162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-or-later
262306a36Sopenharmony_ci/*
362306a36Sopenharmony_ci * Copyright (C) 2005, 2012 IBM Corporation
462306a36Sopenharmony_ci *
562306a36Sopenharmony_ci * Authors:
662306a36Sopenharmony_ci *	Kent Yoder <key@linux.vnet.ibm.com>
762306a36Sopenharmony_ci *	Seiji Munetoh <munetoh@jp.ibm.com>
862306a36Sopenharmony_ci *	Stefan Berger <stefanb@us.ibm.com>
962306a36Sopenharmony_ci *	Reiner Sailer <sailer@watson.ibm.com>
1062306a36Sopenharmony_ci *	Kylene Hall <kjhall@us.ibm.com>
1162306a36Sopenharmony_ci *	Nayna Jain <nayna@linux.vnet.ibm.com>
1262306a36Sopenharmony_ci *
1362306a36Sopenharmony_ci * Access to the event log created by a system's firmware / BIOS
1462306a36Sopenharmony_ci */
1562306a36Sopenharmony_ci
1662306a36Sopenharmony_ci#include <linux/seq_file.h>
1762306a36Sopenharmony_ci#include <linux/fs.h>
1862306a36Sopenharmony_ci#include <linux/security.h>
1962306a36Sopenharmony_ci#include <linux/module.h>
2062306a36Sopenharmony_ci#include <linux/tpm_eventlog.h>
2162306a36Sopenharmony_ci
2262306a36Sopenharmony_ci#include "../tpm.h"
2362306a36Sopenharmony_ci#include "common.h"
2462306a36Sopenharmony_ci
2562306a36Sopenharmony_cistatic int tpm_bios_measurements_open(struct inode *inode,
2662306a36Sopenharmony_ci					    struct file *file)
2762306a36Sopenharmony_ci{
2862306a36Sopenharmony_ci	int err;
2962306a36Sopenharmony_ci	struct seq_file *seq;
3062306a36Sopenharmony_ci	struct tpm_chip_seqops *chip_seqops;
3162306a36Sopenharmony_ci	const struct seq_operations *seqops;
3262306a36Sopenharmony_ci	struct tpm_chip *chip;
3362306a36Sopenharmony_ci
3462306a36Sopenharmony_ci	inode_lock(inode);
3562306a36Sopenharmony_ci	if (!inode->i_private) {
3662306a36Sopenharmony_ci		inode_unlock(inode);
3762306a36Sopenharmony_ci		return -ENODEV;
3862306a36Sopenharmony_ci	}
3962306a36Sopenharmony_ci	chip_seqops = inode->i_private;
4062306a36Sopenharmony_ci	seqops = chip_seqops->seqops;
4162306a36Sopenharmony_ci	chip = chip_seqops->chip;
4262306a36Sopenharmony_ci	get_device(&chip->dev);
4362306a36Sopenharmony_ci	inode_unlock(inode);
4462306a36Sopenharmony_ci
4562306a36Sopenharmony_ci	/* now register seq file */
4662306a36Sopenharmony_ci	err = seq_open(file, seqops);
4762306a36Sopenharmony_ci	if (!err) {
4862306a36Sopenharmony_ci		seq = file->private_data;
4962306a36Sopenharmony_ci		seq->private = chip;
5062306a36Sopenharmony_ci	}
5162306a36Sopenharmony_ci
5262306a36Sopenharmony_ci	return err;
5362306a36Sopenharmony_ci}
5462306a36Sopenharmony_ci
5562306a36Sopenharmony_cistatic int tpm_bios_measurements_release(struct inode *inode,
5662306a36Sopenharmony_ci					 struct file *file)
5762306a36Sopenharmony_ci{
5862306a36Sopenharmony_ci	struct seq_file *seq = file->private_data;
5962306a36Sopenharmony_ci	struct tpm_chip *chip = seq->private;
6062306a36Sopenharmony_ci
