Linux 4.18.10
[linux/fpc-iii.git] / drivers / char / tpm / eventlog / common.c
blob5a8720df2b51384930220a8111e306aaf58196f9
1 /*
2 * Copyright (C) 2005, 2012 IBM Corporation
4 * Authors:
5 * Kent Yoder <key@linux.vnet.ibm.com>
6 * Seiji Munetoh <munetoh@jp.ibm.com>
7 * Stefan Berger <stefanb@us.ibm.com>
8 * Reiner Sailer <sailer@watson.ibm.com>
9 * Kylene Hall <kjhall@us.ibm.com>
10 * Nayna Jain <nayna@linux.vnet.ibm.com>
12 * Access to the event log created by a system's firmware / BIOS
14 * This program is free software; you can redistribute it and/or
15 * modify it under the terms of the GNU General Public License
16 * as published by the Free Software Foundation; either version
17 * 2 of the License, or (at your option) any later version.
21 #include <linux/seq_file.h>
22 #include <linux/fs.h>
23 #include <linux/security.h>
24 #include <linux/module.h>
25 #include <linux/tpm_eventlog.h>
27 #include "../tpm.h"
28 #include "common.h"
30 static int tpm_bios_measurements_open(struct inode *inode,
31 struct file *file)
33 int err;
34 struct seq_file *seq;
35 struct tpm_chip_seqops *chip_seqops;
36 const struct seq_operations *seqops;
37 struct tpm_chip *chip;
39 inode_lock(inode);
40 if (!inode->i_private) {
41 inode_unlock(inode);
42 return -ENODEV;
44 chip_seqops = (struct tpm_chip_seqops *)inode->i_private;
45 seqops = chip_seqops->seqops;
46 chip = chip_seqops->chip;
47 get_device(&chip->dev);
48 inode_unlock(inode);
50 /* now register seq file */
51 err = seq_open(file, seqops);
52 if (!err) {
53 seq = file->private_data;
54 seq->private = chip;
57 return err;
60 static int tpm_bios_measurements_release(struct inode *inode,
61 struct file *file)
63 struct seq_file *seq = (struct seq_file *)file->private_data;
64 struct tpm_chip *chip = (struct tpm_chip *)seq->private;
66 put_device(&chip->dev);
68 return seq_release(inode, file);
71 static const struct file_operations tpm_bios_measurements_ops = {
72 .owner = THIS_MODULE,
73 .open = tpm_bios_measurements_open,
74 .read = seq_read,
75 .llseek = seq_lseek,
76 .release = tpm_bios_measurements_release,
79 static int tpm_read_log(struct tpm_chip *chip)
81 int rc;
83 if (chip->log.bios_event_log != NULL) {
84 dev_dbg(&chip->dev,
85 "%s: ERROR - event log already initialized\n",
86 __func__);
87 return -EFAULT;
90 rc = tpm_read_log_acpi(chip);
91 if (rc != -ENODEV)
92 return rc;
94 rc = tpm_read_log_efi(chip);
95 if (rc != -ENODEV)
96 return rc;
98 return tpm_read_log_of(chip);
102 * tpm_bios_log_setup() - Read the event log from the firmware
103 * @chip: TPM chip to use.
105 * If an event log is found then the securityfs files are setup to
106 * export it to userspace, otherwise nothing is done.
108 * Returns -ENODEV if the firmware has no event log or securityfs is not
109 * supported.
111 int tpm_bios_log_setup(struct tpm_chip *chip)
113 const char *name = dev_name(&chip->dev);
114 unsigned int cnt;
115 int log_version;
116 int rc = 0;
118 rc = tpm_read_log(chip);
119 if (rc < 0)
120 return rc;
121 log_version = rc;
123 cnt = 0;
124 chip->bios_dir[cnt] = securityfs_create_dir(name, NULL);
125 /* NOTE: securityfs_create_dir can return ENODEV if securityfs is
126 * compiled out. The caller should ignore the ENODEV return code.
128 if (IS_ERR(chip->bios_dir[cnt]))
129 goto err;
130 cnt++;
132 chip->bin_log_seqops.chip = chip;
133 if (log_version == EFI_TCG2_EVENT_LOG_FORMAT_TCG_2)
134 chip->bin_log_seqops.seqops =
135 &tpm2_binary_b_measurements_seqops;
136 else
137 chip->bin_log_seqops.seqops =
138 &tpm1_binary_b_measurements_seqops;
141 chip->bios_dir[cnt] =
142 securityfs_create_file("binary_bios_measurements",
143 0440, chip->bios_dir[0],
144 (void *)&chip->bin_log_seqops,
145 &tpm_bios_measurements_ops);
146 if (IS_ERR(chip->bios_dir[cnt]))
147 goto err;
148 cnt++;
150 if (!(chip->flags & TPM_CHIP_FLAG_TPM2)) {
152 chip->ascii_log_seqops.chip = chip;
153 chip->ascii_log_seqops.seqops =
154 &tpm1_ascii_b_measurements_seqops;
156 chip->bios_dir[cnt] =
157 securityfs_create_file("ascii_bios_measurements",
158 0440, chip->bios_dir[0],
159 (void *)&chip->ascii_log_seqops,
160 &tpm_bios_measurements_ops);
161 if (IS_ERR(chip->bios_dir[cnt]))
162 goto err;
163 cnt++;
166 return 0;
168 err:
169 rc = PTR_ERR(chip->bios_dir[cnt]);
170 chip->bios_dir[cnt] = NULL;
171 tpm_bios_log_teardown(chip);
172 return rc;
175 void tpm_bios_log_teardown(struct tpm_chip *chip)
177 int i;
178 struct inode *inode;
180 /* securityfs_remove currently doesn't take care of handling sync
181 * between removal and opening of pseudo files. To handle this, a
182 * workaround is added by making i_private = NULL here during removal
183 * and to check it during open(), both within inode_lock()/unlock().
184 * This design ensures that open() either safely gets kref or fails.
186 for (i = (TPM_NUM_EVENT_LOG_FILES - 1); i >= 0; i--) {
187 if (chip->bios_dir[i]) {
188 inode = d_inode(chip->bios_dir[i]);
189 inode_lock(inode);
190 inode->i_private = NULL;
191 inode_unlock(inode);
192 securityfs_remove(chip->bios_dir[i]);