1 // SPDX-License-Identifier: GPL-2.0-or-later
3 * Copyright (C) 2005, 2012 IBM Corporation
6 * Kent Yoder <key@linux.vnet.ibm.com>
7 * Seiji Munetoh <munetoh@jp.ibm.com>
8 * Stefan Berger <stefanb@us.ibm.com>
9 * Reiner Sailer <sailer@watson.ibm.com>
10 * Kylene Hall <kjhall@us.ibm.com>
11 * Nayna Jain <nayna@linux.vnet.ibm.com>
13 * Access to the event log created by a system's firmware / BIOS
16 #include <linux/seq_file.h>
18 #include <linux/security.h>
19 #include <linux/module.h>
20 #include <linux/tpm_eventlog.h>
25 static int tpm_bios_measurements_open(struct inode *inode,
30 struct tpm_chip_seqops *chip_seqops;
31 const struct seq_operations *seqops;
32 struct tpm_chip *chip;
35 if (!inode->i_private) {
39 chip_seqops = (struct tpm_chip_seqops *)inode->i_private;
40 seqops = chip_seqops->seqops;
41 chip = chip_seqops->chip;
42 get_device(&chip->dev);
45 /* now register seq file */
46 err = seq_open(file, seqops);
48 seq = file->private_data;
55 static int tpm_bios_measurements_release(struct inode *inode,
58 struct seq_file *seq = (struct seq_file *)file->private_data;
59 struct tpm_chip *chip = (struct tpm_chip *)seq->private;
61 put_device(&chip->dev);
63 return seq_release(inode, file);
66 static const struct file_operations tpm_bios_measurements_ops = {
68 .open = tpm_bios_measurements_open,
71 .release = tpm_bios_measurements_release,
74 static int tpm_read_log(struct tpm_chip *chip)
78 if (chip->log.bios_event_log != NULL) {
80 "%s: ERROR - event log already initialized\n",
85 rc = tpm_read_log_acpi(chip);
89 rc = tpm_read_log_efi(chip);
93 return tpm_read_log_of(chip);
97 * tpm_bios_log_setup() - Read the event log from the firmware
98 * @chip: TPM chip to use.
100 * If an event log is found then the securityfs files are setup to
101 * export it to userspace, otherwise nothing is done.
103 void tpm_bios_log_setup(struct tpm_chip *chip)
105 const char *name = dev_name(&chip->dev);
110 if (chip->flags & TPM_CHIP_FLAG_VIRTUAL)
113 rc = tpm_read_log(chip);
119 chip->bios_dir[cnt] = securityfs_create_dir(name, NULL);
120 /* NOTE: securityfs_create_dir can return ENODEV if securityfs is
121 * compiled out. The caller should ignore the ENODEV return code.
123 if (IS_ERR(chip->bios_dir[cnt]))
127 chip->bin_log_seqops.chip = chip;
128 if (log_version == EFI_TCG2_EVENT_LOG_FORMAT_TCG_2)
129 chip->bin_log_seqops.seqops =
130 &tpm2_binary_b_measurements_seqops;
132 chip->bin_log_seqops.seqops =
133 &tpm1_binary_b_measurements_seqops;
136 chip->bios_dir[cnt] =
137 securityfs_create_file("binary_bios_measurements",
138 0440, chip->bios_dir[0],
139 (void *)&chip->bin_log_seqops,
140 &tpm_bios_measurements_ops);
141 if (IS_ERR(chip->bios_dir[cnt]))
145 if (!(chip->flags & TPM_CHIP_FLAG_TPM2)) {
147 chip->ascii_log_seqops.chip = chip;
148 chip->ascii_log_seqops.seqops =
149 &tpm1_ascii_b_measurements_seqops;
151 chip->bios_dir[cnt] =
152 securityfs_create_file("ascii_bios_measurements",
153 0440, chip->bios_dir[0],
154 (void *)&chip->ascii_log_seqops,
155 &tpm_bios_measurements_ops);
156 if (IS_ERR(chip->bios_dir[cnt]))
164 chip->bios_dir[cnt] = NULL;
165 tpm_bios_log_teardown(chip);
169 void tpm_bios_log_teardown(struct tpm_chip *chip)
174 /* securityfs_remove currently doesn't take care of handling sync
175 * between removal and opening of pseudo files. To handle this, a
176 * workaround is added by making i_private = NULL here during removal
177 * and to check it during open(), both within inode_lock()/unlock().
178 * This design ensures that open() either safely gets kref or fails.
180 for (i = (TPM_NUM_EVENT_LOG_FILES - 1); i >= 0; i--) {
181 if (chip->bios_dir[i]) {
182 inode = d_inode(chip->bios_dir[i]);
184 inode->i_private = NULL;
186 securityfs_remove(chip->bios_dir[i]);