6162306a36Sopenharmony_ci	put_device(&chip->dev);
6262306a36Sopenharmony_ci
6362306a36Sopenharmony_ci	return seq_release(inode, file);
6462306a36Sopenharmony_ci}
6562306a36Sopenharmony_ci
6662306a36Sopenharmony_cistatic const struct file_operations tpm_bios_measurements_ops = {
6762306a36Sopenharmony_ci	.owner = THIS_MODULE,
6862306a36Sopenharmony_ci	.open = tpm_bios_measurements_open,
6962306a36Sopenharmony_ci	.read = seq_read,
7062306a36Sopenharmony_ci	.llseek = seq_lseek,
7162306a36Sopenharmony_ci	.release = tpm_bios_measurements_release,
7262306a36Sopenharmony_ci};
7362306a36Sopenharmony_ci
7462306a36Sopenharmony_cistatic int tpm_read_log(struct tpm_chip *chip)
7562306a36Sopenharmony_ci{
7662306a36Sopenharmony_ci	int rc;
7762306a36Sopenharmony_ci
7862306a36Sopenharmony_ci	if (chip->log.bios_event_log != NULL) {
7962306a36Sopenharmony_ci		dev_dbg(&chip->dev,
8062306a36Sopenharmony_ci			"%s: ERROR - event log already initialized\n",
8162306a36Sopenharmony_ci			__func__);
8262306a36Sopenharmony_ci		return -EFAULT;
8362306a36Sopenharmony_ci	}
8462306a36Sopenharmony_ci
8562306a36Sopenharmony_ci	rc = tpm_read_log_acpi(chip);
8662306a36Sopenharmony_ci	if (rc != -ENODEV)
8762306a36Sopenharmony_ci		return rc;
8862306a36Sopenharmony_ci
8962306a36Sopenharmony_ci	rc = tpm_read_log_efi(chip);
9062306a36Sopenharmony_ci	if (rc != -ENODEV)
9162306a36Sopenharmony_ci		return rc;
9262306a36Sopenharmony_ci
9362306a36Sopenharmony_ci	return tpm_read_log_of(chip);
9462306a36Sopenharmony_ci}
9562306a36Sopenharmony_ci
9662306a36Sopenharmony_ci/*
9762306a36Sopenharmony_ci * tpm_bios_log_setup() - Read the event log from the firmware
9862306a36Sopenharmony_ci * @chip: TPM chip to use.
9962306a36Sopenharmony_ci *
10062306a36Sopenharmony_ci * If an event log is found then the securityfs files are setup to
10162306a36Sopenharmony_ci * export it to userspace, otherwise nothing is done.
10262306a36Sopenharmony_ci */
10362306a36Sopenharmony_civoid tpm_bios_log_setup(struct tpm_chip *chip)
10462306a36Sopenharmony_ci{
10562306a36Sopenharmony_ci	const char *name = dev_name(&chip->dev);
10662306a36Sopenharmony_ci	unsigned int cnt;
10762306a36Sopenharmony_ci	int log_version;
10862306a36Sopenharmony_ci	int rc = 0;
10962306a36Sopenharmony_ci
11062306a36Sopenharmony_ci	if (chip->flags & TPM_CHIP_FLAG_VIRTUAL)
11162306a36Sopenharmony_ci		return;
11262306a36Sopenharmony_ci
11362306a36Sopenharmony_ci	rc = tpm_read_log(chip);
11462306a36Sopenharmony_ci	if (rc < 0)
11562306a36Sopenharmony_ci		return;
11662306a36Sopenharmony_ci	log_version = rc;
11762306a36Sopenharmony_ci
11862306a36Sopenharmony_ci	cnt = 0;
11962306a36Sopenharmony_ci	chip->bios_dir[cnt] = securityfs_create_dir(name, NULL);
12062306a36Sopenharmony_ci	/* NOTE: securityfs_create_dir can return ENODEV if securityfs is
12162306a36Sopenharmony_ci	 * compiled out. The caller should ignore the ENODEV return code.
