayna Jain <nayna@linux.vnet.ibm.com>
11  *
12  * Access to the event log created by a system's firmware / BIOS
13  *
14  * This program is free software; you can redistribute it and/or
15  * modify it under the terms of the GNU General Public License
16  * as published by the Free Software Foundation; either version
17  * 2 of the License, or (at your option) any later version.
18  *
19  */
20
21 #include <linux/seq_file.h>
22 #include <linux/fs.h>
23 #include <linux/security.h>
24 #include <linux/module.h>
25 #include <linux/tpm_eventlog.h>
26
27 #include "../tpm.h"
28 #include "common.h"
29
30 static int tpm_bios_measurements_open(struct inode *inode,
31                                             struct file *file)
32 {
33         int err;
34         struct seq_file *seq;
35         struct tpm_chip_seqops *chip_seqops;
36         const struct seq_operations *seqops;
37         struct tpm_chip *chip;
38
39         inode_lock(inode);
40         if (!inode->i_private) {
41                 inode_unlock(inode);
42                 return -ENODEV;
43         }
44         chip_seqops = (struct tpm_chip_seqops *)inode->i_private;
45         seqops = chip_seqops->seqops;
46         chip = chip_seqops->chip;
47         get_device(&chip->dev);
48         inode_unlock(inode);
49
50         /* now register seq file */
51         err = seq_open(file, seqops);
52         if (!err) {
53                 seq = file->private_data;
54                 seq->private = chip;
55         }
56
57         return err;
58 }
59
60 static int tpm_bios_measurements_release(struct inode *inode,
61                                          struct file *file)
62 {
63         struct seq_file *seq = (struct seq_file *)file->private_data;
64         struct tpm_chip *chip = (struct tpm_chip *)seq->private;
65
66         put_device(&chip->dev);
67
68         return seq_release(inode, file);
69 }
70
71 static const struct file_operations tpm_bios_measurements_ops = {
72         .owner = THIS_MODULE,
73         .open = tpm_bios_measurements_open,
74         .read = seq_read,
75         .llseek = seq_lseek,
76         .release = tpm_bios_measurements_release,
77 };
78
79 static int tpm_read_log(struct tpm_chip *chip)
80 {
81         int rc;
82
83         if (chip->log.bios_event_log != NULL) {
84                 dev_dbg(&chip->dev,
85                         "%s: ERROR - event log already initialized\n",
86                         __func__);
87                 return -EFAULT;
88         }
89
90         rc = tpm_read_log_acpi(chip);
91         if (rc != -ENODEV)
92                 return rc;
93
94         rc = tpm_read_log_efi(chip);
95         if (rc != -ENODEV)
96                 return rc;
97
98         return tpm_read_log_of(chip);
99 }
100
101 /*
102  * tpm_bios_log_setup() - Read the event log from the firmware
103  * @chip: TPM chip to use.
104  *
105  * If an event log is found then the securityfs files are setup to
106  * export it to userspace, otherwise nothing is done.
107  */
108 void tpm_bios_log_setup(struct tpm_chip *chip)
109 {
110         const char *name = dev_name(&chip->dev);
111         unsigned int cnt;
112         int log_version;
113         int rc = 0;
114
115         if (chip->flags & TPM_CHIP_FLAG_VIRTUAL)
116                 return;
117
118         rc = tpm_read_log(chip);
119         if (rc < 0)
120                 return;
121         log_version = rc;
122
123         cnt = 0;
124         chip->bios_dir[cnt] = securityfs_create_dir(name, NULL);
125         /* NOTE: securityfs_create_dir can return ENODEV if securityfs is
126          * compiled out. The caller should ignore the ENODEV return code.
127          */
128         if (IS_ERR(chip->bios_dir[cnt]))
129                 goto err;
130         cnt++;
131
132         chip->bin_log_seqops.chip = chip;
133         if (log_version == EFI_TCG2_EVENT_LOG_FORMAT_TCG_2)
134                 chip->bin_log_seqops.seqops =
135                         &tpm2_binary_b_measurements_seqops;
136         else
137                 chip->bin_log_seqops.seqops =
138                         &tpm1_binary_b_measurements_seqops;
139
140
141         chip->bios_dir[cnt] =
142             securityfs_create_file("binary_bios_measurements",
143                                    0440, chip->bios_dir[0],
144                                    (void *)&chip->bin_log_seqops,
145                                    &tpm_bios_measurements_ops);
146         if (IS_ERR(chip->bios_dir[cnt]))
147                 goto err;
148         cnt++;
149
150         if (!(chip->flags & TPM_CHIP_FLAG_TPM2)) {
151
152                 chip->ascii_log_seqops.chip = chip;
153                 chip->ascii_log_seqops.seqops =
154                         &tpm1_ascii_b_measurements_seqops;
155
156                 chip->bios_dir[cnt] =
157                         securityfs_create_file("ascii_bios_measurements",
158                                                0440, chip->bios_dir[0],
159                                                (void *)&chip->ascii_log_seqops,
160                                                &tpm_bios_measurements_ops);
161                 if (IS_ERR(chip->bios_dir[cnt]))
162                         goto err;
163                 cnt++;
164         }
165
166         return;
167
168 err:
169         chip->bios_dir[cnt] = NULL;
170         tpm_bios_log_teardown(chip);
171         return;
172 }
173
174 void tpm_bios_log_teardown(struct tpm_chip *chip)
175 {
176         int i;
177         struct inode *inode;
178
179         /* securityfs_remove currently doesn't take care of handling sync
180          * between removal and opening of pseudo files. To handle this, a
181          * workaround is added by making i_private = NULL here during removal
182          * and to check it during open(), both within inode_lock()/unlock().
183          * This design ensures that open() either safely gets kref or fails.
184          */
185         for (i = (TPM_NUM_EVENT_LOG_FILES - 1); i >= 0; i--) {
186                 if (chip->bios_dir[i]) {
187                         inode = d_inode(chip->bios_dir[i]);
188                         inode_lock(inode);
189                         inode->i_private = NULL;
190                         inode_unlock(inode);
191                         securityfs_remove(chip->bios_dir[i]);
192                 }
193         }
194 }