2 * Copyright (C) 2005, 2012 IBM Corporation
5 * Kent Yoder <key@linux.vnet.ibm.com>
6 * Seiji Munetoh <munetoh@jp.ibm.com>
7 * Stefan Berger <stefanb@us.ibm.com>
8 * Reiner Sailer <sailer@watson.ibm.com>
9 * Kylene Hall <kjhall@us.ibm.com>
10 * Nayna Jain <nayna@linux.vnet.ibm.com>
12 * Access to the event log created by a system's firmware / BIOS
14 * This program is free software; you can redistribute it and/or
15 * modify it under the terms of the GNU General Public License
16 * as published by the Free Software Foundation; either version
17 * 2 of the License, or (at your option) any later version.
21 #include <linux/seq_file.h>
23 #include <linux/security.h>
24 #include <linux/module.h>
25 #include <linux/tpm_eventlog.h>
30 static int tpm_bios_measurements_open(struct inode
*inode
,
35 struct tpm_chip_seqops
*chip_seqops
;
36 const struct seq_operations
*seqops
;
37 struct tpm_chip
*chip
;
40 if (!inode
->i_private
) {
44 chip_seqops
= (struct tpm_chip_seqops
*)inode
->i_private
;
45 seqops
= chip_seqops
->seqops
;
46 chip
= chip_seqops
->chip
;
47 get_device(&chip
->dev
);
50 /* now register seq file */
51 err
= seq_open(file
, seqops
);
53 seq
= file
->private_data
;
60 static int tpm_bios_measurements_release(struct inode
*inode
,
63 struct seq_file
*seq
= (struct seq_file
*)file
->private_data
;
64 struct tpm_chip
*chip
= (struct tpm_chip
*)seq
->private;
66 put_device(&chip
->dev
);
68 return seq_release(inode
, file
);
71 static const struct file_operations tpm_bios_measurements_ops
= {
73 .open
= tpm_bios_measurements_open
,
76 .release
= tpm_bios_measurements_release
,
79 static int tpm_read_log(struct tpm_chip
*chip
)
83 if (chip
->log
.bios_event_log
!= NULL
) {
85 "%s: ERROR - event log already initialized\n",
90 rc
= tpm_read_log_acpi(chip
);
94 rc
= tpm_read_log_efi(chip
);
98 return tpm_read_log_of(chip
);
102 * tpm_bios_log_setup() - Read the event log from the firmware
103 * @chip: TPM chip to use.
105 * If an event log is found then the securityfs files are setup to
106 * export it to userspace, otherwise nothing is done.
108 * Returns -ENODEV if the firmware has no event log or securityfs is not
111 int tpm_bios_log_setup(struct tpm_chip
*chip
)
113 const char *name
= dev_name(&chip
->dev
);
118 rc
= tpm_read_log(chip
);
124 chip
->bios_dir
[cnt
] = securityfs_create_dir(name
, NULL
);
125 /* NOTE: securityfs_create_dir can return ENODEV if securityfs is
126 * compiled out. The caller should ignore the ENODEV return code.
128 if (IS_ERR(chip
->bios_dir
[cnt
]))
132 chip
->bin_log_seqops
.chip
= chip
;
133 if (log_version
== EFI_TCG2_EVENT_LOG_FORMAT_TCG_2
)
134 chip
->bin_log_seqops
.seqops
=
135 &tpm2_binary_b_measurements_seqops
;
137 chip
->bin_log_seqops
.seqops
=
138 &tpm1_binary_b_measurements_seqops
;
141 chip
->bios_dir
[cnt
] =
142 securityfs_create_file("binary_bios_measurements",
143 0440, chip
->bios_dir
[0],
144 (void *)&chip
->bin_log_seqops
,
145 &tpm_bios_measurements_ops
);
146 if (IS_ERR(chip
->bios_dir
[cnt
]))
150 if (!(chip
->flags
& TPM_CHIP_FLAG_TPM2
)) {
152 chip
->ascii_log_seqops
.chip
= chip
;
153 chip
->ascii_log_seqops
.seqops
=
154 &tpm1_ascii_b_measurements_seqops
;
156 chip
->bios_dir
[cnt
] =
157 securityfs_create_file("ascii_bios_measurements",
158 0440, chip
->bios_dir
[0],
159 (void *)&chip
->ascii_log_seqops
,
160 &tpm_bios_measurements_ops
);
161 if (IS_ERR(chip
->bios_dir
[cnt
]))
169 rc
= PTR_ERR(chip
->bios_dir
[cnt
]);
170 chip
->bios_dir
[cnt
] = NULL
;
171 tpm_bios_log_teardown(chip
);
175 void tpm_bios_log_teardown(struct tpm_chip
*chip
)
180 /* securityfs_remove currently doesn't take care of handling sync
181 * between removal and opening of pseudo files. To handle this, a
182 * workaround is added by making i_private = NULL here during removal
183 * and to check it during open(), both within inode_lock()/unlock().
184 * This design ensures that open() either safely gets kref or fails.
186 for (i
= (TPM_NUM_EVENT_LOG_FILES
- 1); i
>= 0; i
--) {
187 if (chip
->bios_dir
[i
]) {
188 inode
= d_inode(chip
->bios_dir
[i
]);
190 inode
->i_private
= NULL
;
192 securityfs_remove(chip
->bios_dir
[i
]);