18c2ecf20Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-or-later 28c2ecf20Sopenharmony_ci/* 38c2ecf20Sopenharmony_ci * Copyright (C) 2005 IBM Corporation 48c2ecf20Sopenharmony_ci * 58c2ecf20Sopenharmony_ci * Authors: 68c2ecf20Sopenharmony_ci * Seiji Munetoh <munetoh@jp.ibm.com> 78c2ecf20Sopenharmony_ci * Stefan Berger <stefanb@us.ibm.com> 88c2ecf20Sopenharmony_ci * Reiner Sailer <sailer@watson.ibm.com> 98c2ecf20Sopenharmony_ci * Kylene Hall <kjhall@us.ibm.com> 108c2ecf20Sopenharmony_ci * Nayna Jain <nayna@linux.vnet.ibm.com> 118c2ecf20Sopenharmony_ci * 128c2ecf20Sopenharmony_ci * Maintained by: <tpmdd-devel@lists.sourceforge.net> 138c2ecf20Sopenharmony_ci * 148c2ecf20Sopenharmony_ci * Access to the event log extended by the TCG BIOS of PC platform 158c2ecf20Sopenharmony_ci */ 168c2ecf20Sopenharmony_ci 178c2ecf20Sopenharmony_ci#include <linux/seq_file.h> 188c2ecf20Sopenharmony_ci#include <linux/fs.h> 198c2ecf20Sopenharmony_ci#include <linux/security.h> 208c2ecf20Sopenharmony_ci#include <linux/module.h> 218c2ecf20Sopenharmony_ci#include <linux/slab.h> 228c2ecf20Sopenharmony_ci#include <linux/acpi.h> 238c2ecf20Sopenharmony_ci#include <linux/tpm_eventlog.h> 248c2ecf20Sopenharmony_ci 258c2ecf20Sopenharmony_ci#include "../tpm.h" 268c2ecf20Sopenharmony_ci#include "common.h" 278c2ecf20Sopenharmony_ci 288c2ecf20Sopenharmony_cistruct acpi_tcpa { 298c2ecf20Sopenharmony_ci struct acpi_table_header hdr; 308c2ecf20Sopenharmony_ci u16 platform_class; 318c2ecf20Sopenharmony_ci union { 328c2ecf20Sopenharmony_ci struct client_hdr { 338c2ecf20Sopenharmony_ci u32 log_max_len __packed; 348c2ecf20Sopenharmony_ci u64 log_start_addr __packed; 358c2ecf20Sopenharmony_ci } client; 368c2ecf20Sopenharmony_ci struct server_hdr { 378c2ecf20Sopenharmony_ci u16 reserved; 388c2ecf20Sopenharmony_ci u64 log_max_len __packed; 398c2ecf20Sopenharmony_ci u64 log_start_addr __packed; 408c2ecf20Sopenharmony_ci } server; 418c2ecf20Sopenharmony_ci }; 428c2ecf20Sopenharmony_ci}; 438c2ecf20Sopenharmony_ci 448c2ecf20Sopenharmony_ci/* Check that the given log is indeed a TPM2 log. */ 458c2ecf20Sopenharmony_cistatic bool tpm_is_tpm2_log(void *bios_event_log, u64 len) 468c2ecf20Sopenharmony_ci{ 478c2ecf20Sopenharmony_ci struct tcg_efi_specid_event_head *efispecid; 488c2ecf20Sopenharmony_ci struct tcg_pcr_event *event_header; 498c2ecf20Sopenharmony_ci int n; 508c2ecf20Sopenharmony_ci 518c2ecf20Sopenharmony_ci if (len < sizeof(*event_header)) 528c2ecf20Sopenharmony_ci return false; 538c2ecf20Sopenharmony_ci len -= sizeof(*event_header); 548c2ecf20Sopenharmony_ci event_header = bios_event_log; 558c2ecf20Sopenharmony_ci 568c2ecf20Sopenharmony_ci if (len < sizeof(*efispecid)) 578c2ecf20Sopenharmony_ci return false; 588c2ecf20Sopenharmony_ci