12262306a36Sopenharmony_ci	 */
12362306a36Sopenharmony_ci	if (IS_ERR(chip->bios_dir[cnt]))
12462306a36Sopenharmony_ci		goto err;
12562306a36Sopenharmony_ci	cnt++;
12662306a36Sopenharmony_ci
12762306a36Sopenharmony_ci	chip->bin_log_seqops.chip = chip;
12862306a36Sopenharmony_ci	if (log_version == EFI_TCG2_EVENT_LOG_FORMAT_TCG_2)
12962306a36Sopenharmony_ci		chip->bin_log_seqops.seqops =
13062306a36Sopenharmony_ci			&tpm2_binary_b_measurements_seqops;
13162306a36Sopenharmony_ci	else
13262306a36Sopenharmony_ci		chip->bin_log_seqops.seqops =
13362306a36Sopenharmony_ci			&tpm1_binary_b_measurements_seqops;
13462306a36Sopenharmony_ci
13562306a36Sopenharmony_ci
13662306a36Sopenharmony_ci	chip->bios_dir[cnt] =
13762306a36Sopenharmony_ci	    securityfs_create_file("binary_bios_measurements",
13862306a36Sopenharmony_ci				   0440, chip->bios_dir[0],
13962306a36Sopenharmony_ci				   (void *)&chip->bin_log_seqops,
14062306a36Sopenharmony_ci				   &tpm_bios_measurements_ops);
14162306a36Sopenharmony_ci	if (IS_ERR(chip->bios_dir[cnt]))
14262306a36Sopenharmony_ci		goto err;
14362306a36Sopenharmony_ci	cnt++;
14462306a36Sopenharmony_ci
14562306a36Sopenharmony_ci	if (!(chip->flags & TPM_CHIP_FLAG_TPM2)) {
14662306a36Sopenharmony_ci
14762306a36Sopenharmony_ci		chip->ascii_log_seqops.chip = chip;
14862306a36Sopenharmony_ci		chip->ascii_log_seqops.seqops =
14962306a36Sopenharmony_ci			&tpm1_ascii_b_measurements_seqops;
15062306a36Sopenharmony_ci
15162306a36Sopenharmony_ci		chip->bios_dir[cnt] =
15262306a36Sopenharmony_ci			securityfs_create_file("ascii_bios_measurements",
15362306a36Sopenharmony_ci					       0440, chip->bios_dir[0],
15462306a36Sopenharmony_ci					       (void *)&chip->ascii_log_seqops,
15562306a36Sopenharmony_ci					       &tpm_bios_measurements_ops);
15662306a36Sopenharmony_ci		if (IS_ERR(chip->bios_dir[cnt]))
15762306a36Sopenharmony_ci			goto err;
15862306a36Sopenharmony_ci		cnt++;
15962306a36Sopenharmony_ci	}
16062306a36Sopenharmony_ci
16162306a36Sopenharmony_ci	return;
16262306a36Sopenharmony_ci
16362306a36Sopenharmony_cierr:
16462306a36Sopenharmony_ci	chip->bios_dir[cnt] = NULL;
16562306a36Sopenharmony_ci	tpm_bios_log_teardown(chip);
16662306a36Sopenharmony_ci	return;
16762306a36Sopenharmony_ci}
16862306a36Sopenharmony_ci
16962306a36Sopenharmony_civoid tpm_bios_log_teardown(struct tpm_chip *chip)
17062306a36Sopenharmony_ci{
17162306a36Sopenharmony_ci	int i;
17262306a36Sopenharmony_ci	struct inode *inode;
17362306a36Sopenharmony_ci
17462306a36Sopenharmony_ci	/* securityfs_remove currently doesn't take care of handling sync
17562306a36Sopenharmony_ci	 * between removal and opening of pseudo files. To handle this, a
17662306a36Sopenharmony_ci	 * workaround is added by making i_private = NULL here during removal
17762306a36Sopenharmony_ci	 * and to check it during open(), both within inode_lock()/unlock().
17862306a36Sopenharmony_ci	 * This design ensures that open() either safely gets kref or fails.
17962306a36Sopenharmony_ci	 */
18062306a36Sopenharmony_ci	for (i = (TPM_NUM_EVENT_LOG_FILES - 1); i >= 0; i--) {
18162306a36Sopenharmony_ci		if (chip->bios_dir[i]) {
18262306a36Sopenharmony_ci			inode = d_inode(chip->bios_dir[i]);
18362306a36Sopenharmony_ci			inode_lock(inode);
18462306a36Sopenharmony_ci			inode->i_private = NULL;
18562306a36Sopenharmony_ci			inode_unlock(inode);
18662306a36Sopenharmony_ci			securityfs_remove(chip->bios_dir[i]);
18762306a36Sopenharmony_ci		}
18862306a36Sopenharmony_ci	}
18962306a36Sopenharmony_ci}
190