efispecid = (struct tcg_efi_specid_event_head *)event_header->event; 598c2ecf20Sopenharmony_ci 608c2ecf20Sopenharmony_ci n = memcmp(efispecid->signature, TCG_SPECID_SIG, 618c2ecf20Sopenharmony_ci sizeof(TCG_SPECID_SIG)); 628c2ecf20Sopenharmony_ci return n == 0; 638c2ecf20Sopenharmony_ci} 648c2ecf20Sopenharmony_ci 658c2ecf20Sopenharmony_ci/* read binary bios log */ 668c2ecf20Sopenharmony_ciint tpm_read_log_acpi(struct tpm_chip *chip) 678c2ecf20Sopenharmony_ci{ 688c2ecf20Sopenharmony_ci struct acpi_tcpa *buff; 698c2ecf20Sopenharmony_ci acpi_status status; 708c2ecf20Sopenharmony_ci void __iomem *virt; 718c2ecf20Sopenharmony_ci u64 len, start; 728c2ecf20Sopenharmony_ci struct tpm_bios_log *log; 738c2ecf20Sopenharmony_ci struct acpi_table_tpm2 *tbl; 748c2ecf20Sopenharmony_ci struct acpi_tpm2_phy *tpm2_phy; 758c2ecf20Sopenharmony_ci int format; 768c2ecf20Sopenharmony_ci int ret; 778c2ecf20Sopenharmony_ci 788c2ecf20Sopenharmony_ci log = &chip->log; 798c2ecf20Sopenharmony_ci 808c2ecf20Sopenharmony_ci /* Unfortuntely ACPI does not associate the event log with a specific 818c2ecf20Sopenharmony_ci * TPM, like PPI. Thus all ACPI TPMs will read the same log. 828c2ecf20Sopenharmony_ci */ 838c2ecf20Sopenharmony_ci if (!chip->acpi_dev_handle) 848c2ecf20Sopenharmony_ci return -ENODEV; 858c2ecf20Sopenharmony_ci 868c2ecf20Sopenharmony_ci if (chip->flags & TPM_CHIP_FLAG_TPM2) { 878c2ecf20Sopenharmony_ci status = acpi_get_table("TPM2", 1, 888c2ecf20Sopenharmony_ci (struct acpi_table_header **)&tbl); 898c2ecf20Sopenharmony_ci if (ACPI_FAILURE(status)) 908c2ecf20Sopenharmony_ci return -ENODEV; 918c2ecf20Sopenharmony_ci 928c2ecf20Sopenharmony_ci if (tbl->header.length < 938c2ecf20Sopenharmony_ci sizeof(*tbl) + sizeof(struct acpi_tpm2_phy)) { 948c2ecf20Sopenharmony_ci acpi_put_table((struct acpi_table_header *)tbl); 958c2ecf20Sopenharmony_ci return -ENODEV; 968c2ecf20Sopenharmony_ci } 978c2ecf20Sopenharmony_ci 988c2ecf20Sopenharmony_ci tpm2_phy = (void *)tbl + sizeof(*tbl); 998c2ecf20Sopenharmony_ci len = tpm2_phy->log_area_minimum_length; 1008c2ecf20Sopenharmony_ci 1018c2ecf20Sopenharmony_ci start = tpm2_phy->log_area_start_address; 1028c2ecf20Sopenharmony_ci if (!start || !len) { 1038c2ecf20Sopenharmony_ci acpi_put_table((struct acpi_table_header *)tbl); 1048c2ecf20Sopenharmony_ci return -ENODEV; 1058c2ecf20Sopenharmony_ci } 1068c2ecf20Sopenharmony_ci 1078c2ecf20Sopenharmony_ci acpi_put_table((struct acpi_table_header *)tbl); 1088c2ecf20Sopenharmony_ci format = EFI_TCG2_EVENT_LOG_FORMAT_TCG_2; 1098c2ecf20Sopenharmony_ci } else { 1108c2ecf20Sopenharmony_ci /* Find TCPA entry in RSDT (ACPI_LOGICAL_ADDRESSING) */ 1118c2ecf20Sopenharmony_ci status = acpi_get_table(ACPI_SIG_TCPA, 1, 1128c2ecf20Sopenharmony_ci (struct acpi_table_header **)&buff); 1138c2ecf20Sopenharmony_ci if (ACPI_FAILURE(status)) 1148c2ecf20Sopenharmony_ci return -ENODEV; 1158c2ecf20Sopenharmony_ci 1168c2ecf20Sopenharmony_ci switch (buff->platform_class) { 1178c2ecf20Sopenharmony_ci case BIOS_SERVER: 1188c2ecf20Sopenharmony_ci len = buff->server.log_max_len; 1198c2ecf20Sopenharmony_ci start = buff->server.log_start_addr; 1208c2ecf20Sopenharmony_ci break; 1218c2ecf20Sopenharmony_ci case BIOS_CLIENT: 1228c2ecf20Sopenharmony_ci default: 1238c2ecf20Sopenharmony_ci len = buff->client.log_max_len; 1248c2ecf20Sopenharmony_ci start = buff->client.log_start_addr; 1258c2ecf20Sopenharmony_ci break; 1268c2ecf20Sopenharmony_ci } 1278c2ecf20Sopenharmony_ci 1288c2ecf20Sopenharmony_ci acpi_put_table((struct acpi_table_header *)buff); 1298c2ecf20Sopenharmony_ci format = EFI_TCG2_EVENT_LOG_FORMAT_TCG_1_2; 1308c2ecf20Sopenharmony_ci } 1318c2ecf20Sopenharmony_ci 1328c2ecf20Sopenharmony_ci if (!len) { 1338c2ecf20Sopenharmony_ci dev_warn(&chip->dev, "%s: TCPA log area empty\n", __func__); 1348c2ecf20Sopenharmony_ci return -EIO; 1358c2ecf20Sopenharmony_ci } 1368c2ecf20Sopenharmony_ci 1378c2ecf20Sopenharmony_ci /* malloc EventLog space */ 1388c2ecf20Sopenharmony_ci log->bios_event_log = kmalloc(len, GFP_KERNEL); 1398c2ecf20Sopenharmony_ci if (!log->bios_event_log) 1408c2ecf20Sopenharmony_ci return -ENOMEM; 1418c2ecf20Sopenharmony_ci 1428c2ecf20Sopenharmony_ci log->bios_event_log_end = log->bios_event_log + len; 1438c2ecf20Sopenharmony_ci 1448c2ecf20Sopenharmony_ci ret = -EIO; 1458c2ecf20Sopenharmony_ci virt = acpi_os_map_iomem(start, len); 1468c2ecf20Sopenharmony_ci if (!virt) { 1478c2ecf20Sopenharmony_ci dev_warn(&chip->dev, "%s: Failed to map ACPI memory\n", __func__); 1488c2ecf20Sopenharmony_ci /* try EFI log next */ 1498c2ecf20Sopenharmony_ci ret = -ENODEV; 1508c2ecf20Sopenharmony_ci goto err; 1518c2ecf20Sopenharmony_ci } 1528c2ecf20Sopenharmony_ci 1538c2ecf20Sopenharmony_ci memcpy_fromio(log->bios_event_log, virt, len); 1548c2ecf20Sopenharmony_ci 1558c2ecf20Sopenharmony_ci acpi_os_unmap_iomem(virt, len); 1568c2ecf20Sopenharmony_ci 1578c2ecf20Sopenharmony_ci if (chip->flags & TPM_CHIP_FLAG_TPM2 && 1588c2ecf20Sopenharmony_ci !tpm_is_tpm2_log(log->bios_event_log, len)) { 1598c2ecf20Sopenharmony_ci /* try EFI log next */ 1608c2ecf20Sopenharmony_ci ret = -ENODEV; 1618c2ecf20Sopenharmony_ci goto err; 1628c2ecf20Sopenharmony_ci } 1638c2ecf20Sopenharmony_ci 1648c2ecf20Sopenharmony_ci return format; 1658c2ecf20Sopenharmony_ci 1668c2ecf20Sopenharmony_cierr: 1678c2ecf20Sopenharmony_ci kfree(log->bios_event_log); 1688c2ecf20Sopenharmony_ci log->bios_event_log = NULL; 1698c2ecf20Sopenharmony_ci return ret; 1708c2ecf20Sopenharmony_ci} 171